Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
Analysis ID:1427736
MD5:e217012532358c2ed66836108b1dbd44
SHA1:93469caf607a3b8200fde7261afbf96565da6e36
SHA256:0052b0f94566b75d1456585a91ddce911c23000fd07189c8a8c6a43c84e42d4e
Tags:exe
Infos:

Detection

Metasploit
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe (PID: 6292 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe" MD5: E217012532358C2ED66836108B1DBD44)
    • conhost.exe (PID: 3408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 3480 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6292 -s 924 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"Type": "Metasploit Connect", "IP": "192.168.16.128", "Port": 1453}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
    • 0x14a4:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "192.168.16.128", "Port": 1453}
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeReversingLabs: Detection: 34%
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeVirustotal: Detection: 52%Perma Link
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeJoe Sandbox ML: detected
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: System.Core.pdbP source: WERF177.tmp.dmp.7.dr
    Source: Binary string: C:\Users\Private\Desktop\mbbborclar\mbbborclar\obj\Debug\mbbborclar.pdb source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: Binary string: mscorlib.pdb source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3162873892.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, WERF177.tmp.dmp.7.dr
    Source: Binary string: System.ni.pdbRSDS source: WERF177.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: C:\Users\Private\Desktop\mbbborclar\mbbborclar\obj\Debug\mbbborclar.pdb\ source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: Binary string: System.pdb4 source: WERF177.tmp.dmp.7.dr
    Source: Binary string: System.Core.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdbRSDS source: WERF177.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Users\user\Desktop\mbbborclar.pdbt source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3161772118.0000000000FC3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: System.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: mbbborclar.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.PDB source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3161772118.0000000000FC3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Core.ni.pdbRSDS source: WERF177.tmp.dmp.7.dr
    Source: Binary string: System.Core.ni.pdb source: WERF177.tmp.dmp.7.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeCode function: 4x nop then mov eax, dword ptr [03CA357Ch]0_2_02AC0898
    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net

    System Summary

    barindex
    Source: 00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeCode function: 0_2_02AC08980_2_02AC0898
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeCode function: 0_2_02AC08890_2_02AC0889
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeCode function: 0_2_053500060_2_05350006
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeCode function: 0_2_053500400_2_05350040
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6292 -s 924
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3161772118.0000000000F8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000000.2011718336.0000000000982000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamembbborclar.exe6 vs SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3162873892.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamembbborclar.exe6 vs SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeBinary or memory string: OriginalFilenamembbborclar.exe6 vs SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: 00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, Program.csBase64 encoded string: 'UEbMiZMvbjxXxQSTZwMCzicFIB7OARkHR1gANwnFKAA1tB5oDfjD0Vc5hSYtWGS+UOnRhxE0UwzA85Y8Z7wvYngtGCBVmTUlDcb8r/I39ohYdbin3HhxDsXaEOBvK3BCy7XhuRZN2tYxo95HZDCAYMokhqbu6Ndi9vhl6ObKj0XFv/1+nsF2M2UrieZn8oAZE96RSF5Nlljgg/VHis2vQyYSpXZtwhXwU2zXwXhatl8uWLwZ8Av+gbvs6jcgRDtQ7XIMyIL2Nj9WCuNz3ucl/psPfhkMKSPkRBqNFWopOPQNa5JKTj4tGOF9y9THew/BpFSXMNMXUOnKyub9oLQQxqg1RJix+8iZ9kxoco9LfWlnl+AIhkfpcf+NgQbIZZtLRfinUZ4V+K1+zYp2GpD/iLUdUdyomK8+7Zdhen9pWs3snnlOdWEWMULPQriTeJ9pe4WNKZIT1V9AGNjGfvNdZ0tMlmUZeQvxIyfQE68DBSJz2xlGQ5E29nUiwn8YnKSBtuHKqCXvC2Dwg9gqBpFitXwqx1T9NAQXd83HMoV/9DFBeSUXML08l38Q7JUvqs8plEF1zEHLCk8OSbnh/2/g8aRTSkPD7nLG4mycpXNoABJb0jTLVokDbGl7bfuezyXRJBBpTYIhXY5pxm1ezo25C5iyVWaY/3M3loJWovPwBdD6/d53LK0AbSG+xR+cCUIdhHhSIxzRo4snnRojCniyrK5QclQ0MXanTbHUzmSsJz3J/UlbHwqZMy4nGQ/GP1UeMXWVp0o20otNum9KYNa/A+RkWRZ3XDbBcTe+dFvKxnE2l0EpjHmBR6SLoH+Veo97Q6M5G/5EpFl8mjMD99BOXo96lKDGS2P0CVklRMKp4gSO1X0qyfRCeIS6s14vsJA6SDhAmQJg/H3fWvdOSITgQnf47hQUfTyQdu+C/h22/lHPA2wKIxQq/3T6EjkDS+6jX6jYDHI5hU8M8+M/Jhd7iuOPGmdLrUMdB3oi3QOTswEoAIVzyqIAZhjQxmy5CesnEfGBH/ISVYsGlzNctZn215wItURliLEPlpFq/En5tgB/DH6TG57jp0bYyewWJ4xYgntR30VWI67WmIOp5T4ec7k9Fox5nnpkGm12QFK/fxqBQ0YQDcF+nGHxaaYxgnlnq6fFTZdWYIqb2u41udIWDTISw7y9cKmHA8YgCtanrfrSUg0yXTl8s9QRadNQ+ThUUC7eRxhF8M6ZSaeIYhjvTRNF5bG6rBC1No8+nYP3i6KCADa+M/SSZBScGgKLl8IgsrrNKzFZ4rJNI5WHprnLz8qq8QbJBkLEeDoOq815jl+GcBpccU+k4S4L2pGY/l7bB/iXZN6cRBRBxVqLgNx6+YQkLKDindrvBvVUFwiO0B8bSO4bj19ZFwsv+0Nk1xu4JMaSUcqW6dQun/4PwBu5TVK0JS0L2bg6UpEGQQnMxAe88aUixofxPbc6yZq+1fMhWYfpq2roI/9aEKfjXr+DXG1FvZTcPJyj7UOEH2xp7qpqXf64iOzgD6GVFQy7gZZHc0IqKXX0TrQx0B4zmJSOsnQQknj88WIbI+x3Er7mnujMGTypFwEhgsDdkqUiD0DU9QtS0tB0kvpRxjWE4QUETjelOB2FrS0sufJVrDC9AuuY/NaN03x0aisDDnw4cgkV/Z2bvqv7mgp4hhdNOsJ3SD2Wdst3SsY2g2Pcvx92KhtUoYqaT6YDocah0VBVDIHEyMHaWzqTbvyK4VhISZke5B+ALu74zRYPfr25EFcDyVR9Nt7mfUWJ76dsR8K3j/0AAWU++ZoJRUQiuJT4Rtt8lfnetRZqONHb+PuVfqOPd1ocOS8+20RSh9247RCsP2ynZp4nobzIS75u5spQvC3Vfm2QekeprLbadzrVDWhKJFDMi4d4QQknIUKFNuNeWn1zao2I4e0MWKP+RQPnqQw/v1WM/+Yz3cEPWxqcV+hb700clED4n5EFzxYkY/OGiY+JlMkbh5kwYdZGrKZlkCA97dOz8ASnfLIvNy/XM83dJSpANPGy+T2LrzlmhJwC3QtD5+Pi+SOpNQFRfwH62jziZq2kjgpMjbH5D9DO0cDeC69N9Un9o2+LwZIhwG3octUObzxCLt3ID87guFsoFG5vEKKhox1y22SRsWXkTWwoA31pd1ttSx9a8wdAPgLtgxhPWq2UQAeYIo8RMiSqebxQJUJo13WLdq0uKfl0UupTel115ofHNguFY7/oIEnrexWbCzOgjEk99t9oGkqNlSmVyjmdalXel3Uu0MWpBzCB2G7RiE2y1OxAXh92pZYd/pJN8097RhGd6aGGZqWo8q+6MFJI9HXwQS89DGO3vBU8lqNba/XN7IMZreZ88RRZ0uy4..'
    Source: classification engineClassification label: mal76.troj.winEXE@3/6@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6292
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3408:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\957ee867-f407-47fe-b2c4-34be1debaf41Jump to behavior
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeReversingLabs: Detection: 34%
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeVirustotal: Detection: 52%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe"
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6292 -s 924
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: System.Core.pdbP source: WERF177.tmp.dmp.7.dr
    Source: Binary string: C:\Users\Private\Desktop\mbbborclar\mbbborclar\obj\Debug\mbbborclar.pdb source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: Binary string: mscorlib.pdb source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3162873892.0000000002CDA000.00000004.00000800.00020000.00000000.sdmp, WERF177.tmp.dmp.7.dr
    Source: Binary string: System.ni.pdbRSDS source: WERF177.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: C:\Users\Private\Desktop\mbbborclar\mbbborclar\obj\Debug\mbbborclar.pdb\ source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
    Source: Binary string: System.pdb4 source: WERF177.tmp.dmp.7.dr
    Source: Binary string: System.Core.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdbRSDS source: WERF177.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Users\user\Desktop\mbbborclar.pdbt source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3161772118.0000000000FC3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: System.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: mbbborclar.pdb source: WERF177.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.PDB source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, 00000000.00000002.3161772118.0000000000FC3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Core.ni.pdbRSDS source: WERF177.tmp.dmp.7.dr
    Source: Binary string: System.Core.ni.pdb source: WERF177.tmp.dmp.7.dr
    Source: SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeStatic PE information: 0xECDB0CB4 [Sat Dec 3 19:23:32 2095 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeMemory allocated: 4CA0000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 5602Jump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: Amcache.hve.7.drBinary or memory string: VMware
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    2
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory2
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Process Injection
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Timestomp
    NTDS12
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe34%ReversingLabsWin32.Trojan.Marsilia
    SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe52%VirustotalBrowse
    SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.7.drfalse
      high
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1427736
      Start date and time:2024-04-18 02:35:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 7s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
      Detection:MAL
      Classification:mal76.troj.winEXE@3/6@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 3
      • Number of non-executed functions: 1
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.73.29
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe, PID 6292 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      02:36:59API Interceptor2554x Sleep call for process: conhost.exe modified
      02:37:50API Interceptor1x Sleep call for process: WerFault.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.9601691414645741
      Encrypted:false
      SSDEEP:96:eNip3FTSwwj518QH4QZzMldvxlZ6QXIDcQvc6QcEVcw3cE/xjd+BHUHZ0ownOgHB:vsvEQxQf0BU/KaGMzuiFaZ24IO8Mf
      MD5:56019BCFD0C9D1285B63BDB812F0BAFB
      SHA1:5418B1D7115CD2D63A146451BED77B71500B4CE2
      SHA-256:61C9C4D6669C7904D4697F15424DB0E0B39240A175232246F19A2AA55D0963AA
      SHA-512:F20766D62725F2E2C81B03FAA41312017C4DDCB04F4B2FDF8409923AF1C2094079E5C68B8EE4A1D0723E58D79D15BC5943B1386A64F015904D82DF27F63EC073
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.7.8.7.4.2.6.0.2.7.7.5.1.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.7.8.7.4.2.6.0.7.7.7.5.2.0.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.7.f.e.b.a.d.-.8.d.3.b.-.4.0.a.d.-.9.2.5.5.-.9.0.c.8.b.0.6.d.a.5.0.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.f.b.5.4.1.2.-.b.3.f.8.-.4.3.1.4.-.8.0.3.5.-.f.6.8.7.f.b.0.1.9.c.8.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...P.a.c.k.e.d.N.E.T...2.2.1.0...2.2.0.4.9...1.4.4.0.8...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.m.b.b.b.o.r.c.l.a.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.9.4.-.0.0.0.1.-.0.0.1.4.-.a.5.a.0.-.3.e.6.0.2.8.9.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.2.8.f.b.3.c.c.4.0.3.3.7.7.7.d.c.d.2.5.d.c.6.f.2.b.0.c.3.f.5.8.0.0.0.0.0.0.0.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Thu Apr 18 00:37:40 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):251521
      Entropy (8bit):5.197568294309647
      Encrypted:false
      SSDEEP:6144:8Z4sTgKy/gJb0NHNlqoTGI9Uu184BDGxT:8hTB9b0NiRI9UuW
      MD5:9F92E0CA903407C94F27CF040FCB9F42
      SHA1:F6BAF9DDAC64C654341915D248725C823E111A4F
      SHA-256:144683567526F8902B94271CE2912A8D439A8982C69648DB46609D8F4258C6E8
      SHA-512:2BEB2112C6D1FC356E8F319F0FCD4B67E8BC50C3EC87EF874C685132B7FE819EC54BCF4C614AE54B2D1BA6F56017A24827C42656D0B9771D58BB10026E3DC0E7
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......Tk f............T...............h.......$...t............6..........`.......8...........T............$..........................................................................................................eJ..............GenuineIntel............T............j f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8518
      Entropy (8bit):3.7031840075836437
      Encrypted:false
      SSDEEP:192:R6l7wVeJVjd6UQKZ6YEImSU9GfgmfZFq3pry89bLdsf35m:R6lXJpd6+6YEZSU9GgmfLqRLWfE
      MD5:9C042D8AF812EC8B368BB6A2812BB55C
      SHA1:2A589B8EBE7BF36246265759DEF1DD93D1B5A110
      SHA-256:33F970906B337BE4F6B920C50B73EA5BEFCEECCB51964EED1EB3C2372715B17A
      SHA-512:2C542B3523C83642B0EEF3649C80DB9096E16401FF6E18678B4085865A1B69C90ACC4A2F1C24320CE3F2DB47A79FDC7C5006BCFFFF6B6FA2E4EC7F5029EE56EC
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.9.2.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4903
      Entropy (8bit):4.5710833101463
      Encrypted:false
      SSDEEP:48:cvIwWl8zswJg77aI9ojWpW8VYJYm8M4JSbMsFE+q8v7bMjVvDpHd:uIjf2I7CS7V5JrKQvDNd
      MD5:8EB12EFF3C7F21F4D0E09FEC5D3C578D
      SHA1:61970CD8D2D7EB9F6D034CC0B486DB630104C94F
      SHA-256:F28AF545DAC0403326C010236452FFFA33BDA21B693F069EB4ADE8B11BB51E09
      SHA-512:DC4157717A42A8D53388D830E397A8AFC53B568654F119E0A81B7D0ACCA539AF6F924D2171448A6278F1BCA9A37E14842B1A6F9C8F90703F7ACDD0A5032A8211
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="284620" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.421916591358786
      Encrypted:false
      SSDEEP:6144:YSvfpi6ceLP/9skLmb0OTyWSPHaJG8nAgeMZMMhA2fX4WABlEnN70uhiTw:jvloTyW+EZMM6DFyN03w
      MD5:8594E70D3C0303367A9EECD5B4121EA6
      SHA1:3409F0D0FE9D281FD9C36018947090F3133D217B
      SHA-256:FC2F12C1301699AA59B7A16334671584280350211447643F8915674E26F11A08
      SHA-512:6039BF2B263A991B754D25FC7517D7F491BE55B554D69FCA4AEC5FC260F50F22E2384B82E773C6F3B4771AFE4995EF61AD81A9CFB4947542D935C0B7FCECA0E9
      Malicious:false
      Reputation:low
      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmB.R.(................................................................................................................................................................................................................................................................................................................................................CD.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
      File Type:Non-ISO extended-ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):12599874
      Entropy (8bit):4.233926535164379
      Encrypted:false
      SSDEEP:48:SWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWT:q
      MD5:CDAFCA48319A3BC6005A7E2146C47250
      SHA1:A22CB9DF85F2661391E55DBF2B38502F9B2EAC46
      SHA-256:4948D444F156290D67F3811EEA40C7739B0DFD9F89EF9B677EFF303DE43F0D9F
      SHA-512:00D64E0E5B08EE345F28997ACF0FBCCEE2B766AF1029B85C26CA0A184F20EC1883067A95B4D114B900E2F14A9B17A4C253AF05574C4C3E1CC845C0BC54A459B1
      Malicious:false
      Reputation:low
      Preview:gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadidlafkj..gadofp.gjuhaepg.oadflsihfkjadpt.hjaep..thjadpg.ghjpdfkghjpt.jhpagjhpadgjh*5r09yuy30549yuadpgfkghjadlisfkhgjadlfkghjadi
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):4.997388742161063
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
      File size:131'072 bytes
      MD5:e217012532358c2ed66836108b1dbd44
      SHA1:93469caf607a3b8200fde7261afbf96565da6e36
      SHA256:0052b0f94566b75d1456585a91ddce911c23000fd07189c8a8c6a43c84e42d4e
      SHA512:7a54be2cb934d36c27b5f4fed9a83d644b7003d7a6658bae33cef8f1fe937063d004489253843a588e93c5f60baaef7d8c103fc9beeb5ca4bc419b7c975eca1d
      SSDEEP:1536:aAK20xwUsquvcbZNQfEYot4zDN4iKIAaEU6NW6mgGiPCIeVb8pzMQSJ7QJZ54Gdl:UXxwUsqzwEbFFaEUkTcg388n
      TLSH:48D3DAB57B867588F91D9738A05266F3B3EBA3F30901CCA68EDFB224574847A444DCD2
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............`................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x421486
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0xECDB0CB4 [Sat Dec 3 19:23:32 2095 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x214340x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x5bc.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x240000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x2139c0x38.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x1f48c0x1f600a33b76479a44e8d7851cb0ec95e65fafFalse0.20465793077689243data5.004554743563041IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x220000x5bc0x600859add586eaa3a1bce5c7c311f5a7304False0.4173177083333333data4.088082935986609IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x240000xc0x2006bc5f694a9e0be433cf80be5cc2af43dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x220900x32cdata0.4224137931034483
      RT_MANIFEST0x223cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:02:35:56
      Start date:18/04/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.2210.22049.14408.exe"
      Imagebase:0x980000
      File size:131'072 bytes
      MD5 hash:E217012532358C2ED66836108B1DBD44
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.3162873892.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:02:35:56
      Start date:18/04/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:02:37:40
      Start date:18/04/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6292 -s 924
      Imagebase:0x620000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3162574832.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_2ac0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID: Te]q
        • API String ID: 0-52440209
        • Opcode ID: a8da00e92e999ef3a13226316bf832d92f3b514bdb3f47807949e84de9fa7bb0
        • Instruction ID: 14d95e1f2990e81d1d270e7454df3f464a0f627fb3f78122a62b8ccaf58356d8
        • Opcode Fuzzy Hash: a8da00e92e999ef3a13226316bf832d92f3b514bdb3f47807949e84de9fa7bb0
        • Instruction Fuzzy Hash: 2914AEB09936258BD754EF20E958DAAB7B5BB43709F10B9DDC40973268CB709E84CE0D
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.3163426699.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_5350000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d26a537f239c7788c4d1f76418b08225315eda08d1355b5ed7a1cd00bc658b2d
        • Instruction ID: b630bbe65848be12bec258e3dfa2011b9223a63a0022d45c5fc7fe30e6d113b6
        • Opcode Fuzzy Hash: d26a537f239c7788c4d1f76418b08225315eda08d1355b5ed7a1cd00bc658b2d
        • Instruction Fuzzy Hash: 68B380B09976258BD754EF20E954EAAB7B5BB43709F10B9DCC40973268CB709E84CE0D
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3162574832.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_2ac0000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID: Te]q
        • API String ID: 0-52440209
        • Opcode ID: e6a278ff101dae2f97939f4c28d140ac9906e2b2c9fe08b743868f2b6aa290e9
        • Instruction ID: ba27674787de1b57d51aec7ae5232b039ff0ad273409c7e6dc89be274552d191
        • Opcode Fuzzy Hash: e6a278ff101dae2f97939f4c28d140ac9906e2b2c9fe08b743868f2b6aa290e9
        • Instruction Fuzzy Hash: 7B42B475D09628CFDB24CF26D8886E9F7B5AB9A301F10A1EAD40CB3250DB355AC5CF18
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.3163426699.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_5350000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c5d591086e66d688a5888d73320d4b5f850f005e0f031d2f8555b3932ca838d6
        • Instruction ID: 9f5e9d22e1071e6eeccadac041950321e2edc08c059f5a96eb003c9c364a55f6
        • Opcode Fuzzy Hash: c5d591086e66d688a5888d73320d4b5f850f005e0f031d2f8555b3932ca838d6
        • Instruction Fuzzy Hash: 96E1E979D096688FDB24CF26DC40AE9F7F6AB5A311F08A0EAD448B3251D7354AC5CF14
        Uniqueness

        Uniqueness Score: -1.00%