Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kL1iGwj1Iu.exe

Overview

General Information

Sample name:kL1iGwj1Iu.exe
renamed because original name is a hash value
Original sample name:7bb53203df909b0a4e2eb51d3ab8ea3245af998a74e42c663079c8ce9588a0f1.exe
Analysis ID:1428550
MD5:33366b21fa290d88a4c4e695959fe48f
SHA1:40daec9ff6beb43a2fa4e40d349dcefb718ed6ff
SHA256:7bb53203df909b0a4e2eb51d3ab8ea3245af998a74e42c663079c8ce9588a0f1
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • kL1iGwj1Iu.exe (PID: 6664 cmdline: "C:\Users\user\Desktop\kL1iGwj1Iu.exe" MD5: 33366B21FA290D88A4C4E695959FE48F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: kL1iGwj1Iu.exeAvira: detected
Source: kL1iGwj1Iu.exeReversingLabs: Detection: 82%
Source: kL1iGwj1Iu.exeVirustotal: Detection: 67%Perma Link
Source: kL1iGwj1Iu.exeJoe Sandbox ML: detected
Source: kL1iGwj1Iu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: kL1iGwj1Iu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: kL1iGwj1Iu.exe, 00000000.00000000.1654186321.00000000004C4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameA vs kL1iGwj1Iu.exe
Source: kL1iGwj1Iu.exe, 00000000.00000002.1656056615.000000000092E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs kL1iGwj1Iu.exe
Source: kL1iGwj1Iu.exeBinary or memory string: OriginalFilenameA vs kL1iGwj1Iu.exe
Source: kL1iGwj1Iu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\kL1iGwj1Iu.exe.logJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeMutant created: NULL
Source: kL1iGwj1Iu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: kL1iGwj1Iu.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: kL1iGwj1Iu.exeReversingLabs: Detection: 82%
Source: kL1iGwj1Iu.exeVirustotal: Detection: 67%
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: kL1iGwj1Iu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: kL1iGwj1Iu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeMemory allocated: E60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeMemory allocated: 4B30000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exe TID: 6744Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\kL1iGwj1Iu.exeMemory allocated: page read and write | page guardJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
kL1iGwj1Iu.exe83%ReversingLabsWin32.Trojan.Marsilia
kL1iGwj1Iu.exe68%VirustotalBrowse
kL1iGwj1Iu.exe100%AviraHEUR/AGEN.1308440
kL1iGwj1Iu.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428550
Start date and time:2024-04-19 07:44:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 56s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:kL1iGwj1Iu.exe
renamed because original name is a hash value
Original Sample Name:7bb53203df909b0a4e2eb51d3ab8ea3245af998a74e42c663079c8ce9588a0f1.exe
Detection:MAL
Classification:mal60.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 8
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\kL1iGwj1Iu.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):525
Entropy (8bit):5.259753436570609
Encrypted:false
SSDEEP:12:Q3LaJU2C9XAn10U29xtUz1B0U2uk71K6xhk70Ug+9pfu9tv:MLF2CpI329Iz52VMzffuT
MD5:BAF1CCDBBF490EC9AD4777DEA18A088E
SHA1:182D70FB02C352E77B48E8659283D448143AE92B
SHA-256:7712762A17AA3E6D3F233930BF94E91878F87A9C1C3010AC5346A4E615197E81
SHA-512:53B86FAC03DD2FA75D140143C9B1D7F49FC1E9605DAE1B894910848864D153F239676B0AF37E5666EA9E606EED8F3BF180846ADC6DB82B7840F3C1AC2EFCDEA8
Malicious:false
Reputation:moderate, very likely benign file
Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):4.91981177576184
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:kL1iGwj1Iu.exe
File size:12'288 bytes
MD5:33366b21fa290d88a4c4e695959fe48f
SHA1:40daec9ff6beb43a2fa4e40d349dcefb718ed6ff
SHA256:7bb53203df909b0a4e2eb51d3ab8ea3245af998a74e42c663079c8ce9588a0f1
SHA512:47b3a0ac04d44fb27093affd397890b31c6b120f2fa794238d7667fedd67e989c916d76837e2871eab2e73255902ac7e23ef1483722b8f55aba81695831a8c53
SSDEEP:192:/LJ4+BpatVKnlYJLdLTTtPaErDTs+842Ei9:/LJ4wcNxLTUErDTs+8RE
TLSH:2342086043D16161CA9D77F646A3AA156FA6FE2CCA23230B047473255872037CF33AAE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$2.e............................N0... ...@....@.. ....................................@................................
Icon Hash:03070d0d0d070703
Entrypoint:0x40304e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x65FD3224 [Fri Mar 22 07:24:20 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x30000x4b.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x18a0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x10540x120093cc420aeb218031105362b9cb8f410fFalse0.4767795138888889data4.990399549846944IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x40000x18a00x1a009a64bf674f44a2f6e372e7d75935d7d3False0.3381911057692308data4.461633575227599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000xc0x20037ceb1a7ca831327e1ff56592301b74fFalse0.04296875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x43680x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.4929078014184397
RT_ICON0x47d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.3098030018761726
RT_GROUP_ICON0x58780x22data1.0
RT_VERSION0x41180x24cdata0.4744897959183674
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:07:44:54
Start date:19/04/2024
Path:C:\Users\user\Desktop\kL1iGwj1Iu.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\kL1iGwj1Iu.exe"
Imagebase:0x4c0000
File size:12'288 bytes
MD5 hash:33366B21FA290D88A4C4E695959FE48F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:8.7%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:9
    Total number of Limit Nodes:0
    execution_graph 246 cba607 247 cba638 FormatMessageW 246->247 249 cba6c2 247->249 242 cba586 243 cba5ac ShellExecuteExW 242->243 245 cba5c8 243->245 250 cba564 252 cba586 ShellExecuteExW 250->252 253 cba5c8 252->253

    Callgraph

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 cba607-cba667 2 cba66a-cba6bc FormatMessageW 0->2 4 cba6c2-cba6eb 2->4
    APIs
    • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 00CBA6BA
    Memory Dump Source
    • Source File: 00000000.00000002.1656313774.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_cba000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID: FormatMessage
    • String ID:
    • API String ID: 1306739567-0
    • Opcode ID: db77b6766cb6592edf172d53bae0d7072c24dfdcbd0441d130ac4570895cc4b7
    • Instruction ID: 8e594a6ca8a63b2c020a7cd31cbb165b9fff1cd7f163cdb46d368832fd2e3f02
    • Opcode Fuzzy Hash: db77b6766cb6592edf172d53bae0d7072c24dfdcbd0441d130ac4570895cc4b7
    • Instruction Fuzzy Hash: B2318F7554E3C45FD3038B618C61A66BFB4EF47610F0A80CBD884CF6A3D624691AC7B2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 6 cba564-cba5aa 8 cba5af-cba5b8 6->8 9 cba5ac 6->9 10 cba5ba-cba5da ShellExecuteExW 8->10 11 cba5f9-cba5fe 8->11 9->8 14 cba5dc-cba5f8 10->14 15 cba600-cba605 10->15 11->10 15->14
    APIs
    • ShellExecuteExW.SHELL32(?), ref: 00CBA5C0
    Memory Dump Source
    • Source File: 00000000.00000002.1656313774.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_cba000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID:
    • API String ID: 587946157-0
    • Opcode ID: 4151b122a60661281fe8f491ca4deebe705299639134a05c18139989b4e98279
    • Instruction ID: 1ed8e750e54ba58686b7c4d92d38cd319cb3fc24f963f08bfe8e0d4068068180
    • Opcode Fuzzy Hash: 4151b122a60661281fe8f491ca4deebe705299639134a05c18139989b4e98279
    • Instruction Fuzzy Hash: 331190755097809FDB12CF25DC94B52BFA8AF06220F0884EAED85CB652D264E948CB62
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 27 cba66a-cba6bc FormatMessageW 29 cba6c2-cba6eb 27->29
    APIs
    • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 00CBA6BA
    Memory Dump Source
    • Source File: 00000000.00000002.1656313774.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_cba000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID: FormatMessage
    • String ID:
    • API String ID: 1306739567-0
    • Opcode ID: e8642e43e364867315266c9e8437d542820def1f8d75acea2c21004019a07917
    • Instruction ID: 0ee70a7968812bd6aa8bad68a7daa2b0cdf31ea438532d84d76be92976d91771
    • Opcode Fuzzy Hash: e8642e43e364867315266c9e8437d542820def1f8d75acea2c21004019a07917
    • Instruction Fuzzy Hash: 8E01B171A00200AFD310DF16DC86B76FBE8FB88A20F14811AEC089BB41D731B915CBE1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 17 cba586-cba5aa 18 cba5af-cba5b8 17->18 19 cba5ac 17->19 20 cba5ba-cba5c2 ShellExecuteExW 18->20 21 cba5f9-cba5fe 18->21 19->18 22 cba5c8-cba5da 20->22 21->20 24 cba5dc-cba5f8 22->24 25 cba600-cba605 22->25 25->24
    APIs
    • ShellExecuteExW.SHELL32(?), ref: 00CBA5C0
    Memory Dump Source
    • Source File: 00000000.00000002.1656313774.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_cba000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID:
    • API String ID: 587946157-0
    • Opcode ID: 35f4c9db708e2fea1ca3461eac71a0331f99bb6d1c903d5571e4f897136d69b3
    • Instruction ID: d7538b96af2d0dcbdc3bf3f68cc09a75b9d7dd595c33f02cca34e57484e2ab66
    • Opcode Fuzzy Hash: 35f4c9db708e2fea1ca3461eac71a0331f99bb6d1c903d5571e4f897136d69b3
    • Instruction Fuzzy Hash: FF019271A016408FDB20CF26D9847A6FBD8EF04320F08C4AADD99CB651D274EA48CB62
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 31 ee0006-ee0081 33 ee0088 31->33 37 ee008a call 5e0606 33->37 38 ee008a call 5e05e0 33->38 34 ee0090-ee0096 35 ee009d 34->35 36 ee00a5-ee00a7 35->36 37->34 38->34
    Memory Dump Source
    • Source File: 00000000.00000002.1656503746.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_ee0000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cea4d32325035374b19293cc9eca9447b795eb3581dccb08702b8c690d54646e
    • Instruction ID: f01dd439d76829c73e08b302375a5767bc72f0e9d377480fac3366c31021cdae
    • Opcode Fuzzy Hash: cea4d32325035374b19293cc9eca9447b795eb3581dccb08702b8c690d54646e
    • Instruction Fuzzy Hash: 8E11656164F3D05FC70753345879A993FB24E5705430A44CBC882CF6E7E91D490ECBA2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 39 5e05e0-5e0620 42 5e0626-5e0643 39->42
    Memory Dump Source
    • Source File: 00000000.00000002.1655968744.00000000005E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5e0000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a67bb3c424f8901c6da182781c8cd07ba33b6e5efc17c5096e3e2c63ba29da85
    • Instruction ID: 0233f5e791f2d9b346d7dcd3d471008e0c08611a789708e6d25dfc722e58697f
    • Opcode Fuzzy Hash: a67bb3c424f8901c6da182781c8cd07ba33b6e5efc17c5096e3e2c63ba29da85
    • Instruction Fuzzy Hash: 67018BB65097C05FD7118B05AC40862FFB8EF4A630709C4AFEC4987752D1656909CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 43 5e0606-5e0620 44 5e0626-5e0643 43->44
    Memory Dump Source
    • Source File: 00000000.00000002.1655968744.00000000005E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5e0000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c53a955d42425f95a5fa145101553571252af870d2b3d576cdec96359b5e507d
    • Instruction ID: e15ae8e345e37a2078b7db32ba9ae9d812bf40cbb0f53c21a0072b14e4bf8584
    • Opcode Fuzzy Hash: c53a955d42425f95a5fa145101553571252af870d2b3d576cdec96359b5e507d
    • Instruction Fuzzy Hash: 5DE092B6A006404F9750CF0AFC81462F7D8EB88630708C07FDC0D8BB11D275B908CEA6
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 45 ee0070-ee0088 51 ee008a call 5e0606 45->51 52 ee008a call 5e05e0 45->52 48 ee0090-ee009d 50 ee00a5-ee00a7 48->50 51->48 52->48
    Memory Dump Source
    • Source File: 00000000.00000002.1656503746.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_ee0000_kL1iGwj1Iu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3a52bb7bee26f9268bec91b24141f6dfed3a8f1ea8802630f0e34f6bf7ce4a64
    • Instruction ID: cb5e4830c6c61500f14041109e026326aa706e5c63487969972a184e5141d467
    • Opcode Fuzzy Hash: 3a52bb7bee26f9268bec91b24141f6dfed3a8f1ea8802630f0e34f6bf7ce4a64
    • Instruction Fuzzy Hash: A5D05E3634522897CE047778F518BDE33A6AB841993008414EE068B788DF289E0587C9
    Uniqueness

    Uniqueness Score: -1.00%