Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ScannedXfileX2.xlam.xlsx

Overview

General Information

Sample name:ScannedXfileX2.xlam.xlsx
Analysis ID:1428199
MD5:df7ca854604bd4f2b015a33a0ffcf3ac
SHA1:9edffd0c999381f0cb310ac71060224a46862a37
SHA256:001dc9607cd0bc84512d280d3531670ab506d343c8c95925cfceca29d8d0456e
Tags:AgentTeslaxlsx
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to read the PEB
Document misses a certain OLE stream usually present in this Microsoft Office document type
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (unknown TCP traffic)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1012 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 1416 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x24c3:$s1: <legacyDrawing r:id="
  • 0x24eb:$s2: <oleObject progId="
  • 0x2533:$s3: autoLoad="true"

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 31.214.157.14, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1416, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1416, TargetFilename: C:\Users\user\AppData\Roaming\WWQ.exe

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 8.8.8.8, DestinationIsIpv6: false, DestinationPort: 53, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1416, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 54562
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ScannedXfileX2.xlam.xlsxAvira: detected
Source: ScannedXfileX2.xlam.xlsxReversingLabs: Detection: 71%

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 31.214.157.14 Port: 80Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0359065B WriteFile,CreateProcessW,ExitProcess,2_2_0359065B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035905D0 WriteFile,2_2_035905D0
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035904C5 CreateFileW,2_2_035904C5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035906FA CreateProcessW,ExitProcess,2_2_035906FA
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035904FC LoadLibraryW,2_2_035904FC
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590568 WriteFile,2_2_03590568
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035906D9 CreateProcessW,ExitProcess,2_2_035906D9
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590452 CreateFileW,2_2_03590452
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590641 WriteFile,CreateProcessW,ExitProcess,2_2_03590641
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590479 CreateFileW,2_2_03590479
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0359061D WriteFile,CreateProcessW,ExitProcess,2_2_0359061D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0359041D ExitProcess,CreateFileW,2_2_0359041D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590601 WriteFile,2_2_03590601
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035906BC CreateProcessW,ExitProcess,2_2_035906BC
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035904B2 CreateFileW,2_2_035904B2
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035905B4 WriteFile,2_2_035905B4
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590736 ExitProcess,2_2_03590736
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03590436 CreateFileW,2_2_03590436
Source: global trafficDNS query: name: speedy34.myvnc.com
Source: global trafficDNS query: name: speedy34.myvnc.com
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 31.214.157.14:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 31.214.157.14:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 31.214.157.14:80
Source: Joe Sandbox ViewASN Name: RACKPLACEDE RACKPLACEDE
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 31.214.157.14:80
Source: unknownDNS traffic detected: queries for: speedy34.myvnc.com
Source: EQNEDT32.EXE, 00000002.00000002.498827584.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://speedy34.myvnc.com/WZM.exe

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: ScannedXfileX2.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal100.expl.winXLSX@3/3@2/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$ScannedXfileX2.xlam.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6A65.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: ScannedXfileX2.xlam.xlsxReversingLabs: Detection: 71%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntvdm64.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: ScannedXfileX2.xlam.xlsxInitial sample: OLE zip file path = xl/media/image1.jpg
Source: ScannedXfileX2.xlam.xlsxInitial sample: OLE zip file path = xl/calcChain.xml
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: ScannedXfileX2.xlam.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2188Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-1472
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0359073D mov edx, dword ptr fs:[00000030h]2_2_0359073D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts32
Exploitation for Client Execution
1
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ScannedXfileX2.xlam.xlsx71%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
ScannedXfileX2.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
speedy34.myvnc.com
31.214.157.14
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://speedy34.myvnc.com/WZM.exeEQNEDT32.EXE, 00000002.00000002.498827584.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      31.214.157.14
      speedy34.myvnc.comGermany
      58329RACKPLACEDEtrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1428199
      Start date and time:2024-04-18 16:45:16 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 59s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:ScannedXfileX2.xlam.xlsx
      Detection:MAL
      Classification:mal100.expl.winXLSX@3/3@2/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 19
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .xlsx
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Active ActiveX Object
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: ScannedXfileX2.xlam.xlsx
      TimeTypeDescription
      16:46:54API Interceptor200x Sleep call for process: EQNEDT32.EXE modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      31.214.157.14Be1w4DBHX2.exeGet hashmaliciousUnknownBrowse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        RACKPLACEDEhttp://0nlinemmbiyeywhsskd0gotuhqhssbcvposgsai0dsolflktue2.tryuimbghiop.online/Get hashmaliciousUnknownBrowse
        • 31.214.157.153
        https://0nlinemmbiyeywhsskd0gotuhqhssbcvposgsai0dsolflktue2.tryuimbghiop.onlineGet hashmaliciousUnknownBrowse
        • 31.214.157.153
        fec8e6f6b14a88b99cae2e25ecac09cc605c0d3b73402.exeGet hashmaliciousSocks5SystemzBrowse
        • 193.242.211.154
        yPyS0VdawP.exeGet hashmaliciousSocks5SystemzBrowse
        • 193.242.211.154
        3D9BCju6L7.exeGet hashmaliciousSocks5SystemzBrowse
        • 193.242.211.154
        file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
        • 193.242.211.154
        file.exeGet hashmaliciousBitCoin Miner, RedLine, SmokeLoaderBrowse
        • 193.242.211.154
        zA2zEgyZdq.exeGet hashmaliciousUnknownBrowse
        • 193.242.211.141
        OIARlFNfU8.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, Vidar, XmrigBrowse
        • 193.242.211.141
        file.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, XmrigBrowse
        • 193.242.211.141
        No context
        No context
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
        MD5:797869BB881CFBCDAC2064F92B26E46F
        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
        Malicious:false
        Reputation:high, very likely benign file
        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
        MD5:797869BB881CFBCDAC2064F92B26E46F
        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
        Malicious:false
        Reputation:high, very likely benign file
        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
        MD5:797869BB881CFBCDAC2064F92B26E46F
        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
        Malicious:false
        Reputation:high, very likely benign file
        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        File type:Microsoft Excel 2007+
        Entropy (8bit):7.997954061408095
        TrID:
        • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
        • ZIP compressed archive (8000/1) 16.67%
        File name:ScannedXfileX2.xlam.xlsx
        File size:733'064 bytes
        MD5:df7ca854604bd4f2b015a33a0ffcf3ac
        SHA1:9edffd0c999381f0cb310ac71060224a46862a37
        SHA256:001dc9607cd0bc84512d280d3531670ab506d343c8c95925cfceca29d8d0456e
        SHA512:844c51f64b1d3ab9ef5ec008738974d18a7508db948f47334b7ef791e4661a3f657d5e46b68699a90b0df12a8788b6f0f34a6cc9fea61c6705111284ec58d893
        SSDEEP:12288:lOnWUVZtotrO2+G6U20xzW7sS8gOlL8j4JuL0bnd5BarEi/gr6oSa4XkbZXN:ovtotr//6U2wGsS8gOl8cuL0bnNPygrt
        TLSH:CBF42375FED1F5399DEC5820235A89F486FFA5D68AACB5C3F4A203342742D963B02B14
        File Content Preview:PK...........XK...............[Content_Types].xmlUT....' f.' f.' f.UMo.0.....0t.l.=..............%.V"K.......7AQ,q.../...'...v..l.>(k*vQ.,C#.T.....C~....H..`.6.....o...a..mB....O..h..PX.."s.;.....@,.A~Y.W\X...<&.v3..9...M.....V.ew}^...8...Ha.2..Hn.s%PZ...
        Icon Hash:2562ab89a7b7bfbf
        Document Type:OpenXML
        Number of OLE Files:1
        Has Summary Info:
        Application Name:
        Encrypted Document:False
        Contains Word Document Stream:False
        Contains Workbook/Book Stream:False
        Contains PowerPoint Document Stream:False
        Contains Visio Document Stream:False
        Contains ObjectPool Stream:False
        Flash Objects Count:0
        Contains VBA Macros:False
        Author:SHINY
        Last Saved By:X10LUXURY
        Create Time:2010-06-04T08:55:28Z
        Last Saved Time:2023-07-30T22:56:25Z
        Creating Application:Microsoft Excel
        Security:0
        Thumbnail Scaling Desired:false
        Company:Grizli777
        Contains Dirty Links:false
        Shared Document:false
        Changed Hyperlinks:false
        Application Version:15.0300
        General
        Stream Path:\x1OLe10NAtivE
        CLSID:
        File Type:data
        Stream Size:1011016
        Entropy:5.9260657488425945
        Base64 Encoded:False
        Data ASCII:R . . s . . . . . R V & R . . & . ) O . ? U . I . ] . . D . = . . . / . r . . . u X . . f V % z S , 1 i I O Q J / . r z G Q B e H 7 P . 1 . S X . w + . C . . . . } . . < 7 x R . . g . { s ` G y X V > n 9 : C . . z ? . . . . 0 . ( ? . / . $ e ] t h z 6 ( ` . L . c F E < c . i J . N ] 7 } 3 9 . R . | d . . Y 2 c 4 . . . F / [ . j r . G W h \\ . ; . ` V - . . q y < | . ] H . o 0 . 9 E - U . ~ . . . 2 ] H % . . / q . @ s C . d q ; . . T * ( X . ~ . T e T ; " . ; 9 s 5 . w * p x T A + : g . . . P X . . . i
        Data Raw:8f 52 89 03 02 73 de 13 18 88 01 08 14 52 ba 8e d8 56 26 81 ea 52 1b 11 26 8b 0a 8b 29 bf 4f 98 b9 ff f7 d7 8b 3f 55 ff d7 83 c0 49 ff e0 d0 c4 b3 be a3 86 9a 5d aa 17 b5 13 f8 8f 44 00 c7 da 3d 8c 07 81 f2 91 db bf 1b cc 2f 1e da e9 72 01 00 00 d5 75 58 1a 0b 66 e5 56 9a fd 25 7a df 53 ad 8d b5 2c 31 69 c1 49 d3 fc a7 99 4f 8e 51 83 4a f1 2f 1f 8e d3 72 7a 47 f4 51 d7 42 65 48 ea
        General
        Stream Path:nYzis4P
        CLSID:
        File Type:empty
        Stream Size:0
        Entropy:0.0
        Base64 Encoded:False
        Data ASCII:
        Data Raw:
        TimestampSource PortDest PortSource IPDest IP
        Apr 18, 2024 16:46:56.272330999 CEST4916180192.168.2.2231.214.157.14
        Apr 18, 2024 16:46:59.281554937 CEST4916180192.168.2.2231.214.157.14
        Apr 18, 2024 16:47:05.287601948 CEST4916180192.168.2.2231.214.157.14
        TimestampSource PortDest PortSource IPDest IP
        Apr 18, 2024 16:46:56.008125067 CEST5456253192.168.2.228.8.8.8
        Apr 18, 2024 16:46:56.148770094 CEST53545628.8.8.8192.168.2.22
        Apr 18, 2024 16:46:56.152667046 CEST5291753192.168.2.228.8.8.8
        Apr 18, 2024 16:46:56.271657944 CEST53529178.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Apr 18, 2024 16:46:56.008125067 CEST192.168.2.228.8.8.80xcbd2Standard query (0)speedy34.myvnc.comA (IP address)IN (0x0001)false
        Apr 18, 2024 16:46:56.152667046 CEST192.168.2.228.8.8.80x9d69Standard query (0)speedy34.myvnc.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Apr 18, 2024 16:46:56.148770094 CEST8.8.8.8192.168.2.220xcbd2No error (0)speedy34.myvnc.com31.214.157.14A (IP address)IN (0x0001)false
        Apr 18, 2024 16:46:56.271657944 CEST8.8.8.8192.168.2.220x9d69No error (0)speedy34.myvnc.com31.214.157.14A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:16:46:02
        Start date:18/04/2024
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        Imagebase:0x13f8a0000
        File size:28'253'536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:2
        Start time:16:46:54
        Start date:18/04/2024
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543'304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:44.6%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:82.8%
          Total number of Nodes:309
          Total number of Limit Nodes:53
          execution_graph 1194 359073d GetPEB 1195 3590745 1194->1195 1472 359041d ExitProcess 1495 3590436 1472->1495 1496 359043c 1495->1496 1497 3590443 1496->1497 1517 3590452 1496->1517 1501 35904b4 1497->1501 1509 359044f 1497->1509 1516 359048e 1497->1516 1499 35904bc 1503 35904bf 1499->1503 1504 3590524 1499->1504 1500 3590521 1502 3590535 34 API calls 1500->1502 1550 35904c5 1501->1550 1502->1504 1506 35904da CreateFileW 1503->1506 1507 3590568 34 API calls 1504->1507 1508 35904fc 38 API calls 1506->1508 1514 3590542 1507->1514 1512 35904ec 1508->1512 1509->1506 1510 3590473 1509->1510 1511 35904e5 1509->1511 1536 35904b2 1510->1536 1511->1512 1513 35904fc 38 API calls 1511->1513 1513->1512 1516->1499 1516->1500 1518 3590458 1517->1518 1555 3590479 1518->1555 1537 35904b4 1536->1537 1538 35904c5 39 API calls 1537->1538 1539 35904b9 1538->1539 1540 35904bc 1539->1540 1541 3590521 1539->1541 1543 35904bf CreateFileW 1540->1543 1544 3590524 1540->1544 1542 3590535 34 API calls 1541->1542 1542->1544 1547 35904fc 38 API calls 1543->1547 1546 3590568 34 API calls 1544->1546 1549 3590542 1546->1549 1548 35904ec 1547->1548 1551 35904c8 CreateFileW 1550->1551 1553 35904fc 38 API calls 1551->1553 1554 35904ec 1553->1554 1556 359047c 1555->1556 1557 35904b2 40 API calls 1556->1557 1558 359048e 1557->1558 1559 35904bc 1558->1559 1560 3590521 1558->1560 1562 35904bf CreateFileW 1559->1562 1563 3590524 1559->1563 1561 3590535 34 API calls 1560->1561 1561->1563 1566 35904fc 38 API calls 1562->1566 1565 3590568 34 API calls 1563->1565 1568 3590542 1565->1568 1567 35904ec 1566->1567 1196 35904c5 1197 35904c8 CreateFileW 1196->1197 1201 35904fc LoadLibraryW 1197->1201 1200 35904ec 1236 3590511 1201->1236 1203 3590505 1204 359050f 1203->1204 1205 3590574 1203->1205 1206 3590535 34 API calls 1204->1206 1207 359057b 1205->1207 1208 35905e0 1205->1208 1210 35905e6 1205->1210 1209 3590526 1206->1209 1207->1210 1211 3590595 1207->1211 1212 35905a7 28 API calls 1207->1212 1208->1210 1215 3590601 19 API calls 1208->1215 1216 3590568 34 API calls 1209->1216 1214 359061d 16 API calls 1210->1214 1220 3590613 1210->1220 1217 3590641 1211->1217 1219 35905cf 1211->1219 1212->1211 1213 35906a8 1218 35906bc 7 API calls 1213->1218 1214->1220 1215->1210 1223 3590542 1216->1223 1221 359065b 10 API calls 1217->1221 1225 35906b0 1218->1225 1222 3590601 19 API calls 1219->1222 1220->1200 1220->1213 1224 359069b WriteFile 1220->1224 1220->1225 1221->1220 1222->1210 1224->1220 1226 35906d9 CreateProcessW ExitProcess CreateProcessW ExitProcess ExitProcess 1225->1226 1228 35906c9 1226->1228 1227 359072a 1229 3590739 ExitProcess 1227->1229 1235 3590771 1227->1235 1228->1227 1230 35906fa CreateProcessW ExitProcess ExitProcess 1228->1230 1232 3590743 1228->1232 1231 35906eb 1230->1231 1231->1232 1233 35906f9 CreateProcessW 1231->1233 1232->1200 1234 3590736 ExitProcess 1233->1234 1234->1227 1235->1200 1237 3590514 1236->1237 1242 3590535 1237->1242 1243 3590538 1242->1243 1246 3590568 1243->1246 1245 3590542 1247 359056b 1246->1247 1276 3590584 1247->1276 1249 3590571 1250 359057b 1249->1250 1251 35905e0 1249->1251 1252 35905e6 1250->1252 1253 3590595 1250->1253 1337 35905a7 1250->1337 1251->1252 1301 3590601 1251->1301 1260 3590613 1252->1260 1361 359061d 1252->1361 1257 3590641 1253->1257 1259 35905cf 1253->1259 1381 359065b 1257->1381 1258 35906a8 1397 35906bc 1258->1397 1263 3590601 19 API calls 1259->1263 1260->1245 1260->1258 1264 35906b0 1260->1264 1265 359069b WriteFile 1260->1265 1263->1252 1319 35906d9 1264->1319 1265->1260 1267 35906c9 1271 3590743 1267->1271 1274 359072a 1267->1274 1329 35906fa 1267->1329 1268 3590739 ExitProcess 1271->1245 1272 35906f9 CreateProcessW 1335 3590736 1272->1335 1274->1268 1275 3590771 1274->1275 1275->1245 1277 3590587 1276->1277 1278 35905a7 28 API calls 1277->1278 1279 3590595 1278->1279 1280 3590641 1279->1280 1281 35905cf 1279->1281 1282 359065b 10 API calls 1280->1282 1283 3590601 19 API calls 1281->1283 1290 3590613 1282->1290 1286 35905ea 1283->1286 1284 35906d9 5 API calls 1288 35906c9 1284->1288 1285 35906a8 1289 35906bc 7 API calls 1285->1289 1287 359061d 16 API calls 1286->1287 1286->1290 1287->1290 1293 35906fa 3 API calls 1288->1293 1296 3590743 1288->1296 1299 359072a 1288->1299 1291 35906b0 1289->1291 1290->1249 1290->1285 1290->1291 1295 359069b WriteFile 1290->1295 1291->1284 1292 3590739 ExitProcess 1294 35906eb 1293->1294 1294->1296 1297 35906f9 CreateProcessW 1294->1297 1295->1290 1296->1249 1298 3590736 ExitProcess 1297->1298 1298->1299 1299->1292 1300 3590771 1299->1300 1300->1249 1302 3590604 1301->1302 1303 359061d 16 API calls 1302->1303 1305 3590613 1303->1305 1304 359069b WriteFile 1304->1305 1305->1252 1305->1304 1306 35906a8 1305->1306 1307 35906bc 7 API calls 1306->1307 1308 35906b0 1307->1308 1309 35906d9 5 API calls 1308->1309 1311 35906c9 1309->1311 1310 359072a 1312 3590739 ExitProcess 1310->1312 1318 3590771 1310->1318 1311->1310 1313 35906fa 3 API calls 1311->1313 1315 3590743 1311->1315 1314 35906eb 1313->1314 1314->1315 1316 35906f9 CreateProcessW 1314->1316 1315->1252 1317 3590736 ExitProcess 1316->1317 1317->1310 1318->1252 1320 35906dc 1319->1320 1321 35906fa 3 API calls 1320->1321 1323 35906eb 1321->1323 1322 359074b 1322->1267 1323->1322 1324 35906f9 CreateProcessW 1323->1324 1325 3590736 ExitProcess 1324->1325 1326 359072a 1325->1326 1327 3590771 1326->1327 1328 3590739 ExitProcess 1326->1328 1327->1267 1330 35906fd CreateProcessW 1329->1330 1331 359072a 1330->1331 1332 3590736 ExitProcess 1330->1332 1333 35906eb 1331->1333 1334 3590739 ExitProcess 1331->1334 1332->1331 1333->1271 1333->1272 1336 3590739 ExitProcess 1335->1336 1409 35905b4 1337->1409 1339 35905ac 1340 3590641 1339->1340 1341 35905cf 1339->1341 1342 359065b 10 API calls 1340->1342 1343 3590601 19 API calls 1341->1343 1345 3590613 1342->1345 1348 35905ea 1343->1348 1344 35906b0 1346 35906d9 5 API calls 1344->1346 1345->1253 1345->1344 1347 35906a8 1345->1347 1355 359069b WriteFile 1345->1355 1352 35906c9 1346->1352 1350 35906bc 7 API calls 1347->1350 1348->1345 1349 359061d 16 API calls 1348->1349 1349->1345 1350->1344 1351 3590739 ExitProcess 1353 35906fa 3 API calls 1352->1353 1356 3590743 1352->1356 1359 359072a 1352->1359 1354 35906eb 1353->1354 1354->1356 1357 35906f9 CreateProcessW 1354->1357 1355->1345 1356->1253 1358 3590736 ExitProcess 1357->1358 1358->1359 1359->1351 1360 3590771 1359->1360 1360->1253 1362 3590620 1361->1362 1454 3590641 1362->1454 1364 359069b WriteFile 1366 359064b 1364->1366 1365 3590627 1365->1364 1365->1366 1367 359065b 10 API calls 1365->1367 1371 35906ac 1365->1371 1366->1364 1369 35906a8 1366->1369 1366->1371 1367->1366 1368 35906d9 5 API calls 1372 35906c9 1368->1372 1370 35906bc 7 API calls 1369->1370 1370->1371 1371->1368 1374 35906fa 3 API calls 1372->1374 1376 3590743 1372->1376 1379 359072a 1372->1379 1373 3590739 ExitProcess 1375 35906eb 1374->1375 1375->1376 1377 35906f9 CreateProcessW 1375->1377 1376->1260 1378 3590736 ExitProcess 1377->1378 1378->1379 1379->1373 1380 3590771 1379->1380 1380->1260 1384 359065e 1381->1384 1382 35906a8 1383 35906bc 7 API calls 1382->1383 1386 35906b0 1383->1386 1384->1382 1385 359069b WriteFile 1384->1385 1385->1384 1387 35906d9 5 API calls 1386->1387 1388 35906c9 1387->1388 1390 35906fa 3 API calls 1388->1390 1392 3590743 1388->1392 1395 359072a 1388->1395 1389 3590739 ExitProcess 1391 35906eb 1390->1391 1391->1392 1393 35906f9 CreateProcessW 1391->1393 1392->1260 1394 3590736 ExitProcess 1393->1394 1394->1395 1395->1389 1396 3590771 1395->1396 1396->1260 1398 35906bf 1397->1398 1399 35906d9 5 API calls 1398->1399 1401 35906c9 1399->1401 1400 359072a 1402 3590739 ExitProcess 1400->1402 1408 3590771 1400->1408 1401->1400 1403 35906fa 3 API calls 1401->1403 1405 3590743 1401->1405 1404 35906eb 1403->1404 1404->1405 1406 35906f9 CreateProcessW 1404->1406 1405->1264 1407 3590736 ExitProcess 1406->1407 1407->1400 1408->1264 1410 35905b7 1409->1410 1434 35905d0 1410->1434 1412 35905bd 1413 3590641 1412->1413 1414 35905cf 1412->1414 1415 359065b 10 API calls 1413->1415 1416 3590601 19 API calls 1414->1416 1417 3590613 1415->1417 1420 35905ea 1416->1420 1417->1339 1419 35906a8 1417->1419 1425 35906b0 1417->1425 1428 359069b WriteFile 1417->1428 1418 35906d9 5 API calls 1424 35906c9 1418->1424 1422 35906bc 7 API calls 1419->1422 1420->1417 1421 359061d 16 API calls 1420->1421 1421->1417 1422->1425 1423 3590739 ExitProcess 1426 35906fa 3 API calls 1424->1426 1429 3590743 1424->1429 1432 359072a 1424->1432 1425->1418 1427 35906eb 1426->1427 1427->1429 1430 35906f9 CreateProcessW 1427->1430 1428->1417 1429->1339 1431 3590736 ExitProcess 1430->1431 1431->1432 1432->1423 1433 3590771 1432->1433 1433->1339 1435 35905d3 1434->1435 1436 3590601 19 API calls 1435->1436 1438 35905ea 1436->1438 1437 3590613 1437->1412 1439 35906a8 1437->1439 1442 359069b WriteFile 1437->1442 1438->1437 1440 359061d 16 API calls 1438->1440 1441 35906bc 7 API calls 1439->1441 1440->1437 1443 35906b0 1441->1443 1442->1437 1444 35906d9 5 API calls 1443->1444 1445 35906c9 1444->1445 1447 35906fa 3 API calls 1445->1447 1449 3590743 1445->1449 1452 359072a 1445->1452 1446 3590739 ExitProcess 1448 35906eb 1447->1448 1448->1449 1450 35906f9 CreateProcessW 1448->1450 1449->1412 1451 3590736 ExitProcess 1450->1451 1451->1452 1452->1446 1453 3590771 1452->1453 1453->1412 1455 3590644 1454->1455 1456 359065b 10 API calls 1455->1456 1458 359064b 1456->1458 1457 35906d9 5 API calls 1462 35906c9 1457->1462 1459 35906a8 1458->1459 1463 35906b0 1458->1463 1466 359069b WriteFile 1458->1466 1460 35906bc 7 API calls 1459->1460 1460->1463 1461 3590739 ExitProcess 1464 35906fa 3 API calls 1462->1464 1467 3590743 1462->1467 1470 359072a 1462->1470 1463->1457 1465 35906eb 1464->1465 1465->1467 1468 35906f9 CreateProcessW 1465->1468 1466->1458 1467->1365 1469 3590736 ExitProcess 1468->1469 1469->1470 1470->1461 1471 3590771 1470->1471 1471->1365

          Callgraph

          • Executed
          • Not Executed
          • Opacity -> Relevance
          • Disassembly available
          callgraph 0 Function_035906D9 17 Function_035906FA 0->17 24 Function_03590736 0->24 28 Function_03590765 0->28 1 Function_0359065B 1->0 1->17 20 Function_035906BC 1->20 1->24 1->28 2 Function_0359015B 3 Function_0359061D 3->0 3->1 10 Function_03590641 3->10 3->17 3->20 3->24 3->28 4 Function_0359041D 8 Function_03590452 4->8 13 Function_035904C5 4->13 19 Function_035904FC 4->19 21 Function_035904B2 4->21 22 Function_03590535 4->22 26 Function_03590436 4->26 27 Function_03590568 4->27 5 Function_03590511 5->22 5->27 6 Function_03590391 7 Function_035905D0 7->0 7->3 11 Function_03590601 7->11 7->17 7->20 7->24 7->28 16 Function_03590479 8->16 8->19 8->21 8->22 25 Function_035907B6 8->25 8->27 9 Function_03590094 10->0 10->1 10->17 10->20 10->24 10->28 11->0 11->3 11->17 11->20 11->24 11->28 12 Function_03590000 13->19 14 Function_03590144 15 Function_03590584 15->0 15->1 15->3 15->11 15->17 15->20 15->24 15->28 29 Function_035905A7 15->29 16->19 16->21 16->22 16->27 17->24 18 Function_0359073D 18->28 19->0 19->1 19->3 19->5 19->11 19->17 19->20 19->22 19->24 19->27 19->28 19->29 20->0 20->17 20->24 20->28 21->13 21->19 21->22 21->27 22->27 23 Function_035905B4 23->0 23->1 23->3 23->7 23->11 23->17 23->20 23->24 23->28 26->8 26->13 26->19 26->21 26->22 26->25 26->27 27->0 27->1 27->3 27->11 27->15 27->17 27->20 27->24 27->28 27->29 29->0 29->1 29->3 29->11 29->17 29->20 29->23 29->24 29->28

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 359061d-359062f call 3590641 4 3590631 0->4 5 3590696-3590697 0->5 7 35906ac-35906b3 4->7 8 3590633-3590635 4->8 6 359069b-35906a6 WriteFile 5->6 9 3590660-3590671 6->9 12 35906b5-35906ba 7->12 10 3590698 8->10 11 3590637-3590638 8->11 23 35906a8-35906b3 call 35906bc 9->23 24 3590673-3590678 9->24 13 359069a 10->13 14 35906be-35906cd call 35906d9 10->14 11->6 15 359063a-3590658 call 359065b 11->15 12->14 13->6 33 35906cf 14->33 34 3590730-3590734 14->34 31 35906bb 15->31 32 359065a-359065e 15->32 23->12 28 359067a 24->28 29 359067f-3590692 24->29 28->29 29->5 31->14 32->9 37 35906d1 33->37 38 3590745-3590748 33->38 39 3590736-359073b ExitProcess 34->39 41 3590743 37->41 42 35906d3-35906ec call 35906fa 37->42 43 359074b-359074d 38->43 41->38 47 3590753-3590755 call 3590765 42->47 52 35906ee-35906ef 42->52 46 3590750-3590751 43->46 46->47 51 3590756-359075c 47->51 51->43 53 359075e-3590762 51->53 52->51 54 35906f1-35906f2 52->54 55 3590763 54->55 56 35906f4-35906f7 54->56 56->46 57 35906f9-3590725 CreateProcessW call 3590736 56->57 59 359072a-359072b 57->59 60 359072d 59->60 61 3590796-359079a 59->61 62 359077f 60->62 63 359072f 60->63 64 359079c 61->64 65 359079e 61->65 68 3590781-3590785 62->68 69 3590787-359078b 62->69 66 35907a0-35907a2 63->66 70 3590731-3590734 63->70 64->66 65->66 67 35907a4-35907ad 65->67 71 35907b2-35907b3 66->71 75 35907af 67->75 76 3590776-3590779 67->76 68->69 73 3590793 68->73 69->66 74 359078d-3590791 69->74 70->39 73->61 74->66 74->73 75->71 76->67 77 359077b 76->77 77->62
          APIs
            • Part of subcall function 03590641: WriteFile.KERNELBASE(03590595,035905AC,00000000,00000000,00000000,?,035905AC,03590595,00000000,00000000,00000000,00000000,03590542,00000050,00000000), ref: 035906A4
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,035906EB,?,035906C9), ref: 03590723
          • ExitProcess.KERNELBASE(00000000,?,0359072A,?,035906EB,?,035906C9,?,?,035906B0,00000000,00000000,00000000,00000000,03590542,00000050), ref: 0359073B
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExitFileWrite
          • String ID:
          • API String ID: 3739231918-0
          • Opcode ID: 2219b463e1ad75681f00be6cf970a009f095b2549c2ca4ec89cbcd8eb8d97093
          • Instruction ID: a388ac316af68f44bd3281a6ea4589299c791bd15403b0ed1eb89087de5839c1
          • Opcode Fuzzy Hash: 2219b463e1ad75681f00be6cf970a009f095b2549c2ca4ec89cbcd8eb8d97093
          • Instruction Fuzzy Hash: 4031DB714083415AFF21EBA4ED809ABFB6EFFC1B50F184D4FA1924B0F2D67585089AA5
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 78 359065b-359065e 80 3590660-3590671 78->80 84 35906a8-35906cd call 35906bc call 35906d9 80->84 85 3590673-3590678 80->85 99 35906cf 84->99 100 3590730-3590734 84->100 86 359067a 85->86 87 359067f-35906a6 WriteFile 85->87 86->87 87->80 101 35906d1 99->101 102 3590745-3590748 99->102 103 3590736-359073b ExitProcess 100->103 104 3590743 101->104 105 35906d3-35906ec call 35906fa 101->105 106 359074b-359074d 102->106 104->102 110 3590753-3590755 call 3590765 105->110 115 35906ee-35906ef 105->115 109 3590750-3590751 106->109 109->110 114 3590756-359075c 110->114 114->106 116 359075e-3590762 114->116 115->114 117 35906f1-35906f2 115->117 118 3590763 117->118 119 35906f4-35906f7 117->119 119->109 120 35906f9-3590725 CreateProcessW call 3590736 119->120 122 359072a-359072b 120->122 123 359072d 122->123 124 3590796-359079a 122->124 125 359077f 123->125 126 359072f 123->126 127 359079c 124->127 128 359079e 124->128 131 3590781-3590785 125->131 132 3590787-359078b 125->132 129 35907a0-35907a2 126->129 133 3590731-3590734 126->133 127->129 128->129 130 35907a4-35907ad 128->130 134 35907b2-35907b3 129->134 138 35907af 130->138 139 3590776-3590779 130->139 131->132 136 3590793 131->136 132->129 137 359078d-3590791 132->137 133->103 136->124 137->129 137->136 138->134 139->130 140 359077b 139->140 140->125
          APIs
          • WriteFile.KERNELBASE(03590595,035905AC,00000000,00000000,00000000,?,035905AC,03590595,00000000,00000000,00000000,00000000,03590542,00000050,00000000), ref: 035906A4
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,035906EB,?,035906C9), ref: 03590723
          • ExitProcess.KERNELBASE(00000000,?,0359072A,?,035906EB,?,035906C9,?,?,035906B0,00000000,00000000,00000000,00000000,03590542,00000050), ref: 0359073B
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExitFileWrite
          • String ID:
          • API String ID: 3739231918-0
          • Opcode ID: 52f94773cee02a91b8a76534dbca9ad721313bffe05402bb0dbf7db9e27b80c2
          • Instruction ID: 08990e216d2d66de75baf84e034c1094dbd1c863baa5160550236fc463178330
          • Opcode Fuzzy Hash: 52f94773cee02a91b8a76534dbca9ad721313bffe05402bb0dbf7db9e27b80c2
          • Instruction Fuzzy Hash: 6121F87140C3411AFF11EF64ED80AAFB769FFC1750F188D0FA192470F2D67485089AA5
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 141 3590641-3590658 call 359065b 145 35906bb 141->145 146 359065a-359065e 141->146 147 35906be-35906cd call 35906d9 145->147 149 3590660-3590671 146->149 159 35906cf 147->159 160 3590730-3590734 147->160 157 35906a8-35906ba call 35906bc 149->157 158 3590673-3590678 149->158 157->147 161 359067a 158->161 162 359067f-35906a6 WriteFile 158->162 163 35906d1 159->163 164 3590745-3590748 159->164 165 3590736-359073b ExitProcess 160->165 161->162 162->149 167 3590743 163->167 168 35906d3-35906ec call 35906fa 163->168 169 359074b-359074d 164->169 167->164 176 3590753-3590755 call 3590765 168->176 183 35906ee-35906ef 168->183 174 3590750-3590751 169->174 174->176 182 3590756-359075c 176->182 182->169 184 359075e-3590762 182->184 183->182 185 35906f1-35906f2 183->185 186 3590763 185->186 187 35906f4-35906f7 185->187 187->174 188 35906f9-3590725 CreateProcessW call 3590736 187->188 190 359072a-359072b 188->190 191 359072d 190->191 192 3590796-359079a 190->192 193 359077f 191->193 194 359072f 191->194 195 359079c 192->195 196 359079e 192->196 199 3590781-3590785 193->199 200 3590787-359078b 193->200 197 35907a0-35907a2 194->197 201 3590731-3590734 194->201 195->197 196->197 198 35907a4-35907ad 196->198 202 35907b2-35907b3 197->202 206 35907af 198->206 207 3590776-3590779 198->207 199->200 204 3590793 199->204 200->197 205 359078d-3590791 200->205 201->165 204->192 205->197 205->204 206->202 207->198 208 359077b 207->208 208->193
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExitFileWrite
          • String ID:
          • API String ID: 3739231918-0
          • Opcode ID: ec687970cd5e863647ec71913091ed8e96e7369ce3460fad760adeb2de576102
          • Instruction ID: be18a90a81c0875415adef63a0ba19f29675c7142deee6115aa00d97e4ff9757
          • Opcode Fuzzy Hash: ec687970cd5e863647ec71913091ed8e96e7369ce3460fad760adeb2de576102
          • Instruction Fuzzy Hash: C621E5714083415AFF11EB64ED80EAFF7AAFFC1750F188D4EB192470B1E6B485089BA2
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 209 359041d-3590444 ExitProcess call 3590436 call 3590452 215 3590497-35904ba 209->215 216 3590447-359044c 209->216 219 35904bc-35904bd 215->219 220 3590521-3590531 call 3590535 215->220 221 359044f-3590469 216->221 222 35904b4-35904ba call 35904c5 216->222 224 35904bf-35904d5 219->224 225 3590524-3590531 219->225 228 3590538-3590566 call 3590568 220->228 230 35904da-35904e7 CreateFileW call 35904fc 221->230 236 359046b-3590471 221->236 222->219 222->220 224->230 225->228 238 35904ec-35904fa 230->238 242 3590473-3590496 call 35904b2 236->242 243 35904e5 236->243 242->215 243->238 247 35904e7 call 35904fc 243->247 247->238
          APIs
          • ExitProcess.KERNELBASE(0359040B), ref: 0359041D
            • Part of subcall function 03590436: CreateFileW.KERNELBASE(?,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 035904E2
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: CreateExitFileProcess
          • String ID:
          • API String ID: 2838702978-0
          • Opcode ID: efe1ed8f55356101e5bf09f79fefa5b617200724d0e1dc7d3505e1a42206a642
          • Instruction ID: 7eda48b9df39938bcd7c8f2bf111d1aea7f85a95d55ca510666a1bd7aa7516c8
          • Opcode Fuzzy Hash: efe1ed8f55356101e5bf09f79fefa5b617200724d0e1dc7d3505e1a42206a642
          • Instruction Fuzzy Hash: 9921F3A544D3C09FFB21E7607E9A795BE64BF52600F1C8D8BC1C94F1F3D2A591068356
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 253 35906bc-35906cd call 35906d9 259 35906cf 253->259 260 3590730-3590734 253->260 261 35906d1 259->261 262 3590745-3590748 259->262 263 3590736-359073b ExitProcess 260->263 264 3590743 261->264 265 35906d3-35906ec call 35906fa 261->265 266 359074b-359074d 262->266 264->262 270 3590753-3590755 call 3590765 265->270 275 35906ee-35906ef 265->275 269 3590750-3590751 266->269 269->270 274 3590756-359075c 270->274 274->266 276 359075e-3590762 274->276 275->274 277 35906f1-35906f2 275->277 278 3590763 277->278 279 35906f4-35906f7 277->279 279->269 280 35906f9-3590725 CreateProcessW call 3590736 279->280 282 359072a-359072b 280->282 283 359072d 282->283 284 3590796-359079a 282->284 285 359077f 283->285 286 359072f 283->286 287 359079c 284->287 288 359079e 284->288 291 3590781-3590785 285->291 292 3590787-359078b 285->292 289 35907a0-35907a2 286->289 293 3590731-3590734 286->293 287->289 288->289 290 35907a4-35907ad 288->290 294 35907b2-35907b3 289->294 298 35907af 290->298 299 3590776-3590779 290->299 291->292 296 3590793 291->296 292->289 297 359078d-3590791 292->297 293->263 296->284 297->289 297->296 298->294 299->290 300 359077b 299->300 300->285
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExit
          • String ID:
          • API String ID: 126409537-0
          • Opcode ID: 8231ee5b18957d3648bc57fc975aece0ec9b201bd18f6de92825622497ed5a63
          • Instruction ID: 72e860348e8bf1c2658940f42325f604d4d2a8321f5717e50f8492d389764e16
          • Opcode Fuzzy Hash: 8231ee5b18957d3648bc57fc975aece0ec9b201bd18f6de92825622497ed5a63
          • Instruction Fuzzy Hash: 011123744083010AFF20EB64ED949AAFB6AFFC1760F088D4BE0568B0F2D6348504DEA5
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 301 35906fa-3590723 CreateProcessW 303 359072a-359072b 301->303 304 3590725 call 3590736 301->304 305 359072d 303->305 306 3590796-359079a 303->306 304->303 307 359077f 305->307 308 359072f 305->308 309 359079c 306->309 310 359079e 306->310 313 3590781-3590785 307->313 314 3590787-359078b 307->314 311 35907a0-35907a2 308->311 315 3590731-359073b ExitProcess 308->315 309->311 310->311 312 35907a4-35907ad 310->312 316 35907b2-35907b3 311->316 321 35907af 312->321 322 3590776-3590779 312->322 313->314 318 3590793 313->318 314->311 319 359078d-3590791 314->319 318->306 319->311 319->318 321->316 322->312 324 359077b 322->324 324->307
          APIs
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,035906EB,?,035906C9), ref: 03590723
            • Part of subcall function 03590736: ExitProcess.KERNELBASE(00000000,?,0359072A,?,035906EB,?,035906C9,?,?,035906B0,00000000,00000000,00000000,00000000,03590542,00000050), ref: 0359073B
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExit
          • String ID:
          • API String ID: 126409537-0
          • Opcode ID: cc04445753e1ca6f8d30d3611a3f9dac58b0c92c2cdc5dffd7fbd729de51b4ed
          • Instruction ID: d2cdc23c6d0becb27a31f014c278e293dc4ebb4cc283433c1603ee3b8c304a61
          • Opcode Fuzzy Hash: cc04445753e1ca6f8d30d3611a3f9dac58b0c92c2cdc5dffd7fbd729de51b4ed
          • Instruction Fuzzy Hash: 220124A980425211FF30E768AC807FAA769FFD0770FCC8C0B98D6460E6D16881C38F69
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 325 35906d9-35906ec call 35906fa 330 35906ee-35906ef 325->330 331 3590753-3590755 call 3590765 325->331 333 35906f1-35906f2 330->333 334 3590756-359075c 330->334 331->334 337 3590763 333->337 338 35906f4-35906f7 333->338 335 359074b-359074d 334->335 336 359075e-3590762 334->336 339 3590750-3590751 335->339 338->339 340 35906f9-359072b CreateProcessW call 3590736 338->340 339->331 343 359072d 340->343 344 3590796-359079a 340->344 345 359077f 343->345 346 359072f 343->346 347 359079c 344->347 348 359079e 344->348 351 3590781-3590785 345->351 352 3590787-359078b 345->352 349 35907a0-35907a2 346->349 353 3590731-359073b ExitProcess 346->353 347->349 348->349 350 35907a4-35907ad 348->350 354 35907b2-35907b3 349->354 359 35907af 350->359 360 3590776-3590779 350->360 351->352 356 3590793 351->356 352->349 357 359078d-3590791 352->357 356->344 357->349 357->356 359->354 360->350 362 359077b 360->362 362->345
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExit
          • String ID:
          • API String ID: 126409537-0
          • Opcode ID: ab6099e50a1536c03818295e56c65e109917f17f6d534d6b5d930f748458d395
          • Instruction ID: a2c9de0cddba48224672ef247516dd0cbcd7af8843484a96d8f7848196b9f31a
          • Opcode Fuzzy Hash: ab6099e50a1536c03818295e56c65e109917f17f6d534d6b5d930f748458d395
          • Instruction Fuzzy Hash: BA01A7B580430059FF21E764BCC4DEBA76DFFD1760F088C4BA1568B0A1D57485159EA5
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 363 3590568-3590579 call 3590584 367 359057b-3590580 363->367 368 35905e0 363->368 372 3590583-359058e 367->372 373 35905f7-35905f9 367->373 369 35905e2-35905e5 call 3590601 368->369 370 3590606-3590614 call 359061d 368->370 387 35905e6-35905ea 369->387 388 359067f-35906a6 WriteFile 370->388 389 3590616 370->389 376 3590595-35905c9 372->376 377 3590590 call 35905a7 372->377 378 35905fc-35905fe 373->378 385 35905cc 376->385 386 3590641 376->386 377->376 382 3590600-3590604 378->382 383 3590665-3590671 378->383 382->370 395 35906a8-35906ba call 35906bc 383->395 396 3590673-3590678 383->396 390 35905cf-35905df 385->390 391 3590643 385->391 393 3590644-3590658 call 359065b 386->393 392 35905eb-35905f6 387->392 403 3590660-3590664 388->403 397 3590618-3590621 389->397 398 359067d 389->398 399 35905e5-35905ea call 3590601 390->399 391->393 400 35905f8-35905f9 392->400 401 359065d-359065e 392->401 413 35906bb 393->413 414 359065a 393->414 415 35906be-35906cd call 35906d9 395->415 396->388 404 359067a 396->404 397->401 398->388 399->392 400->378 401->403 403->383 404->388 413->415 414->401 422 35906cf 415->422 423 3590730-3590734 415->423 424 35906d1 422->424 425 3590745-3590748 422->425 426 3590736-359073b ExitProcess 423->426 427 3590743 424->427 428 35906d3-35906ec call 35906fa 424->428 429 359074b-359074d 425->429 427->425 433 3590753-3590755 call 3590765 428->433 438 35906ee-35906ef 428->438 432 3590750-3590751 429->432 432->433 437 3590756-359075c 433->437 437->429 439 359075e-3590762 437->439 438->437 440 35906f1-35906f2 438->440 441 3590763 440->441 442 35906f4-35906f7 440->442 442->432 443 35906f9-3590725 CreateProcessW call 3590736 442->443 445 359072a-359072b 443->445 446 359072d 445->446 447 3590796-359079a 445->447 448 359077f 446->448 449 359072f 446->449 450 359079c 447->450 451 359079e 447->451 454 3590781-3590785 448->454 455 3590787-359078b 448->455 452 35907a0-35907a2 449->452 456 3590731-3590734 449->456 450->452 451->452 453 35907a4-35907ad 451->453 457 35907b2-35907b3 452->457 461 35907af 453->461 462 3590776-3590779 453->462 454->455 459 3590793 454->459 455->452 460 359078d-3590791 455->460 456->426 459->447 460->452 460->459 461->457 462->453 463 359077b 462->463 463->448
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6cb26fb462a4e7a56d5bd34d7f52b819fa4031b4ecdc0bd7ec62caa5b8ea0279
          • Instruction ID: 5bd38578b0ca6be2f615be3fe8ffea193c4220fec14e923d9fafb5dbd483fdff
          • Opcode Fuzzy Hash: 6cb26fb462a4e7a56d5bd34d7f52b819fa4031b4ecdc0bd7ec62caa5b8ea0279
          • Instruction Fuzzy Hash: 7131D46104C3C26FEB11EB64DD45B6ABF79BFC2600F188D8FB1814B0F2D7659608C6A6
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 464 35904fc-359050d LoadLibraryW call 3590511 467 359050f-3590514 464->467 468 3590574-3590575 464->468 471 3590520-3590566 call 3590535 call 3590568 467->471 469 35905eb-35905f6 468->469 470 3590577-3590579 468->470 474 35905f8-35905f9 469->474 475 359065d-359065e 469->475 478 359057b-3590580 470->478 479 35905e0 470->479 480 35905fc-35905fe 474->480 476 3590660-3590664 475->476 487 3590665-3590671 476->487 488 3590583-359058e 478->488 489 35905f7-35905f9 478->489 481 35905e2-35905e5 call 3590601 479->481 482 3590606-3590614 call 359061d 479->482 486 3590600-3590604 480->486 480->487 508 35905e6-35905ea 481->508 503 359067f-35906a6 WriteFile 482->503 510 3590616 482->510 486->482 496 35906a8-35906ba call 35906bc 487->496 497 3590673-3590678 487->497 493 3590595-35905c9 488->493 494 3590590 call 35905a7 488->494 489->480 505 35905cc 493->505 506 3590641 493->506 494->493 525 35906be-35906cd call 35906d9 496->525 502 359067a 497->502 497->503 502->503 503->476 511 35905cf-35905df 505->511 512 3590643 505->512 514 3590644-3590658 call 359065b 506->514 508->469 517 3590618-3590621 510->517 518 359067d 510->518 519 35905e5-35905ea call 3590601 511->519 512->514 531 35906bb 514->531 532 359065a 514->532 517->475 518->503 519->469 537 35906cf 525->537 538 3590730-3590734 525->538 531->525 532->475 539 35906d1 537->539 540 3590745-3590748 537->540 541 3590736-359073b ExitProcess 538->541 542 3590743 539->542 543 35906d3-35906ec call 35906fa 539->543 544 359074b-359074d 540->544 542->540 548 3590753-3590755 call 3590765 543->548 553 35906ee-35906ef 543->553 547 3590750-3590751 544->547 547->548 552 3590756-359075c 548->552 552->544 554 359075e-3590762 552->554 553->552 555 35906f1-35906f2 553->555 556 3590763 555->556 557 35906f4-35906f7 555->557 557->547 558 35906f9-3590725 CreateProcessW call 3590736 557->558 560 359072a-359072b 558->560 561 359072d 560->561 562 3590796-359079a 560->562 563 359077f 561->563 564 359072f 561->564 565 359079c 562->565 566 359079e 562->566 569 3590781-3590785 563->569 570 3590787-359078b 563->570 567 35907a0-35907a2 564->567 571 3590731-3590734 564->571 565->567 566->567 568 35907a4-35907ad 566->568 572 35907b2-35907b3 567->572 576 35907af 568->576 577 3590776-3590779 568->577 569->570 574 3590793 569->574 570->567 575 359078d-3590791 570->575 571->541 574->562 575->567 575->574 576->572 577->568 578 359077b 577->578 578->563
          APIs
          • LoadLibraryW.KERNEL32(035904EC), ref: 035904FC
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: LibraryLoad
          • String ID:
          • API String ID: 1029625771-0
          • Opcode ID: 8868eae662a106cdb646c2f7e18250b443e8750b8790f485fee2df9c43d03648
          • Instruction ID: 5570213f8b2c5ca2e9d1c03db7f6bae6eaa15488453a4eb4a0a380eeb1582059
          • Opcode Fuzzy Hash: 8868eae662a106cdb646c2f7e18250b443e8750b8790f485fee2df9c43d03648
          • Instruction Fuzzy Hash: D231AF9044C3C62EEF12E774AE5AB69BF34BF82600F1889CFE5854F1F3E75592059216
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 579 35905b4-35905c9 call 35905d0 583 35905cc 579->583 584 3590641 579->584 585 35905cf-35905df 583->585 586 3590643 583->586 587 3590644-3590658 call 359065b 584->587 588 35905e5-35905f6 call 3590601 585->588 586->587 593 35906bb 587->593 594 359065a 587->594 597 359065d-359065e 588->597 599 35905f8-35905fe 588->599 595 35906be-35906cd call 35906d9 593->595 594->597 613 35906cf 595->613 614 3590730-3590734 595->614 598 3590660-3590664 597->598 603 3590665-3590671 598->603 599->603 604 3590600-3590614 call 359061d 599->604 610 35906a8-35906ba call 35906bc 603->610 611 3590673-3590678 603->611 616 359067f-35906a6 WriteFile 604->616 628 3590616 604->628 610->595 615 359067a 611->615 611->616 618 35906d1 613->618 619 3590745-3590748 613->619 620 3590736-359073b ExitProcess 614->620 615->616 616->598 623 3590743 618->623 624 35906d3-35906ec call 35906fa 618->624 625 359074b-359074d 619->625 623->619 633 3590753-3590755 call 3590765 624->633 642 35906ee-35906ef 624->642 631 3590750-3590751 625->631 634 3590618-3590621 628->634 635 359067d 628->635 631->633 641 3590756-359075c 633->641 634->597 635->616 641->625 643 359075e-3590762 641->643 642->641 644 35906f1-35906f2 642->644 645 3590763 644->645 646 35906f4-35906f7 644->646 646->631 647 35906f9-3590725 CreateProcessW call 3590736 646->647 649 359072a-359072b 647->649 650 359072d 649->650 651 3590796-359079a 649->651 652 359077f 650->652 653 359072f 650->653 654 359079c 651->654 655 359079e 651->655 658 3590781-3590785 652->658 659 3590787-359078b 652->659 656 35907a0-35907a2 653->656 660 3590731-3590734 653->660 654->656 655->656 657 35907a4-35907ad 655->657 661 35907b2-35907b3 656->661 665 35907af 657->665 666 3590776-3590779 657->666 658->659 663 3590793 658->663 659->656 664 359078d-3590791 659->664 660->620 663->651 664->656 664->663 665->661 666->657 667 359077b 666->667 667->652
          APIs
          • WriteFile.KERNELBASE(03590595,035905AC,00000000,00000000,00000000,?,035905AC,03590595,00000000,00000000,00000000,00000000,03590542,00000050,00000000), ref: 035906A4
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: FileWrite
          • String ID:
          • API String ID: 3934441357-0
          • Opcode ID: d4d463e9b9c9ed4a6d9070107b554e4f8b46087707d5ad8be43035a7d0fae483
          • Instruction ID: ac584019a36173187177dc5d42da50acae71a7decdd444a9a068d0195002c61f
          • Opcode Fuzzy Hash: d4d463e9b9c9ed4a6d9070107b554e4f8b46087707d5ad8be43035a7d0fae483
          • Instruction Fuzzy Hash: F521C2714083866AEF11EB54DD41F6BBB7EFFC1A00F148D4EB1814A0F1E771D60886A5
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 668 3590436-359043c call 35907b6 671 3590443-3590444 668->671 672 359043e call 3590452 668->672 673 3590497-35904ba 671->673 674 3590447-359044c 671->674 672->671 677 35904bc-35904bd 673->677 678 3590521-3590531 call 3590535 673->678 679 359044f-3590469 674->679 680 35904b4-35904ba call 35904c5 674->680 682 35904bf-35904d5 677->682 683 3590524-3590531 677->683 686 3590538-3590566 call 3590568 678->686 688 35904da-35904e7 CreateFileW call 35904fc 679->688 694 359046b-3590471 679->694 680->677 680->678 682->688 683->686 696 35904ec-35904fa 688->696 700 3590473-3590496 call 35904b2 694->700 701 35904e5 694->701 700->673 701->696 705 35904e7 call 35904fc 701->705 705->696
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 61ae07613ca3af85ebbeb61143e63dc21584a846e3e7d22e5f8d459513989261
          • Instruction ID: 713595afbc5510a3ff0cc23020d5c5dab4cb186591b8dcd976df92786e3ddb5f
          • Opcode Fuzzy Hash: 61ae07613ca3af85ebbeb61143e63dc21584a846e3e7d22e5f8d459513989261
          • Instruction Fuzzy Hash: F421FEA544D3C09BFB21E7606E9A795AE647F52600F1C8D8BC2C94F0F3D2A5900A8356
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 711 3590452-3590469 call 35907b6 call 3590479 718 359046b-3590471 711->718 719 35904da-35904e7 CreateFileW call 35904fc 711->719 722 3590473-35904ba call 35904b2 718->722 723 35904e5 718->723 724 35904ec-35904fa 719->724 734 35904bc-35904bd 722->734 735 3590521-3590531 call 3590535 722->735 723->724 725 35904e7 call 35904fc 723->725 725->724 737 35904bf-35904d5 734->737 738 3590524-3590531 734->738 739 3590538-3590566 call 3590568 735->739 737->719 738->739
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: f77c244c3d486fb03562c8d25b96186bef36284cc2151fd8e061b0db95356622
          • Instruction ID: 4c84ebb186e29b7771b146f6ce1ec8e803b6075f11a6e6b2a20eb2b25670938d
          • Opcode Fuzzy Hash: f77c244c3d486fb03562c8d25b96186bef36284cc2151fd8e061b0db95356622
          • Instruction Fuzzy Hash: 3D11DFA548C7C19BFB21E7606E9A795AE547F52600F0D8E8F92C94F1F396A491068212
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 747 35905d0-35905f6 call 3590601 753 35905f8-35905fe 747->753 754 359065d-359065e 747->754 758 3590600-3590614 call 359061d 753->758 759 3590665-3590671 753->759 755 3590660-3590664 754->755 755->759 767 359067f-35906a6 WriteFile 758->767 771 3590616 758->771 763 35906a8-35906cd call 35906bc call 35906d9 759->763 764 3590673-3590678 759->764 783 35906cf 763->783 784 3590730-3590734 763->784 766 359067a 764->766 764->767 766->767 767->755 774 3590618-3590621 771->774 775 359067d 771->775 774->754 775->767 785 35906d1 783->785 786 3590745-3590748 783->786 787 3590736-359073b ExitProcess 784->787 788 3590743 785->788 789 35906d3-35906ec call 35906fa 785->789 790 359074b-359074d 786->790 788->786 794 3590753-3590755 call 3590765 789->794 799 35906ee-35906ef 789->799 793 3590750-3590751 790->793 793->794 798 3590756-359075c 794->798 798->790 800 359075e-3590762 798->800 799->798 801 35906f1-35906f2 799->801 802 3590763 801->802 803 35906f4-35906f7 801->803 803->793 804 35906f9-3590725 CreateProcessW call 3590736 803->804 806 359072a-359072b 804->806 807 359072d 806->807 808 3590796-359079a 806->808 809 359077f 807->809 810 359072f 807->810 811 359079c 808->811 812 359079e 808->812 815 3590781-3590785 809->815 816 3590787-359078b 809->816 813 35907a0-35907a2 810->813 817 3590731-3590734 810->817 811->813 812->813 814 35907a4-35907ad 812->814 818 35907b2-35907b3 813->818 822 35907af 814->822 823 3590776-3590779 814->823 815->816 820 3590793 815->820 816->813 821 359078d-3590791 816->821 817->787 820->808 821->813 821->820 822->818 823->814 824 359077b 823->824 824->809
          APIs
          • WriteFile.KERNELBASE(03590595,035905AC,00000000,00000000,00000000,?,035905AC,03590595,00000000,00000000,00000000,00000000,03590542,00000050,00000000), ref: 035906A4
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,035906EB,?,035906C9), ref: 03590723
          • ExitProcess.KERNELBASE(00000000,?,0359072A,?,035906EB,?,035906C9,?,?,035906B0,00000000,00000000,00000000,00000000,03590542,00000050), ref: 0359073B
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExitFileWrite
          • String ID:
          • API String ID: 3739231918-0
          • Opcode ID: 19abb07f664a7bfaba3f6f8eb50ada1189bdad441aab37431a0cbd58e181a6b3
          • Instruction ID: c534bdf77578dd21a7107718f0754f159e85f42d6eedfe42ca4b9ef4b32f7c6a
          • Opcode Fuzzy Hash: 19abb07f664a7bfaba3f6f8eb50ada1189bdad441aab37431a0cbd58e181a6b3
          • Instruction Fuzzy Hash: D8115A310083466EEB11EB54DD42F6BBBBAFBC1B40F148D1AB1914A0B1EB71D5188AA6
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 825 35904b2-35904ba call 35904c5 829 35904bc-35904bd 825->829 830 3590521-3590531 call 3590535 825->830 832 35904bf-35904fa CreateFileW call 35904fc 829->832 833 3590524-3590531 829->833 834 3590538-3590566 call 3590568 830->834 833->834
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 044512656f4faad84f0e68a17e213e01ba95ba8bd1124d19ebffed9e9a8f504a
          • Instruction ID: 82fd0aeaefc0214a9d621069e13201b590ecbbe41c86086efcfdd0f98a86a5cf
          • Opcode Fuzzy Hash: 044512656f4faad84f0e68a17e213e01ba95ba8bd1124d19ebffed9e9a8f504a
          • Instruction Fuzzy Hash: 7F11C2A14483C05AEF21EB74AE66B597F607F42700F1D9D8FD6884F1F3976092009306
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 848 3590479-35904ba call 35904b2 854 35904bc-35904bd 848->854 855 3590521-3590531 call 3590535 848->855 857 35904bf-35904fa CreateFileW call 35904fc 854->857 858 3590524-3590531 854->858 859 3590538-3590566 call 3590568 855->859 858->859
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 22ff3c69a1d6db522987fddcf5c865c980180f00d3f97433ac5809caae55fb62
          • Instruction ID: d6e1036da8018ec296a5587e2c98e569066e0c5a59239dd671f91792a9c99520
          • Opcode Fuzzy Hash: 22ff3c69a1d6db522987fddcf5c865c980180f00d3f97433ac5809caae55fb62
          • Instruction Fuzzy Hash: 0D01C0A544C3C09BE721D3602D9AB91AF647F52700F0D8A8FA2C84E0E392A451058312
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
            • Part of subcall function 0359061D: WriteFile.KERNELBASE(03590595,035905AC,00000000,00000000,00000000,?,035905AC,03590595,00000000,00000000,00000000,00000000,03590542,00000050,00000000), ref: 035906A4
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,035906EB,?,035906C9), ref: 03590723
          • ExitProcess.KERNELBASE(00000000,?,0359072A,?,035906EB,?,035906C9,?,?,035906B0,00000000,00000000,00000000,00000000,03590542,00000050), ref: 0359073B
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: Process$CreateExitFileWrite
          • String ID:
          • API String ID: 3739231918-0
          • Opcode ID: ab915c4d70da9f5e50a6ad1d4eaedeb20efed64c161fa0c5c37ea620a5e12464
          • Instruction ID: ad32ac9ba72b17168b596cbeb3c812af6201d274508e05841a149472ddd420ec
          • Opcode Fuzzy Hash: ab915c4d70da9f5e50a6ad1d4eaedeb20efed64c161fa0c5c37ea620a5e12464
          • Instruction Fuzzy Hash: A0F0FB710083466FEB01DF14DC41F6BBBA9FBD5B40F088D1EB1944A0B5D771D9188AA2
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileW.KERNELBASE(?,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 035904E2
            • Part of subcall function 035904FC: LoadLibraryW.KERNEL32(035904EC), ref: 035904FC
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: CreateFileLibraryLoad
          • String ID:
          • API String ID: 2049390123-0
          • Opcode ID: 6b58b7bea42888d99f99c58fd6019879577d5c0d287c541efadc83ec232d07e8
          • Instruction ID: 0ac075e59fd6db2b1a440c593ff088712ae5fea95f866c491d21f002803cb9a2
          • Opcode Fuzzy Hash: 6b58b7bea42888d99f99c58fd6019879577d5c0d287c541efadc83ec232d07e8
          • Instruction Fuzzy Hash: AFE012745C83816AF531D7741D9AF96AE653F81B04F09CD8FB3C89F1E2CAA150058212
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • ExitProcess.KERNELBASE(00000000,?,0359072A,?,035906EB,?,035906C9,?,?,035906B0,00000000,00000000,00000000,00000000,03590542,00000050), ref: 0359073B
          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
          • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction Fuzzy Hash:
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000002.00000002.498899257.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction ID: eb1a53a64a9d587a7ff7e6823d7b023f881bebd3fa9c4067d4fb702a2273ee26
          • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction Fuzzy Hash: 7FD05E352015028FD704DB04D980E12F37BFFD4220B14C665D0054B669D330EC92CA90
          Uniqueness

          Uniqueness Score: -1.00%