Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PROFOMA INVOICE-2024-0419 .exe

Overview

General Information

Sample name:PROFOMA INVOICE-2024-0419 .exe
Analysis ID:1428857
MD5:e67096a9183b74fbe73ac6ca18d56399
SHA1:ffef2a71110febbd27a8de341dacbbdc5b601368
SHA256:5f62afbd7dfbf7b9a6727b6ba3809d10bb491fe13361ec598628354926cc4762
Tags:exe
Infos:

Detection

PureLog Stealer
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Internet Provider seen in connection with other malware
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3274703681.000000001B440000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.2.PROFOMA INVOICE-2024-0419 .exe.1b440000.10.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.PROFOMA INVOICE-2024-0419 .exe.12e68bb8.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.PROFOMA INVOICE-2024-0419 .exe.12ec8c28.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.PROFOMA INVOICE-2024-0419 .exe.12e88bf0.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 9 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: PROFOMA INVOICE-2024-0419 .exeAvira: detected
                      Source: PROFOMA INVOICE-2024-0419 .exeReversingLabs: Detection: 57%
                      Source: PROFOMA INVOICE-2024-0419 .exeJoe Sandbox ML: detected
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: 8cb03cfb-750e-41f5-9111-95ff37f34e9b<Module>costura.costura.dll.compressedcostura.dotnetzip.dll.compressedcostura.dotnetzip.pdb.compressedcostura.protobuf-net.dll.compressedNlswidup.g.resourcesaR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources% source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: Nlswidup.pdb source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: Nlswidup.pdb( source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: @costura.dotnetzip.pdb.compressed source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: /home/jskinner/.release_build/build/gn/lto_win_x64/subl.pdb source: PROFOMA INVOICE-2024-0419 .exe
                      Source: Binary string: costura.dotnetzip.pdb.compressed2 source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: unknownDNS query: name: pukrilug.duckdns.org
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 150.114.84.125:7702
                      Source: Joe Sandbox ViewASN Name: KDDIKDDICORPORATIONJP KDDIKDDICORPORATIONJP
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownDNS traffic detected: queries for: pukrilug.duckdns.org
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalG3CodeSigningECCSHA3842021CA1.crt0
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalG3CodeSigningECCSHA3842021CA1.crl0N
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalG3CodeSigningECCSHA3842021CA1.crl0
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://ocsp.digicert.com0A
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://ocsp.digicert.com0C
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://ocsp.digicert.com0W
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://ocsp.digicert.com0X
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: http://www.digicert.com/CPS0
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                      System Summary

                      barindex
                      Source: PROFOMA INVOICE-2024-0419 .exe, Program.csLarge array initialization: Main: array initializer size 851020
                      Source: initial sampleStatic PE information: Filename: PROFOMA INVOICE-2024-0419 .exe
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeCode function: 0_2_00007FF848FD1C410_2_00007FF848FD1C41
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNlswidup.dll" vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000000.2028015937.00000000006B4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEgttcbp.exe" vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNlswidup.dll" vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNlswidup.dll" vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exeBinary or memory string: OriginalFilenameEgttcbp.exe" vs PROFOMA INVOICE-2024-0419 .exe
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, rn2hy1KD9WvlWJ206dY.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, rn2hy1KD9WvlWJ206dY.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, rn2hy1KD9WvlWJ206dY.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, rn2hy1KD9WvlWJ206dY.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, rn2hy1KD9WvlWJ206dY.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, rn2hy1KD9WvlWJ206dY.csCryptographic APIs: 'CreateDecryptor'
                      Source: classification engineClassification label: mal96.troj.evad.winEXE@1/0@2/1
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeMutant created: NULL
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeMutant created: \Sessions\1\BaseNamedObjects\3773f709858a89ca
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: PROFOMA INVOICE-2024-0419 .exeReversingLabs: Detection: 57%
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: --launch-or-new-window
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: bodycy--staysgibrightgraysgiverylightgraysgilightgraysgimediumgraydimgraysgiverydarkgraysgidarkgraylightslategraydarkslategrayoverlaykOverlaydisplayposition.ypxtexture_boxsand boxUnixSkPixelRef::lockPixelsMutexaccent_tint_indexInvalid background palette index/IndexwbxPackages/Rails/Ruby on Rails.sublime-syntaxPackages/Rails/Ruby Haml.sublime-syntaxPackages/ASP/HTML-ASP.sublime-syntaxPackages/JavaScript/JSON.sublime-syntaxPackages/JSON/JSON.sublime-syntaxPackages/Rails/HAML.sublime-syntaxPackages/Rails/Ruby (Rails).sublime-syntaxPackages/Java/Java Server Pages (JSP).sublime-syntaxPackages/Java/HTML (JSP).sublime-syntaxPackages/ASP/HTML (ASP).sublime-syntax#%02x%02x%02x<dt>Color:</dt><dd>0xSkModeColorFilter: color: 0xposition.xswrwsk_throwtable_rowtree_rowUninitialized rowsnowlightyellowgreenyellowlightgoldenrodyellowannotation_popup_windowhtml_popup_windowauto_complete_window--launch-or-new-window--new-windowright_shadowleft_shadowtop_shadowbottom_shadowwarm shadowLowhoneydewsvlvgvperuqulukuiuhugueuLu
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: /Installed Packages
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: classkeyword length must be 1 - 79 characterspspatternscannot parse partitionszh-Hanssmstoo many length or distance symbolsWidth is too large for libpng to process pixelsToo much data in IDAT chunksisinvalid stored block lengthsbad code lengthssettingsgray cliffspearly gatescapturesbeginCapturesendCaptures/resfileTypesexcludeTrailingNewlinesTimesValid palette required for paletted images/Packages/Installed Packagestoo many codescsbsConsolasAntiAliasMissing IHDR before pHYsMissing IHDR before oFFsApplication was compiled with png.h from libpng-%.20sApplication is running with png.c from libpng-%.20s%s:%-3d %slibpng error: %slibpng warning: %s mode: %sconvolveAlpha: %srrect-blurrects-blurtrsrfilter_font_descriptorbad Image DescriptorInvalid operatorzlib failed to initialize compressormirrorzlib memory errorbuffer errorunknown errorUnknown errorzlib version errorzlib failed to initialize compressor -- version errorzlib failed to initialize compressor -- mem errorzlib failed to initialize compressor -- stream errorUnknown zlib errorCRC errorNo ErrorDecompression ErrorWrite ErrorParse ErrorRead Errorshadow_colorviewport_colorborder_colorlink_colormonospace_colormonospace_background_colorborder-right-colorborder-left-colorborder-colorborder-top-colorborder-bottom-colorbackground-colorOverrideColorkXormr
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: --help
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: --help
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: brvarregular RegularSkArithmeticMode_scalarkClearsq!q../../../third_party/skia/src/ports/SkFontMgr_win_dw.cpp../../../third_party/skia/src/ports/SkTypeface_win_dw.cpp../../../third_party/skia/src/core/SkDraw.cpp../../../third_party/skia/src/core/SkBitmapController.cpp../../../third_party/skia/src/images/SkPNGImageEncoder.cpp../../../third_party/skia/src/core/SkRasterClip.cpp../../../third_party/skia/src/core/SkAAClip.cpp../../../third_party/skia/src/core/SkMipMap.cpp../../../third_party/skia/src/core/SkPath.cpp../../../third_party/skia/src/core/SkPathMeasure.cpp../../../third_party/skia/src/core/SkLinearBitmapPipeline.cpp../../../third_party/skia/src/core/SkDevice.cpp../../../third_party/skia/src/core/SkTextBlob.cpp../../../third_party/skia/src/core/SkData.cpp../../../third_party/skia/src/core/SkBlitter_ARGB32.cppborder-topmargin-toppadding-topkDstATopkSrcATop.%x%d.tmpclamp--helppapayawhipnowrapbitmapmipmaptab_overlap%ptomatosogainsboroSetting negative gamma to zeroZeromolokoindigofoeoborosybrownsandybrownsaddlebrownaz-Latnjv-Latnsu-Latnms-LatnkColorBurnfar horizontab_close_buttoncrimsonmaroonlightsalmondarksalmonsgisalmonUnknown exceptioninvalid string positionCall to NULL write functionCall to NULL read functionsaturationSaturationtext-decorationInvalid OperationsymbolIndexTransformationsymbolTransformationkExclusion/Options/Session.sublime-sessionPNG file corrupted by ASCII conversion--versionlemonchiffonnnknmoccasinultrathinultra-thinultra thinbox_margincontent_margininner_marginbeginplainAttempted to set both read_data_fn and write_data_fn intext-alignkLightenlinenbad SOS lenbad DNL lenkDarkenInvalid tokenyellowgreenforestgreenlightgreenlawngreendarkgreenmediumspringgreendarkolivegreenlimegreenpalegreenlightseagreenmediumseagreendarkseagreenkScreenhiddenbnlightcyandarkcyancarmel tanromankDstInkSrcInplummediumMediumIgnoreTransformIgnoreXformborder-bottommargin-bottompadding-bottomkmmax_margin_trimsystemlist-itemremoutofmem
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: brvarregular RegularSkArithmeticMode_scalarkClearsq!q../../../third_party/skia/src/ports/SkFontMgr_win_dw.cpp../../../third_party/skia/src/ports/SkTypeface_win_dw.cpp../../../third_party/skia/src/core/SkDraw.cpp../../../third_party/skia/src/core/SkBitmapController.cpp../../../third_party/skia/src/images/SkPNGImageEncoder.cpp../../../third_party/skia/src/core/SkRasterClip.cpp../../../third_party/skia/src/core/SkAAClip.cpp../../../third_party/skia/src/core/SkMipMap.cpp../../../third_party/skia/src/core/SkPath.cpp../../../third_party/skia/src/core/SkPathMeasure.cpp../../../third_party/skia/src/core/SkLinearBitmapPipeline.cpp../../../third_party/skia/src/core/SkDevice.cpp../../../third_party/skia/src/core/SkTextBlob.cpp../../../third_party/skia/src/core/SkData.cpp../../../third_party/skia/src/core/SkBlitter_ARGB32.cppborder-topmargin-toppadding-topkDstATopkSrcATop.%x%d.tmpclamp--helppapayawhipnowrapbitmapmipmaptab_overlap%ptomatosogainsboroSetting negative gamma to zeroZeromolokoindigofoeoborosybrownsandybrownsaddlebrownaz-Latnjv-Latnsu-Latnms-LatnkColorBurnfar horizontab_close_buttoncrimsonmaroonlightsalmondarksalmonsgisalmonUnknown exceptioninvalid string positionCall to NULL write functionCall to NULL read functionsaturationSaturationtext-decorationInvalid OperationsymbolIndexTransformationsymbolTransformationkExclusion/Options/Session.sublime-sessionPNG file corrupted by ASCII conversion--versionlemonchiffonnnknmoccasinultrathinultra-thinultra thinbox_margincontent_margininner_marginbeginplainAttempted to set both read_data_fn and write_data_fn intext-alignkLightenlinenbad SOS lenbad DNL lenkDarkenInvalid tokenyellowgreenforestgreenlightgreenlawngreendarkgreenmediumspringgreendarkolivegreenlimegreenpalegreenlightseagreenmediumseagreendarkseagreenkScreenhiddenbnlightcyandarkcyancarmel tanromankDstInkSrcInplummediumMediumIgnoreTransformIgnoreXformborder-bottommargin-bottompadding-bottomkmmax_margin_trimsystemlist-itemremoutofmem
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: --add
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: idgdAutohintedIgnoring extra png_read_update_info() call; row buffer not reallocatedmediumvioletredpalevioletredindianreddarkredorangeredUndefinedconnect_to_namedFrame setup faileddecode image failedbase64 decode failedInvalid sRGB rendering intent specifiedInvalid number of transparent colors specifiedInvalid number of histogram entries specifiedInvalid sBIT depth specifiedInvalid image color type specifiedInvalid filter type specifiedInvalid compression type specifiedInvalid interlace type specifiedfaded--add" could not be used with direct write, using gdi instead
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: --launch-or-new-window: Only open a new window if the application is open
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: -a or --add: Add folders to the current window
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: -h or --help: Show help (this message) and exit
                      Source: PROFOMA INVOICE-2024-0419 .exeString found in binary or memory: -h or --help: Show help (this message) and exit
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic file information: File size 3473984 > 1048576
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: 8cb03cfb-750e-41f5-9111-95ff37f34e9b<Module>costura.costura.dll.compressedcostura.dotnetzip.dll.compressedcostura.dotnetzip.pdb.compressedcostura.protobuf-net.dll.compressedNlswidup.g.resourcesaR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources% source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: Nlswidup.pdb source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: Nlswidup.pdb( source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.dotnetzip.pdb.compressed source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: @costura.dotnetzip.pdb.compressed source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: /home/jskinner/.release_build/build/gn/lto_win_x64/subl.pdb source: PROFOMA INVOICE-2024-0419 .exe
                      Source: Binary string: costura.dotnetzip.pdb.compressed2 source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, rn2hy1KD9WvlWJ206dY.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, rn2hy1KD9WvlWJ206dY.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: PROFOMA INVOICE-2024-0419 .exe, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.28c0000.1.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.28c0000.1.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.28c0000.1.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.28c0000.1.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.28c0000.1.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b440000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.133f2340.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3274703681.000000001B440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PROFOMA INVOICE-2024-0419 .exe PID: 5572, type: MEMORYSTR
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: 0xA913349D [Fri Nov 21 02:42:37 2059 UTC]
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeCode function: 0_2_00007FF848F21A90 pushad ; ret 0_2_00007FF848F21BB1
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeCode function: 0_2_00007FF848F21AF3 pushad ; ret 0_2_00007FF848F21BB1
                      Source: PROFOMA INVOICE-2024-0419 .exeStatic PE information: section name: .text entropy: 7.9991319058900325
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, rn2hy1KD9WvlWJ206dY.csHigh entropy of concatenated method names: 'QVyRihSDS5H9jEYh93B', 'rIxvRZSmOcoYwCEo9h1', 'P41WUD6gFP', 'M3pVQ4Star4TvYTcBRY', 'DbQxYqSGeLWOM0dLMl0', 'p8IGGqSBcV80qv4F7je', 'EW24ukSNv7oeS2ysydx', 'GmU6wlSwtdRHUjRI8w8', 'HTvqHMSrP8gx9ChqmWj', 'dbNRv1SROqdmOku1Il3'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'AWrNtO9IxrcwrTSBRUJ'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, alfaphWjcdsBgJhWXq2.csHigh entropy of concatenated method names: 'd0wM2IfUn1', 'S5nMZOiRQp', 'hnIMIAqHZJ', 'XKSMvmH4u6', 'jHBM0lYUuD', 'BOKMCjA5gV', 'LnUMqWlwOD', 'T4AegrgQKX', 'lojMxvltcR', 'XXjM9kJpeY'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, RPaZPHW33lAsijJP1L4.csHigh entropy of concatenated method names: 'BdjWwdcH5c', 'b3hWrTD0Pq', 'YsgWRuRRMZ', 'U5TWTB0kCj', 'MwGWl7gf3y', 'ootWYOEj8w', 'etYWc6bpSu', 'CtvWo7FTBw', 'dMGWQgZ0XV', 'zNyWJcKWLI'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, eIheL0QOjKp3BVsrm4.csHigh entropy of concatenated method names: 'V8mjGUqk8', 'RbqzWXDb8', 'sJI5aYe2DA', 'DSB55NUV5T', 'd0k5pIYZ3R', 'NHC5VObwvf', 'NrV5F2t3jU', 'Tq35OubvSW', 'ksI5bfIpJM', 'KLl5dW3Rj7'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, rn2hy1KD9WvlWJ206dY.csHigh entropy of concatenated method names: 'QVyRihSDS5H9jEYh93B', 'rIxvRZSmOcoYwCEo9h1', 'P41WUD6gFP', 'M3pVQ4Star4TvYTcBRY', 'DbQxYqSGeLWOM0dLMl0', 'p8IGGqSBcV80qv4F7je', 'EW24ukSNv7oeS2ysydx', 'GmU6wlSwtdRHUjRI8w8', 'HTvqHMSrP8gx9ChqmWj', 'dbNRv1SROqdmOku1Il3'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'AWrNtO9IxrcwrTSBRUJ'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, alfaphWjcdsBgJhWXq2.csHigh entropy of concatenated method names: 'd0wM2IfUn1', 'S5nMZOiRQp', 'hnIMIAqHZJ', 'XKSMvmH4u6', 'jHBM0lYUuD', 'BOKMCjA5gV', 'LnUMqWlwOD', 'T4AegrgQKX', 'lojMxvltcR', 'XXjM9kJpeY'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, RPaZPHW33lAsijJP1L4.csHigh entropy of concatenated method names: 'BdjWwdcH5c', 'b3hWrTD0Pq', 'YsgWRuRRMZ', 'U5TWTB0kCj', 'MwGWl7gf3y', 'ootWYOEj8w', 'etYWc6bpSu', 'CtvWo7FTBw', 'dMGWQgZ0XV', 'zNyWJcKWLI'
                      Source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, eIheL0QOjKp3BVsrm4.csHigh entropy of concatenated method names: 'V8mjGUqk8', 'RbqzWXDb8', 'sJI5aYe2DA', 'DSB55NUV5T', 'd0k5pIYZ3R', 'NHC5VObwvf', 'NrV5F2t3jU', 'Tq35OubvSW', 'ksI5bfIpJM', 'KLl5dW3Rj7'
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL@E
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeMemory allocated: 1AB70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: E2FrFadU1HgFSGp3yyp
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1:en-CH:VMware|VIRTUAL|A M I|Xen
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1:en-CH:Microsoft|VMWare|Virtual
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen2
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|Xen
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0Microsoft|VMWare|Virtual
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWare
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3275059500.000000001B80D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG
                      Source: PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002F84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeQueries volume information: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e68bb8.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12ec8c28.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e88bf0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12ec8c28.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e88bf0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e68bb8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e68bb8.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12ec8c28.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e88bf0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.1b330000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12ec8c28.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e88bf0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.12e68bb8.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PROFOMA INVOICE-2024-0419 .exe.13248cd0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      2
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping111
                      Security Software Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Command and Scripting Interpreter
                      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Disable or Modify Tools
                      LSASS Memory2
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager32
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Obfuscated Files or Information
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
                      Software Packing
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Timestomp
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      PROFOMA INVOICE-2024-0419 .exe58%ReversingLabsByteCode-MSIL.Trojan.PureLogs
                      PROFOMA INVOICE-2024-0419 .exe100%AviraTR/Dropper.Gen
                      PROFOMA INVOICE-2024-0419 .exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      pukrilug.duckdns.org
                      150.114.84.125
                      truetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://github.com/mgravell/protobuf-netPROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          https://github.com/mgravell/protobuf-netiPROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/14436606/23354PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-netJPROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/2152978/23354PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013504000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, PROFOMA INVOICE-2024-0419 .exe, 00000000.00000002.3270171709.00000000028C0000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    150.114.84.125
                                    pukrilug.duckdns.orgUnited States
                                    2516KDDIKDDICORPORATIONJPtrue
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1428857
                                    Start date and time:2024-04-19 18:13:05 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 53s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:4
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:PROFOMA INVOICE-2024-0419 .exe
                                    Detection:MAL
                                    Classification:mal96.troj.evad.winEXE@1/0@2/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • VT rate limit hit for: PROFOMA INVOICE-2024-0419 .exe
                                    No simulations
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    KDDIKDDICORPORATIONJPJdnjRc1VGX.elfGet hashmaliciousMiraiBrowse
                                    • 157.119.196.248
                                    ul5RjxwWTK.elfGet hashmaliciousUnknownBrowse
                                    • 157.108.11.213
                                    Q2bIN963Kt.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 124.209.205.11
                                    H6ccnU1094.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 163.60.253.113
                                    BzmhHwFpCV.elfGet hashmaliciousMiraiBrowse
                                    • 27.85.62.254
                                    dPFRrhKTeG.elfGet hashmaliciousUnknownBrowse
                                    • 59.227.19.51
                                    KSRRrEMt1w.elfGet hashmaliciousMiraiBrowse
                                    • 118.152.119.248
                                    ZOHH8muwjh.elfGet hashmaliciousMiraiBrowse
                                    • 210.233.116.12
                                    E3kpuuuOfy.elfGet hashmaliciousMiraiBrowse
                                    • 36.13.173.228
                                    enEQvjUlGl.elfGet hashmaliciousMiraiBrowse
                                    • 59.215.140.201
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.082812195946691
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:PROFOMA INVOICE-2024-0419 .exe
                                    File size:3'473'984 bytes
                                    MD5:e67096a9183b74fbe73ac6ca18d56399
                                    SHA1:ffef2a71110febbd27a8de341dacbbdc5b601368
                                    SHA256:5f62afbd7dfbf7b9a6727b6ba3809d10bb491fe13361ec598628354926cc4762
                                    SHA512:a9c966b7de89cbc1b0d9e00b075c649b98cdcc62932d1c33d17a66927f9ab070f5be93d25647ccbdf3d3d95772890673309de91caf25d96a9c9683b858131812
                                    SSDEEP:49152:vlrCzPOWWP+yTLTAF2OfTNdzswF12TRrj13xMtlDp37lLVVJPc3FWlTcRi/Mf:vlGzyBApT2nGDp37lLVVJk3Fz8a
                                    TLSH:41F5BF03B6A285F8D04DC430C74A9A57AE2174CB0E39F56F1AC1162D2FBABB49F5B315
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....4............"...0..............,... ...@....@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x402c86
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xA913349D [Fri Nov 21 02:42:37 2059 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dl, bh
                                    adc byte ptr [eax], al
                                    pop ds
                                    mov ecx, dword ptr [eax]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], al
                                    in al, dx
                                    mov ecx, 5F555475h
                                    mov bh, 3Fh
                                    jl 00007F0E2C6D0FD4h
                                    scasb
                                    inc ebx
                                    jnbe 00007F0E2C6D108Dh
                                    mov ah, byte ptr [edx]
                                    and ch, byte ptr [eax]
                                    or byte ptr [edx], ah
                                    add byte ptr [edx], 00000062h
                                    mov eax, dword ptr [202080A0h]
                                    or cl, byte ptr [eax+4Ah]
                                    pop edx
                                    pop ebx
                                    mov edx, BBBBBBBBh
                                    dec ebx
                                    add dword ptr [ebx], ecx
                                    push eax
                                    inc esp
                                    or al, 4Ah
                                    inc eax
                                    dec edx
                                    dec edx
                                    adc al, A4h
                                    inc esp
                                    test edi, ebx
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2c340x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x564.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x2c180x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xd08e00xd0a0090048ed4dde2c30f17322d9592de1a1fFalse0.9972522843019772data7.9991319058900325IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xd40000x5640x6007c6815b8cc56193d03d813e806a3086bFalse0.3977864583333333data3.9275460876162915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xd60000xc0x20039b4098c26cd3734d2f4c68f6df7044dFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xd40900x2d4data0.43232044198895025
                                    RT_MANIFEST0xd43740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 19, 2024 18:13:57.659176111 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:13:58.674482107 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:00.690093994 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:04.705638885 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:12.705630064 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:23.723253012 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:24.736934900 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:26.752650023 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:30.768172026 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:38.783761024 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:49.800148964 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:50.799354076 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:52.799355984 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:14:56.799343109 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:04.814977884 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:15.988133907 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:17.002768993 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:19.002576113 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:23.002454042 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:31.002434015 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:42.019378901 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:43.033862114 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:45.049294949 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:49.064976931 CEST497057702192.168.2.5150.114.84.125
                                    Apr 19, 2024 18:15:57.080621958 CEST497057702192.168.2.5150.114.84.125
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 19, 2024 18:13:57.517519951 CEST5447853192.168.2.51.1.1.1
                                    Apr 19, 2024 18:13:57.654295921 CEST53544781.1.1.1192.168.2.5
                                    Apr 19, 2024 18:15:15.847146988 CEST6367053192.168.2.51.1.1.1
                                    Apr 19, 2024 18:15:15.987189054 CEST53636701.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 19, 2024 18:13:57.517519951 CEST192.168.2.51.1.1.10xe975Standard query (0)pukrilug.duckdns.orgA (IP address)IN (0x0001)false
                                    Apr 19, 2024 18:15:15.847146988 CEST192.168.2.51.1.1.10x381eStandard query (0)pukrilug.duckdns.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 19, 2024 18:13:57.654295921 CEST1.1.1.1192.168.2.50xe975No error (0)pukrilug.duckdns.org150.114.84.125A (IP address)IN (0x0001)false
                                    Apr 19, 2024 18:15:15.987189054 CEST1.1.1.1192.168.2.50x381eNo error (0)pukrilug.duckdns.org150.114.84.125A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:18:13:55
                                    Start date:19/04/2024
                                    Path:C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe"
                                    Imagebase:0x5e0000
                                    File size:3'473'984 bytes
                                    MD5 hash:E67096A9183B74FBE73AC6CA18D56399
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.3274703681.000000001B440000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3274205812.000000001B330000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3271394645.0000000013248000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3271394645.0000000012B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.3270275022.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:4.8%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:21
                                      Total number of Limit Nodes:2
                                      execution_graph 5361 7ff848f21168 5363 7ff848f2a370 5361->5363 5362 7ff848f2a41d 5363->5362 5364 7ff848f2a4d5 VirtualProtect 5363->5364 5365 7ff848f2a50e 5364->5365 5366 7ff848f21e8e 5369 7ff848f21168 5366->5369 5368 7ff848f21e1a 5369->5368 5371 7ff848f2a370 5369->5371 5370 7ff848f2a41d 5370->5368 5371->5370 5372 7ff848f2a4d5 VirtualProtect 5371->5372 5373 7ff848f2a50e 5372->5373 5373->5368 5374 7ff848f21160 5375 7ff848f21165 5374->5375 5376 7ff848f2a41d 5375->5376 5377 7ff848f2a4d5 VirtualProtect 5375->5377 5378 7ff848f2a50e 5377->5378 5379 7ff848f21db5 5380 7ff848f21dbd 5379->5380 5381 7ff848f21168 VirtualProtect 5380->5381 5382 7ff848f21df7 5380->5382 5381->5382
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275870926.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848fd0000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H$H
                                      • API String ID: 0-136785262
                                      • Opcode ID: 6f84f149c2650642ab6346dcb96b7e932eebc65976c446b437f091587cc50bd7
                                      • Instruction ID: 0ba9be91f6610fa437869e23ec3ea70bbbf22fcff32beb20929bca949de4b5f8
                                      • Opcode Fuzzy Hash: 6f84f149c2650642ab6346dcb96b7e932eebc65976c446b437f091587cc50bd7
                                      • Instruction Fuzzy Hash: 6DD28031F1CD4B0FF7A5A76C145523956D2EFA8680F59457AC20EC36DAEF28EC064788
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275557493.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848f20000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f124394efbb718e8e4fabcaa5f72b78ff683363616ca6b852bc5d44b99530488
                                      • Instruction ID: 519aef987331d8f830e057b8a3b9cdae87a9a1eb3c8798df0f7116459cf693cc
                                      • Opcode Fuzzy Hash: f124394efbb718e8e4fabcaa5f72b78ff683363616ca6b852bc5d44b99530488
                                      • Instruction Fuzzy Hash: 1B514831B0CA494FE748FB6CA80A6BD77D1EB99360F00427ED44EC32D2CF26A8458785
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 519 7ff848fd3145-7ff848fd31c4 523 7ff848fd31e5 519->523 524 7ff848fd31c6-7ff848fd31d3 519->524 526 7ff848fd35ae-7ff848fd35ba 523->526 524->523 527 7ff848fd31d5-7ff848fd31e3 524->527 529 7ff848fd35c0-7ff848fd35c3 526->529 530 7ff848fd31ea-7ff848fd31ed 526->530 527->523 532 7ff848fd35c5-7ff848fd35e3 529->532 533 7ff848fd35ea-7ff848fd35f0 529->533 534 7ff848fd323c-7ff848fd323f 530->534 535 7ff848fd31ef-7ff848fd31f2 530->535 532->533 539 7ff848fd35f2-7ff848fd3602 533->539 540 7ff848fd3609-7ff848fd3610 533->540 541 7ff848fd3241-7ff848fd3244 534->541 542 7ff848fd328e-7ff848fd3291 534->542 536 7ff848fd31f4-7ff848fd3212 535->536 537 7ff848fd3219-7ff848fd3224 535->537 536->537 537->526 562 7ff848fd322a-7ff848fd3230 537->562 539->540 547 7ff848fd3246-7ff848fd3264 541->547 548 7ff848fd326b-7ff848fd3276 541->548 544 7ff848fd32d6-7ff848fd32d9 542->544 545 7ff848fd3293-7ff848fd3296 542->545 549 7ff848fd3328-7ff848fd332b 544->549 550 7ff848fd32db-7ff848fd32de 544->550 553 7ff848fd32bd-7ff848fd32ca 545->553 554 7ff848fd3298-7ff848fd32b6 545->554 547->548 548->526 568 7ff848fd327c-7ff848fd3289 548->568 556 7ff848fd332d-7ff848fd3330 549->556 557 7ff848fd337a-7ff848fd337d 549->557 560 7ff848fd3305-7ff848fd3310 550->560 561 7ff848fd32e0-7ff848fd32fe 550->561 585 7ff848fd32d1 553->585 554->553 566 7ff848fd3357-7ff848fd3362 556->566 567 7ff848fd3332-7ff848fd3350 556->567 570 7ff848fd33c3-7ff848fd33c6 557->570 571 7ff848fd337f-7ff848fd3382 557->571 560->526 589 7ff848fd3316-7ff848fd3323 560->589 561->560 575 7ff848fd3237 562->575 566->526 593 7ff848fd3368-7ff848fd3375 566->593 567->566 568->526 576 7ff848fd3415-7ff848fd3418 570->576 577 7ff848fd33c8-7ff848fd33cb 570->577 572 7ff848fd3384-7ff848fd33a2 571->572 573 7ff848fd33a9-7ff848fd33be 571->573 572->573 573->526 575->526 581 7ff848fd345e-7ff848fd3461 576->581 582 7ff848fd341a-7ff848fd341d 576->582 587 7ff848fd33f2-7ff848fd33fd 577->587 588 7ff848fd33cd-7ff848fd33eb 577->588 594 7ff848fd34a7-7ff848fd34aa 581->594 595 7ff848fd3463-7ff848fd3466 581->595 591 7ff848fd3444-7ff848fd3459 582->591 592 7ff848fd341f-7ff848fd343d 582->592 585->526 587->526 607 7ff848fd3403-7ff848fd3410 587->607 588->587 589->526 591->526 592->591 593->526 598 7ff848fd34f0-7ff848fd34f3 594->598 599 7ff848fd34ac-7ff848fd34ad 594->599 604 7ff848fd348d-7ff848fd34a2 595->604 605 7ff848fd3468-7ff848fd3486 595->605 609 7ff848fd34f5-7ff848fd34f8 598->609 610 7ff848fd3536-7ff848fd3539 598->610 606 7ff848fd34ae-7ff848fd34af 599->606 604->526 605->604 615 7ff848fd34d6-7ff848fd34eb 606->615 616 7ff848fd34b1-7ff848fd34bc 606->616 607->526 618 7ff848fd351f-7ff848fd3534 609->618 619 7ff848fd34fa-7ff848fd3518 609->619 620 7ff848fd357c-7ff848fd357f 610->620 621 7ff848fd353b 610->621 615->526 616->606 631 7ff848fd34be-7ff848fd34cf 616->631 618->526 619->618 625 7ff848fd35a6-7ff848fd35a7 620->625 626 7ff848fd3581-7ff848fd359f 620->626 630 7ff848fd353c-7ff848fd353e 621->630 625->526 626->625 635 7ff848fd3565-7ff848fd357a 630->635 636 7ff848fd3540-7ff848fd354b 630->636 631->615 635->526 636->630 645 7ff848fd354d-7ff848fd355e 636->645 645->635
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275870926.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848fd0000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1c16f6432eeab65b557812ced2b17fb6d8c9f80858782e49cba0d50b2042766e
                                      • Instruction ID: d4384fb13a2fee32155ceb38ff13cadeb53899e26dd6a8c3f87c20b6d7cc171b
                                      • Opcode Fuzzy Hash: 1c16f6432eeab65b557812ced2b17fb6d8c9f80858782e49cba0d50b2042766e
                                      • Instruction Fuzzy Hash: 62E15B71E1CD5B5EE6AAB32C102227D16C3EFD52D0F5901BAD24FC22D7EF1DA8025689
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275870926.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848fd0000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e801c2a060c6d96413c7dca3eb4dfbf32c7c367388aa0efc88b0615cccd8a3de
                                      • Instruction ID: a1bff7d93e8325dcf1c41eb00fb4e6867f65e274b480ca4c7fd5e24efdfc31a7
                                      • Opcode Fuzzy Hash: e801c2a060c6d96413c7dca3eb4dfbf32c7c367388aa0efc88b0615cccd8a3de
                                      • Instruction Fuzzy Hash: C7315D31F1CD4A5FF695F72C146623956C2EFA8680F55017AC50EC36DAEF28E8064789
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275870926.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848fd0000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f3658f3eb98cd6e1868356e3aee052c5540605d02ec7d8a920da61bdeddc7659
                                      • Instruction ID: e5260ae8792a108d930e3798afa32fcc05d3f7054ad7a1d4faa415231c6551f8
                                      • Opcode Fuzzy Hash: f3658f3eb98cd6e1868356e3aee052c5540605d02ec7d8a920da61bdeddc7659
                                      • Instruction Fuzzy Hash: 13314731B1CD4A0FF699F72C141523966C2EFA8690F59057AD20EC32DAEF28EC064788
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275870926.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848fd0000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b9bad354a375afe12c938e8d729ce190ad13f746f5616e2e6e4ee6b3e85d452a
                                      • Instruction ID: 0964b7ec41dae7d2c20fae3af508ae2c9c7bc72ab942ab23f26c75678c45132a
                                      • Opcode Fuzzy Hash: b9bad354a375afe12c938e8d729ce190ad13f746f5616e2e6e4ee6b3e85d452a
                                      • Instruction Fuzzy Hash: F8316C31F1CD4A5FF695F72C041527995D2EFA8680F99017AD20FC32DAEF28E8064788
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3275870926.00007FF848FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff848fd0000_PROFOMA INVOICE-2024-0419 .jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 244c0f947defb08fa13432552f3acab5b7ea8caa1a2ecea508a161a0aa74c768
                                      • Instruction ID: a223ed4891600184c6cb8753dcaa5672671338317a740630a0ebbb9bd7f2daa8
                                      • Opcode Fuzzy Hash: 244c0f947defb08fa13432552f3acab5b7ea8caa1a2ecea508a161a0aa74c768
                                      • Instruction Fuzzy Hash: 96315A32F1CD4A5FF695F72C1415239A5C2EF98680F58417A820EC32DBEF2CE8068689
                                      Uniqueness

                                      Uniqueness Score: -1.00%