Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xtnhsVjQTxvH.exe

Overview

General Information

Sample name:xtnhsVjQTxvH.exe
Analysis ID:1431858
MD5:10fb9b71859bfc7ae5aff462a88ade70
SHA1:3e6c00c0d6d443741216b79e7f500d927b4cb60a
SHA256:451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e
Tags:exeVoidRAT
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Quasar RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Quasar RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Uses dynamic DNS services
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • xtnhsVjQTxvH.exe (PID: 6860 cmdline: "C:\Users\user\Desktop\xtnhsVjQTxvH.exe" MD5: 10FB9B71859BFC7AE5AFF462A88ADE70)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Host:Port": "2%b@)=Y3[YWrz<S", "InstallName": "1Q+p)", "MutexName": "553);kPgd", "StartupKey": "rJvR[fk", "Tag": "%9:+Ppo3>B$nd", "ServerSignature": "d.SVPe\\F*", "ServerCertificate": "-&^]$Q"}
SourceRuleDescriptionAuthorStrings
xtnhsVjQTxvH.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    xtnhsVjQTxvH.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      xtnhsVjQTxvH.exeWindows_Trojan_Quasarrat_e52df647unknownunknown
      • 0x3ebe7:$a1: GetKeyloggerLogsResponse
      • 0x3e348:$a2: DoDownloadAndExecute
      • 0x507e0:$a3: http://api.ipify.org/
      • 0x4e2e9:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
      • 0x4f637:$a5: " /sc ONLOGON /tr "
      xtnhsVjQTxvH.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3e104:$s1: DoUploadAndExecute
      • 0x3e348:$s2: DoDownloadAndExecute
      • 0x3dec9:$s3: DoShellExecute
      • 0x3e300:$s4: set_Processname
      • 0x5a24:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0x5948:$op2: 00 17 03 1F 20 17 19 15 28
      • 0x63ae:$op3: 00 04 03 69 91 1B 40
      • 0x6bfe:$op3: 00 04 03 69 91 1B 40
      xtnhsVjQTxvH.exeQuasar_RAT_2Detects Quasar RATFlorian Roth
      • 0x3ebe7:$x1: GetKeyloggerLogsResponse
      • 0x3ee27:$s1: DoShellExecuteResponse
      • 0x3e796:$s2: GetPasswordsResponse
      • 0x3ecfa:$s3: GetStartupItemsResponse
      • 0x3e118:$s5: RunHidden
      • 0x3e136:$s5: RunHidden
      • 0x3e144:$s5: RunHidden
      • 0x3e158:$s5: RunHidden
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
        • 0x3e9e7:$a1: GetKeyloggerLogsResponse
        • 0x3e148:$a2: DoDownloadAndExecute
        • 0x505e0:$a3: http://api.ipify.org/
        • 0x4e0e9:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
        • 0x4f437:$a5: " /sc ONLOGON /tr "
        00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
        • 0x3df04:$s1: DoUploadAndExecute
        • 0x3e148:$s2: DoDownloadAndExecute
        • 0x3dcc9:$s3: DoShellExecute
        • 0x3e100:$s4: set_Processname
        • 0x5824:$op1: 04 1E FE 02 04 16 FE 01 60
        • 0x5748:$op2: 00 17 03 1F 20 17 19 15 28
        • 0x61ae:$op3: 00 04 03 69 91 1B 40
        • 0x69fe:$op3: 00 04 03 69 91 1B 40
        00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmpQuasardetect Remcos in memoryJPCERT/CC Incident Response Group
        • 0x4edf6:$quasarstr1: [PRIVATE KEY LOCATION: "{0}"]
        • 0x4ea0a:$quasarstr2: User: {0}{3}Pass: {1}{3}Host: {2}
        • 0x33db2:$class: Core.MouseKeyHook.WinApi
        00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.xtnhsVjQTxvH.exe.570000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
            0.0.xtnhsVjQTxvH.exe.570000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.xtnhsVjQTxvH.exe.570000.0.unpackWindows_Trojan_Quasarrat_e52df647unknownunknown
              • 0x3ebe7:$a1: GetKeyloggerLogsResponse
              • 0x3e348:$a2: DoDownloadAndExecute
              • 0x507e0:$a3: http://api.ipify.org/
              • 0x4e2e9:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
              • 0x4f637:$a5: " /sc ONLOGON /tr "
              0.0.xtnhsVjQTxvH.exe.570000.0.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
              • 0x3e104:$s1: DoUploadAndExecute
              • 0x3e348:$s2: DoDownloadAndExecute
              • 0x3dec9:$s3: DoShellExecute
              • 0x3e300:$s4: set_Processname
              • 0x5a24:$op1: 04 1E FE 02 04 16 FE 01 60
              • 0x5948:$op2: 00 17 03 1F 20 17 19 15 28
              • 0x63ae:$op3: 00 04 03 69 91 1B 40
              • 0x6bfe:$op3: 00 04 03 69 91 1B 40
              0.0.xtnhsVjQTxvH.exe.570000.0.unpackQuasar_RAT_2Detects Quasar RATFlorian Roth
              • 0x3ebe7:$x1: GetKeyloggerLogsResponse
              • 0x3ee27:$s1: DoShellExecuteResponse
              • 0x3e796:$s2: GetPasswordsResponse
              • 0x3ecfa:$s3: GetStartupItemsResponse
              • 0x3e118:$s5: RunHidden
              • 0x3e136:$s5: RunHidden
              • 0x3e144:$s5: RunHidden
              • 0x3e158:$s5: RunHidden
              Click to see the 7 entries
              No Sigma rule has matched
              Timestamp:04/25/24-21:50:54.911688
              SID:2036383
              Source Port:49730
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: xtnhsVjQTxvH.exeAvira: detected
              Source: xtnhsVjQTxvH.exeMalware Configuration Extractor: Quasar {"Host:Port": "2%b@)=Y3[YWrz<S", "InstallName": "1Q+p)", "MutexName": "553);kPgd", "StartupKey": "rJvR[fk", "Tag": "%9:+Ppo3>B$nd", "ServerSignature": "d.SVPe\\F*", "ServerCertificate": "-&^]$Q"}
              Source: xtnhsVjQTxvH.exeReversingLabs: Detection: 78%
              Source: Yara matchFile source: xtnhsVjQTxvH.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xtnhsVjQTxvH.exe PID: 6860, type: MEMORYSTR
              Source: xtnhsVjQTxvH.exeJoe Sandbox ML: detected
              Source: xtnhsVjQTxvH.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: xtnhsVjQTxvH.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: TrafficSnort IDS: 2036383 ET TROJAN Common RAT Connectivity Check Observed 192.168.2.4:49730 -> 208.95.112.1:80
              Source: Malware configuration extractorURLs: 2%b@)=Y3[YWrz<S
              Source: unknownDNS query: name: proxybreve.duckdns.org
              Source: Yara matchFile source: xtnhsVjQTxvH.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49731 -> 94.156.79.26:4001
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
              Source: unknownDNS query: name: ip-api.com
              Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: proxybreve.duckdns.org
              Source: xtnhsVjQTxvH.exeString found in binary or memory: http://api.ipify.org/
              Source: xtnhsVjQTxvH.exeString found in binary or memory: http://freegeoip.net/xml/
              Source: xtnhsVjQTxvH.exeString found in binary or memory: http://ip-api.com/json/
              Source: xtnhsVjQTxvH.exe, 00000000.00000002.4075764369.0000000002929000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
              Source: xtnhsVjQTxvH.exe, 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: xtnhsVjQTxvH.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xtnhsVjQTxvH.exe PID: 6860, type: MEMORYSTR

              System Summary

              barindex
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_0285A5500_2_0285A550
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_02859C800_2_02859C80
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_028599380_2_02859938
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064DABB30_2_064DABB3
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064D0BD80_2_064D0BD8
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064D78310_2_064D7831
              Source: xtnhsVjQTxvH.exe, 00000000.00000002.4074752971.0000000000958000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs xtnhsVjQTxvH.exe
              Source: xtnhsVjQTxvH.exe, 00000000.00000000.1621205128.00000000005CA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs xtnhsVjQTxvH.exe
              Source: xtnhsVjQTxvH.exeBinary or memory string: OriginalFilenameClient.exe" vs xtnhsVjQTxvH.exe
              Source: xtnhsVjQTxvH.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: xtnhsVjQTxvH.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: xtnhsVjQTxvH.exe, --.csBase64 encoded string: 'Q7NH5BcZ1+Ayk/EYsVJcBx3gBA7En82GOvB/rurWCNMCuIlMnBZEJPSNn4h1pL/HPk9fiJB6/gwZOMjxTMaolA==', 'jQkZ4waYL7bveeEIeMw5lNeDSLrKjeNjLVe4moZqDRCV7GqHFMFJeVIGbp21u6UwYV/x/aHx6ZuFRMTpkdcyamMLXsY+vN6cKN54YmACGU0=', 'NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==', 'WNFJ0DWtj9BIROVd2dpqF3FBGJKOfPKPl4HYVyVxR7Eb+BOvPK21eZs/WJhyqn8IatU8SySaJJciqAaNxqtAdg==', 'JfVhvNdTPiNJekT+CzW7InRaSKcyyDvK80ha/KeJ3f/jhH2cq85zVwwhg6l0C3/zs+c9bl9XFjIOeIj1t+WupQ==', 'wnvEVzKSdg5ShWnsXpTZBZE6mphAkSyJsqsfl5ZB1h+FewWAaDKsFtVxwaBLakcOOtZYhX66XbDdVgK44OCzFQ==', 'u63zGu36T58B+RYfNkLwOvz0rqgUN/NYuHgzHQmxmgnZastzSkby7OUASJKZKAF409m5NTHwV4xK47rEzSWijg=='
              Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/2
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMutant created: NULL
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_l1M93VuqIyiH8hEQ4I
              Source: xtnhsVjQTxvH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: xtnhsVjQTxvH.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: xtnhsVjQTxvH.exeReversingLabs: Detection: 78%
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: xtnhsVjQTxvH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: xtnhsVjQTxvH.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064D6C42 pushfd ; retf 0_2_064D6C49
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064D4D41 push es; ret 0_2_064D4D44
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064D5570 push es; ret 0_2_064D5580
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064D4D3D push es; ret 0_2_064D4D40
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064F2201 push es; retf 0_2_064F2214
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064F228D push eax; iretd 0_2_064F2299
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064F4297 push es; iretd 0_2_064F42D0
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeCode function: 0_2_064F21C5 push es; retf 0_2_064F21C8

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeFile opened: C:\Users\user\Desktop\xtnhsVjQTxvH.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMemory allocated: 28F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMemory allocated: 48F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWindow / User API: threadDelayed 472Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWindow / User API: threadDelayed 449Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWindow / User API: threadDelayed 651Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWindow / User API: threadDelayed 8368Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exe TID: 6856Thread sleep count: 472 > 30Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exe TID: 6856Thread sleep time: -1180000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exe TID: 2484Thread sleep count: 449 > 30Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exe TID: 5308Thread sleep count: 651 > 30Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exe TID: 6856Thread sleep count: 8368 > 30Jump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exe TID: 6856Thread sleep time: -20920000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: xtnhsVjQTxvH.exe, 00000000.00000002.4074809410.0000000000AAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZZ
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeQueries volume information: C:\Users\user\Desktop\xtnhsVjQTxvH.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: xtnhsVjQTxvH.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xtnhsVjQTxvH.exe PID: 6860, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\xtnhsVjQTxvH.exeMutex created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_l1M93VuqIyiH8hEQ4IJump to behavior
              Source: Yara matchFile source: xtnhsVjQTxvH.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.xtnhsVjQTxvH.exe.570000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: xtnhsVjQTxvH.exe PID: 6860, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              3
              Virtualization/Sandbox Evasion
              OS Credential Dumping11
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory3
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Hidden Files and Directories
              Security Account Manager1
              Application Window Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Obfuscated Files or Information
              NTDS1
              System Network Configuration Discovery
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets23
              System Information Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture212
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              xtnhsVjQTxvH.exe79%ReversingLabsByteCode-MSIL.Trojan.Quasar
              xtnhsVjQTxvH.exe100%AviraHEUR/AGEN.1307418
              xtnhsVjQTxvH.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
              2%b@)=Y3[YWrz<S0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              proxybreve.duckdns.org
              94.156.79.26
              truetrue
                unknown
                ip-api.com
                208.95.112.1
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://ip-api.com/json/false
                    high
                    2%b@)=Y3[YWrz<Strue
                    • Avira URL Cloud: safe
                    low
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://api.ipify.org/xtnhsVjQTxvH.exefalse
                      high
                      http://freegeoip.net/xml/xtnhsVjQTxvH.exefalse
                        high
                        http://schemas.datacontract.org/2004/07/xtnhsVjQTxvH.exe, 00000000.00000002.4075764369.0000000002929000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namextnhsVjQTxvH.exe, 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          208.95.112.1
                          ip-api.comUnited States
                          53334TUT-ASUSfalse
                          94.156.79.26
                          proxybreve.duckdns.orgBulgaria
                          43561NET1-ASBGtrue
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1431858
                          Start date and time:2024-04-25 21:50:06 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 44s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:xtnhsVjQTxvH.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@1/0@2/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 25
                          • Number of non-executed functions: 3
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: xtnhsVjQTxvH.exe
                          TimeTypeDescription
                          21:51:33API Interceptor3920561x Sleep call for process: xtnhsVjQTxvH.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          208.95.112.1o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                          • ip-api.com/line/?fields=hosting
                          SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • ip-api.com/line/?fields=hosting
                          SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                          • ip-api.com/json
                          Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                          • ip-api.com/json
                          Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • ip-api.com/line/?fields=hosting
                          SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                          • ip-api.com/line/?fields=hosting
                          PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                          • ip-api.com/line/?fields=hosting
                          Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • ip-api.com/line/?fields=hosting
                          QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • ip-api.com/line/?fields=hosting
                          DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                          • ip-api.com/line/?fields=hosting
                          94.156.79.26xnNcI6OenKJs.exeGet hashmaliciousQuasarBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.como3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                            • 208.95.112.1
                            Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                            • 208.95.112.1
                            Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                            • 208.95.112.1
                            Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSo3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                            • 208.95.112.1
                            Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                            • 208.95.112.1
                            Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                            • 208.95.112.1
                            Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NET1-ASBGo4883TEQGB.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            Id2uxwyyf8.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            Y4pblBbDQc.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            C5fMgX1ZyY.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            6fV4tfoJp2.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            fqEpqMWF6r.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            D0dhEeGfv4.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            IrnO5ZI3En.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 94.156.8.9
                            PO_La-Tanerie04180240124.vbsGet hashmaliciousGuLoader, RemcosBrowse
                            • 94.156.79.69
                            FTG_PD_04024024001.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                            • 87.121.105.163
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.431379219054936
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:xtnhsVjQTxvH.exe
                            File size:356'352 bytes
                            MD5:10fb9b71859bfc7ae5aff462a88ade70
                            SHA1:3e6c00c0d6d443741216b79e7f500d927b4cb60a
                            SHA256:451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e
                            SHA512:7666023e2c63c8eff11fb02588636fc932c0f616323bfa2c4faf4a65ba0355ea18f70a0b12246ffeacd1d0b137dd2aa6085058c5503fff0187f377758add3491
                            SSDEEP:6144:uvNHXf500M8wU2Kd6ab76s9BeSCck4kZ25t0CNO:0d50XKYK6cCcL5txO
                            TLSH:DA749D13B3A4EA3BD1FE1B3BE13206155BB0D487B616E38F9A5855B86D133868D413B3
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....\*f.................b............... ........@.. ....................................@................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x45818e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x662A5C93 [Thu Apr 25 13:37:23 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x581400x4b.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000xa00.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5c0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x561940x56200c1e9b55f3b75128369da1d75c54c1a06False0.5127874410377359data6.4482173846419615IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x5a0000xa000xa0076cc3230218ab47d3ced751a87f28c1bFalse0.340234375data4.23596538978674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x5c0000xc0x2003db1bdcf6a5c4d24d227c24f9c02147cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0x5a0900x2d4data0.43646408839779005
                            RT_MANIFEST0x5a3740x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            04/25/24-21:50:54.911688TCP2036383ET TROJAN Common RAT Connectivity Check Observed4973080192.168.2.4208.95.112.1
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 25, 2024 21:50:54.789324999 CEST4973080192.168.2.4208.95.112.1
                            Apr 25, 2024 21:50:54.911175013 CEST8049730208.95.112.1192.168.2.4
                            Apr 25, 2024 21:50:54.911303997 CEST4973080192.168.2.4208.95.112.1
                            Apr 25, 2024 21:50:54.911688089 CEST4973080192.168.2.4208.95.112.1
                            Apr 25, 2024 21:50:55.035156965 CEST8049730208.95.112.1192.168.2.4
                            Apr 25, 2024 21:50:55.083978891 CEST4973080192.168.2.4208.95.112.1
                            Apr 25, 2024 21:50:56.319941044 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:50:56.550082922 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:50:56.550250053 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:50:56.814774036 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:50:56.865247011 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:50:56.947310925 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:50:57.177313089 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:50:57.224601984 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:51:22.177793980 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:51:22.413657904 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:51:22.467844009 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:51:22.468013048 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:51:28.269726038 CEST8049730208.95.112.1192.168.2.4
                            Apr 25, 2024 21:51:28.269846916 CEST4973080192.168.2.4208.95.112.1
                            Apr 25, 2024 21:51:47.427897930 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:51:47.673818111 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:51:47.719238997 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:51:47.719341040 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:51:52.712192059 CEST8049730208.95.112.1192.168.2.4
                            Apr 25, 2024 21:52:12.740299940 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:52:12.957190037 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:52:12.957273960 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:52:12.975920916 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:52:37.990351915 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:52:38.204217911 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:52:38.205061913 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:52:38.229790926 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:53:03.302861929 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:53:03.441005945 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:53:03.441581011 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:53:03.532679081 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:53:28.537395954 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:53:28.684837103 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:53:28.685060024 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:53:28.767010927 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:53:53.771744013 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:53:53.917705059 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:53:53.919260979 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:53:54.008135080 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:54:19.021750927 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:54:19.158839941 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:54:19.160612106 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:54:19.261028051 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:54:44.271753073 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:54:44.396393061 CEST40014973194.156.79.26192.168.2.4
                            Apr 25, 2024 21:54:44.397116899 CEST497314001192.168.2.494.156.79.26
                            Apr 25, 2024 21:54:44.510632992 CEST40014973194.156.79.26192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 25, 2024 21:50:54.671932936 CEST5556053192.168.2.41.1.1.1
                            Apr 25, 2024 21:50:54.782048941 CEST53555601.1.1.1192.168.2.4
                            Apr 25, 2024 21:50:55.532409906 CEST6428953192.168.2.41.1.1.1
                            Apr 25, 2024 21:50:56.316083908 CEST53642891.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 25, 2024 21:50:54.671932936 CEST192.168.2.41.1.1.10x70ffStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                            Apr 25, 2024 21:50:55.532409906 CEST192.168.2.41.1.1.10x479aStandard query (0)proxybreve.duckdns.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 25, 2024 21:50:54.782048941 CEST1.1.1.1192.168.2.40x70ffNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            Apr 25, 2024 21:50:56.316083908 CEST1.1.1.1192.168.2.40x479aNo error (0)proxybreve.duckdns.org94.156.79.26A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449730208.95.112.1806860C:\Users\user\Desktop\xtnhsVjQTxvH.exe
                            TimestampBytes transferredDirectionData
                            Apr 25, 2024 21:50:54.911688089 CEST144OUTGET /json/ HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Apr 25, 2024 21:50:55.035156965 CEST466INHTTP/1.1 200 OK
                            Date: Thu, 25 Apr 2024 19:50:54 GMT
                            Content-Type: application/json; charset=utf-8
                            Content-Length: 289
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 47 41 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 47 65 6f 72 67 69 61 22 2c 22 63 69 74 79 22 3a 22 41 74 6c 61 6e 74 61 22 2c 22 7a 69 70 22 3a 22 33 30 33 30 31 22 2c 22 6c 61 74 22 3a 33 33 2e 37 34 38 35 2c 22 6c 6f 6e 22 3a 2d 38 34 2e 33 38 37 31 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 6f 72 67 22 3a 22 41 54 4c 20 49 49 22 2c 22 61 73 22 3a 22 41 53 36 30 30 36 38 20 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 71 75 65 72 79 22 3a 22 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30 22 7d
                            Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"GA","regionName":"Georgia","city":"Atlanta","zip":"30301","lat":33.7485,"lon":-84.3871,"timezone":"America/New_York","isp":"Datacamp Limited","org":"ATL II","as":"AS60068 Datacamp Limited","query":"185.152.66.230"}


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:21:50:51
                            Start date:25/04/2024
                            Path:C:\Users\user\Desktop\xtnhsVjQTxvH.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\xtnhsVjQTxvH.exe"
                            Imagebase:0x570000
                            File size:356'352 bytes
                            MD5 hash:10FB9B71859BFC7AE5AFF462A88ADE70
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                            • Rule: Quasar, Description: detect Remcos in memory, Source: 00000000.00000000.1621167033.0000000000572000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.4075764369.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:11%
                              Dynamic/Decrypted Code Coverage:97.8%
                              Signature Coverage:0%
                              Total number of Nodes:139
                              Total number of Limit Nodes:11
                              execution_graph 20499 dbd128 20500 dbd140 20499->20500 20501 dbd19a 20500->20501 20506 64d35d9 20500->20506 20511 64d287a 20500->20511 20516 64d35e8 20500->20516 20521 64d2888 20500->20521 20507 64d3615 20506->20507 20508 64d3647 20507->20508 20526 64d3760 20507->20526 20531 64d3770 20507->20531 20512 64d2888 20511->20512 20514 64d35d9 2 API calls 20512->20514 20515 64d35e8 2 API calls 20512->20515 20513 64d28cf 20513->20501 20514->20513 20515->20513 20517 64d3615 20516->20517 20518 64d3647 20517->20518 20519 64d3760 2 API calls 20517->20519 20520 64d3770 2 API calls 20517->20520 20519->20518 20520->20518 20522 64d28ae 20521->20522 20524 64d35d9 2 API calls 20522->20524 20525 64d35e8 2 API calls 20522->20525 20523 64d28cf 20523->20501 20524->20523 20525->20523 20528 64d3770 20526->20528 20527 64d3810 20527->20508 20536 64d3818 20528->20536 20540 64d3828 20528->20540 20533 64d3784 20531->20533 20532 64d3810 20532->20508 20534 64d3818 2 API calls 20533->20534 20535 64d3828 2 API calls 20533->20535 20534->20532 20535->20532 20537 64d3828 20536->20537 20538 64d3839 20537->20538 20543 64d4de9 20537->20543 20538->20527 20541 64d3839 20540->20541 20542 64d4de9 2 API calls 20540->20542 20541->20527 20542->20541 20547 64d4e00 20543->20547 20551 64d4e10 20543->20551 20544 64d4dfa 20544->20538 20548 64d4e10 20547->20548 20549 64d4eaa CallWindowProcW 20548->20549 20550 64d4e59 20548->20550 20549->20550 20550->20544 20552 64d4e52 20551->20552 20554 64d4e59 20551->20554 20553 64d4eaa CallWindowProcW 20552->20553 20552->20554 20553->20554 20554->20544 20555 64d0238 20557 64d0269 20555->20557 20559 64d0368 20555->20559 20556 64d0275 20557->20556 20564 64d04a1 20557->20564 20568 64d04b0 20557->20568 20558 64d02b4 20571 64d17a0 20558->20571 20575 64d17b0 20558->20575 20565 64d04b0 20564->20565 20579 64d04f2 20565->20579 20566 64d04ba 20566->20558 20570 64d04f2 4 API calls 20568->20570 20569 64d04ba 20569->20558 20570->20569 20573 64d17db 20571->20573 20572 64d188a 20572->20572 20573->20572 20612 64d2672 20573->20612 20576 64d17db 20575->20576 20577 64d188a 20576->20577 20578 64d2672 2 API calls 20576->20578 20578->20577 20580 64d0511 20579->20580 20582 64d0534 20579->20582 20589 64d04f2 3 API calls 20580->20589 20590 64d06f0 20580->20590 20581 64d051c 20581->20582 20594 64d0788 20581->20594 20599 64d0798 20581->20599 20582->20566 20583 64d052c 20583->20582 20584 64d0738 GetModuleHandleW 20583->20584 20585 64d0765 20584->20585 20585->20566 20589->20581 20591 64d0738 GetModuleHandleW 20590->20591 20592 64d0732 20590->20592 20593 64d0765 20591->20593 20592->20591 20593->20581 20596 64d07ac 20594->20596 20595 64d07d1 20595->20583 20596->20595 20604 64d0958 20596->20604 20608 64d0952 20596->20608 20601 64d07ac 20599->20601 20600 64d07d1 20600->20583 20601->20600 20602 64d0958 LoadLibraryExW 20601->20602 20603 64d0952 LoadLibraryExW 20601->20603 20602->20600 20603->20600 20605 64d099a 20604->20605 20606 64d09a0 LoadLibraryExW 20604->20606 20605->20606 20607 64d09d1 20606->20607 20607->20595 20609 64d0958 LoadLibraryExW 20608->20609 20611 64d09d1 20609->20611 20611->20595 20613 64d25fb 20612->20613 20614 64d267a 20612->20614 20613->20572 20618 64d26c4 20614->20618 20622 64d26d0 20614->20622 20619 64d2738 CreateWindowExW 20618->20619 20621 64d27f4 20619->20621 20623 64d2738 CreateWindowExW 20622->20623 20625 64d27f4 20623->20625 20445 2850848 20446 2850852 20445->20446 20450 28521a0 20445->20450 20447 285089e 20446->20447 20455 285af40 20446->20455 20451 28521c5 20450->20451 20461 28522a1 20451->20461 20466 28522b0 20451->20466 20457 285af87 20455->20457 20456 285b003 20456->20447 20457->20456 20474 285fc20 20457->20474 20478 285fc30 20457->20478 20458 285b0ab 20458->20447 20462 28521cf 20461->20462 20464 28522af 20461->20464 20462->20446 20463 28523b4 20463->20463 20464->20463 20470 2851978 20464->20470 20468 28522d7 20466->20468 20467 28523b4 20467->20467 20468->20467 20469 2851978 CreateActCtxA 20468->20469 20469->20467 20471 2853340 CreateActCtxA 20470->20471 20473 2853403 20471->20473 20473->20473 20475 285fc3e 20474->20475 20482 285f928 20475->20482 20479 285fc3e 20478->20479 20480 285f928 DeleteFileW 20479->20480 20481 285fc45 20480->20481 20481->20458 20483 285fc58 DeleteFileW 20482->20483 20485 285fc45 20483->20485 20485->20458 20486 64d71e0 20487 64d74e8 20486->20487 20488 64d7208 20486->20488 20489 64d7211 20488->20489 20492 64d65fc 20488->20492 20491 64d7234 20494 64d6607 20492->20494 20493 64d752b 20493->20491 20494->20493 20496 64d6618 20494->20496 20497 64d7560 OleInitialize 20496->20497 20498 64d75c4 20497->20498 20498->20493
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID: !$?$Hbq$Hbq$Te^q
                              • API String ID: 0-2214972705
                              • Opcode ID: 66ee8ea9f6ec249d228a7f8d28c451c96f8ac5fbc6be3be1cb93d21b20378582
                              • Instruction ID: ec5657aef6fd9611ea05641dc8a020090c0f439000478369b9f9a94933816118
                              • Opcode Fuzzy Hash: 66ee8ea9f6ec249d228a7f8d28c451c96f8ac5fbc6be3be1cb93d21b20378582
                              • Instruction Fuzzy Hash: BC929070E006598FCB56CF68C9D4AADFBB2FF85304F29859AD056AB256C730ED42CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 954059c726050ab96d41f5a52d8face24a0ea4f3d3b5c9c8298108dd1c4e1de8
                              • Instruction ID: dcdbc9c2073ce3a09025502f7b487887341b801db028846b6591c74b7041db82
                              • Opcode Fuzzy Hash: 954059c726050ab96d41f5a52d8face24a0ea4f3d3b5c9c8298108dd1c4e1de8
                              • Instruction Fuzzy Hash: B0B15078E00219DFDF10CFA9D98579DBBF2AF88318F148529E819E7294EB749845CF81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cbe709d695360775cd0b152a75ebf5b34f509aaab53731ba503ec13d6ffda61c
                              • Instruction ID: dd1d0bda13243e03829642ed59059452aacf58062a33a8281b47225457113c61
                              • Opcode Fuzzy Hash: cbe709d695360775cd0b152a75ebf5b34f509aaab53731ba503ec13d6ffda61c
                              • Instruction Fuzzy Hash: 97B16E78E00219CFDB18CFA9D8D179DBBF2AF48714F148229D819E7394EB749846CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 329 64f0048-64f0068 330 64f006f-64f0071 329->330 331 64f0089-64f00bd 330->331 332 64f0073-64f0079 330->332 337 64f00c0-64f00c4 331->337 333 64f007d-64f007f 332->333 334 64f007b 332->334 333->331 334->331 338 64f00cd-64f00d2 337->338 339 64f00c6-64f00cb 337->339 340 64f00d8-64f00db 338->340 339->340 341 64f0db7-64f0dc1 340->341 342 64f00e1-64f00f5 340->342 342->337 344 64f00f7 342->344 345 64f00fe-64f010b 344->345 346 64f01de-64f01ed 344->346 347 64f0484-64f0493 344->347 348 64f03a2-64f03b1 344->348 349 64f02c0-64f02cf 344->349 350 64f0d3f-64f0d63 345->350 355 64f0111-64f0137 345->355 346->350 354 64f01f3-64f0219 346->354 347->350 351 64f0499-64f04bf 347->351 348->350 352 64f03b7-64f03dd 348->352 349->350 353 64f02d5-64f02fb 349->353 368 64f0d69-64f0d70 350->368 369 64f0f32-64f0f37 350->369 383 64f04c8-64f04cf 351->383 384 64f04c1-64f04c6 351->384 385 64f03df-64f03e4 352->385 386 64f03e6-64f03ed 352->386 376 64f02fd-64f0302 353->376 377 64f0304-64f030b 353->377 379 64f021b-64f0220 354->379 380 64f0222-64f0229 354->380 381 64f0139-64f013e 355->381 382 64f0140-64f0147 355->382 368->369 372 64f0d76-64f0d91 368->372 372->369 403 64f0d97-64f0d9f 372->403 389 64f0370-64f039d 376->389 390 64f030d-64f032f 377->390 391 64f0331-64f0355 377->391 392 64f028e-64f02bb 379->392 393 64f024f-64f0273 380->393 394 64f022b-64f024d 380->394 395 64f01ac-64f01d9 381->395 396 64f016d-64f0191 382->396 397 64f0149-64f016b 382->397 400 64f04f5-64f0519 383->400 401 64f04d1-64f04f3 383->401 399 64f0534-64f0561 384->399 402 64f0452-64f047f 385->402 387 64f03ef-64f0411 386->387 388 64f0413-64f0437 386->388 387->402 437 64f044f 388->437 438 64f0439-64f043f 388->438 389->337 390->389 439 64f036d 391->439 440 64f0357-64f035d 391->440 392->337 441 64f028b 393->441 442 64f0275-64f027b 393->442 394->392 395->337 443 64f01a9 396->443 444 64f0193-64f0199 396->444 397->395 399->337 435 64f051b-64f0521 400->435 436 64f0531 400->436 401->399 402->337 403->369 419 64f0da5-64f0dae 403->419 419->341 445 64f0525-64f0527 435->445 446 64f0523 435->446 436->399 437->402 447 64f0443-64f0445 438->447 448 64f0441 438->448 439->389 449 64f035f 440->449 450 64f0361-64f0363 440->450 441->392 451 64f027f-64f0281 442->451 452 64f027d 442->452 443->395 453 64f019d-64f019f 444->453 454 64f019b 444->454 445->436 446->436 447->437 448->437 449->439 450->439 451->441 452->441 453->443 454->443
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078784352.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64f0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID: ?$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                              • API String ID: 0-2982888449
                              • Opcode ID: 080d0bc7a92860c3dea2e76d0dbf5f738ff6b20881533bd43d19861235f2feeb
                              • Instruction ID: a23d2d6aa14d466cc20056b489a377fb36ea3b078abe5dc1be0dc76061c5a402
                              • Opcode Fuzzy Hash: 080d0bc7a92860c3dea2e76d0dbf5f738ff6b20881533bd43d19861235f2feeb
                              • Instruction Fuzzy Hash: F6F1A030F102098FDB59DFA5C954A6EBBB2FF84B00F14841AE5069B3A6CB75EC46CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 455 64f0000-64f0047 457 64f0048-64f0068 455->457 458 64f006f-64f0071 457->458 459 64f0089-64f00bd 458->459 460 64f0073-64f0079 458->460 465 64f00c0-64f00c4 459->465 461 64f007d-64f007f 460->461 462 64f007b 460->462 461->459 462->459 466 64f00cd-64f00d2 465->466 467 64f00c6-64f00cb 465->467 468 64f00d8-64f00db 466->468 467->468 469 64f0db7-64f0dc1 468->469 470 64f00e1-64f00f5 468->470 470->465 472 64f00f7 470->472 473 64f00fe-64f010b 472->473 474 64f01de-64f01ed 472->474 475 64f0484-64f0493 472->475 476 64f03a2-64f03b1 472->476 477 64f02c0-64f02cf 472->477 478 64f0d3f-64f0d63 473->478 483 64f0111-64f0137 473->483 474->478 482 64f01f3-64f0219 474->482 475->478 479 64f0499-64f04bf 475->479 476->478 480 64f03b7-64f03dd 476->480 477->478 481 64f02d5-64f02fb 477->481 496 64f0d69-64f0d70 478->496 497 64f0f32-64f0f37 478->497 511 64f04c8-64f04cf 479->511 512 64f04c1-64f04c6 479->512 513 64f03df-64f03e4 480->513 514 64f03e6-64f03ed 480->514 504 64f02fd-64f0302 481->504 505 64f0304-64f030b 481->505 507 64f021b-64f0220 482->507 508 64f0222-64f0229 482->508 509 64f0139-64f013e 483->509 510 64f0140-64f0147 483->510 496->497 500 64f0d76-64f0d91 496->500 500->497 531 64f0d97-64f0d9f 500->531 517 64f0370-64f039d 504->517 518 64f030d-64f032f 505->518 519 64f0331-64f0355 505->519 520 64f028e-64f02bb 507->520 521 64f024f-64f0273 508->521 522 64f022b-64f024d 508->522 523 64f01ac-64f01d9 509->523 524 64f016d-64f0191 510->524 525 64f0149-64f016b 510->525 528 64f04f5-64f0519 511->528 529 64f04d1-64f04f3 511->529 527 64f0534-64f0561 512->527 530 64f0452-64f047f 513->530 515 64f03ef-64f0411 514->515 516 64f0413-64f0437 514->516 515->530 565 64f044f 516->565 566 64f0439-64f043f 516->566 517->465 518->517 567 64f036d 519->567 568 64f0357-64f035d 519->568 520->465 569 64f028b 521->569 570 64f0275-64f027b 521->570 522->520 523->465 571 64f01a9 524->571 572 64f0193-64f0199 524->572 525->523 527->465 563 64f051b-64f0521 528->563 564 64f0531 528->564 529->527 530->465 531->497 547 64f0da5-64f0dae 531->547 547->469 573 64f0525-64f0527 563->573 574 64f0523 563->574 564->527 565->530 575 64f0443-64f0445 566->575 576 64f0441 566->576 567->517 577 64f035f 568->577 578 64f0361-64f0363 568->578 569->520 579 64f027f-64f0281 570->579 580 64f027d 570->580 571->523 581 64f019d-64f019f 572->581 582 64f019b 572->582 573->564 574->564 575->565 576->565 577->567 578->567 579->569 580->569 581->571 582->571
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078784352.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64f0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID: ?$$^q$$^q$$^q$$^q$$^q
                              • API String ID: 0-4250046088
                              • Opcode ID: 798960d9108eeec035e135e13814df773ae80d522162de50c3504e167ff0ad9e
                              • Instruction ID: 6af379ed8d4a545cb032ee215329ecdcaac7268d294621d9f4414badef7e633b
                              • Opcode Fuzzy Hash: 798960d9108eeec035e135e13814df773ae80d522162de50c3504e167ff0ad9e
                              • Instruction Fuzzy Hash: AC912130B147458FE7169B69CC60B6EBBB2AF86700F14855BD201DF3A3DAB5EC068791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1765 64d04f2-64d050f 1766 64d053b-64d053f 1765->1766 1767 64d0511 1765->1767 1768 64d0541-64d054b 1766->1768 1769 64d0553-64d0594 1766->1769 1821 64d0517 call 64d06f0 1767->1821 1822 64d0517 call 64d04f2 1767->1822 1768->1769 1775 64d0596-64d059e 1769->1775 1776 64d05a1-64d05af 1769->1776 1770 64d051c-64d051e 1773 64d0534 1770->1773 1774 64d0520 1770->1774 1773->1766 1819 64d0526 call 64d0788 1774->1819 1820 64d0526 call 64d0798 1774->1820 1775->1776 1777 64d05b1-64d05b6 1776->1777 1778 64d05d3-64d05d5 1776->1778 1781 64d05b8-64d05bf 1777->1781 1782 64d05c1 1777->1782 1780 64d05d8-64d05df 1778->1780 1779 64d052c-64d052e 1779->1773 1783 64d0670-64d069b 1779->1783 1784 64d05ec-64d05f3 1780->1784 1785 64d05e1-64d05e9 1780->1785 1786 64d05c3-64d05d1 1781->1786 1782->1786 1800 64d06a2-64d06ec 1783->1800 1787 64d05f5-64d05fd 1784->1787 1788 64d0600-64d0609 1784->1788 1785->1784 1786->1780 1787->1788 1793 64d060b-64d0613 1788->1793 1794 64d0616-64d061b 1788->1794 1793->1794 1795 64d061d-64d0624 1794->1795 1796 64d0639-64d063d 1794->1796 1795->1796 1798 64d0626-64d0636 1795->1798 1817 64d0640 call 64d0a48 1796->1817 1818 64d0640 call 64d0a58 1796->1818 1798->1796 1799 64d0643-64d0646 1801 64d0669-64d066f 1799->1801 1802 64d0648-64d0666 1799->1802 1810 64d06ee-64d0730 1800->1810 1802->1801 1812 64d0738-64d0763 GetModuleHandleW 1810->1812 1813 64d0732-64d0735 1810->1813 1814 64d076c-64d0780 1812->1814 1815 64d0765-64d076b 1812->1815 1813->1812 1815->1814 1817->1799 1818->1799 1819->1779 1820->1779 1821->1770 1822->1770
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 064D0756
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 1ee0b32191edc6b2e1f3c7992412b6c7253e863c14b530879e41544f24b7ae31
                              • Instruction ID: fbead6bddfc78e133d5b8d563a3a6f60e4ef6fc218d93795414fca0387285512
                              • Opcode Fuzzy Hash: 1ee0b32191edc6b2e1f3c7992412b6c7253e863c14b530879e41544f24b7ae31
                              • Instruction Fuzzy Hash: B6813670A00B058FDBA5DF2AD45079BBBF1FB88704F10892AD48AD7B50D774E945CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1823 2853334-2853339 1824 28532c8-2853301 1823->1824 1825 285333b-2853401 CreateActCtxA 1823->1825 1828 2853303-2853309 1824->1828 1829 285330a-285332b 1824->1829 1830 2853403-2853409 1825->1830 1831 285340a-2853464 1825->1831 1828->1829 1830->1831 1839 2853466-2853469 1831->1839 1840 2853473-2853477 1831->1840 1839->1840 1841 2853479-2853485 1840->1841 1842 2853488 1840->1842 1841->1842 1844 2853489 1842->1844 1844->1844
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 028533F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 9326bbd84abe49bfba5112e0c7126fd9a75fe22be8eccb21d6e79e17bd6bd053
                              • Instruction ID: 8f9532a6d67d3b5afea2d891ae67c028948fc0ec65cc4c8fad620d50e4ca7d46
                              • Opcode Fuzzy Hash: 9326bbd84abe49bfba5112e0c7126fd9a75fe22be8eccb21d6e79e17bd6bd053
                              • Instruction Fuzzy Hash: A75103B8C00619CFDB24CFA9C8447DEBBF5BF48304F2480AAD418AB251D775A989CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1845 64d26c4-64d2736 1846 64d2738-64d273e 1845->1846 1847 64d2741-64d2748 1845->1847 1846->1847 1848 64d274a-64d2750 1847->1848 1849 64d2753-64d27f2 CreateWindowExW 1847->1849 1848->1849 1851 64d27fb-64d2833 1849->1851 1852 64d27f4-64d27fa 1849->1852 1856 64d2835-64d2838 1851->1856 1857 64d2840 1851->1857 1852->1851 1856->1857 1858 64d2841 1857->1858 1858->1858
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 064D27E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: f497db44311a4b926e70fea271ecf483cf38931e804464462241946ad82918e8
                              • Instruction ID: 90d0108f2201521806be013ae5bdcbe18f04756a0928f7e57035020b410c0959
                              • Opcode Fuzzy Hash: f497db44311a4b926e70fea271ecf483cf38931e804464462241946ad82918e8
                              • Instruction Fuzzy Hash: F251C1B1D003499FDB15CFA9C894ADEFBB1BF48310F24822AE818AB250D7749945CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1859 64d26d0-64d2736 1860 64d2738-64d273e 1859->1860 1861 64d2741-64d2748 1859->1861 1860->1861 1862 64d274a-64d2750 1861->1862 1863 64d2753-64d27f2 CreateWindowExW 1861->1863 1862->1863 1865 64d27fb-64d2833 1863->1865 1866 64d27f4-64d27fa 1863->1866 1870 64d2835-64d2838 1865->1870 1871 64d2840 1865->1871 1866->1865 1870->1871 1872 64d2841 1871->1872 1872->1872
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 064D27E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: dbc80478ed5b7a453298bd1a253aa073dc8514bdef66576d8db91d8950271b54
                              • Instruction ID: 0c6193fcf92951acf1e0af038aa09b1431260a6e0aadc359241325063a3a052b
                              • Opcode Fuzzy Hash: dbc80478ed5b7a453298bd1a253aa073dc8514bdef66576d8db91d8950271b54
                              • Instruction Fuzzy Hash: 9941C0B1D00349EFDB14CF99C894ADEFBB5BF48310F24812AE918AB250D7749985CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1873 2851978-2853401 CreateActCtxA 1876 2853403-2853409 1873->1876 1877 285340a-2853464 1873->1877 1876->1877 1884 2853466-2853469 1877->1884 1885 2853473-2853477 1877->1885 1884->1885 1886 2853479-2853485 1885->1886 1887 2853488 1885->1887 1886->1887 1889 2853489 1887->1889 1889->1889
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 028533F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 168abb6e3cb385e7f8e2dc5d6ba9fb87f5f99bfd7c829dc0c2e928c5b3ce6781
                              • Instruction ID: 89ad4edea401637b163c2ba533a900689bf844ef7a7a1404471107bd51e4e26b
                              • Opcode Fuzzy Hash: 168abb6e3cb385e7f8e2dc5d6ba9fb87f5f99bfd7c829dc0c2e928c5b3ce6781
                              • Instruction Fuzzy Hash: D641D1B8C0061DCFDB24CFA9C844B9EFBB5BF48304F2480AAD409AB255DB756949CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 064D4ED1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: CallProcWindow
                              • String ID:
                              • API String ID: 2714655100-0
                              • Opcode ID: 8f42cd062e10b29426ac12283234c3789bf94e9cec128a69c772c52a88f71694
                              • Instruction ID: 10e46d26093e94646738ade25460438ab2735d7c04b2daf5a3c5f10ba40ce2dc
                              • Opcode Fuzzy Hash: 8f42cd062e10b29426ac12283234c3789bf94e9cec128a69c772c52a88f71694
                              • Instruction Fuzzy Hash: C44117B9D00209DFCB54CF99C448AABBBF5FB88314F24C499D519AB361D774A841CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,0285FC45), ref: 0285FCC8
                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: 2b04cc10a15f0623a110aa6a1165edf5b510c1d1d384de45693bef715f96135d
                              • Instruction ID: 7633e6e968d92c5991298125f3129f70323834644b079b6cb071503e6df589e0
                              • Opcode Fuzzy Hash: 2b04cc10a15f0623a110aa6a1165edf5b510c1d1d384de45693bef715f96135d
                              • Instruction Fuzzy Hash: C42147B9C0066A9FCB10CFAAC5457DEFBB4EB48320F10812AD858A7640D738A941CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,0285FC45), ref: 0285FCC8
                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: b83e8f8139ae4c105eb88aad6105fc874f4ede6bcae5dec4bcfdd69fe5f363ec
                              • Instruction ID: 29efc62d48deeb111fc884822754bf04a316a9377b07950941074f27fcb6808b
                              • Opcode Fuzzy Hash: b83e8f8139ae4c105eb88aad6105fc874f4ede6bcae5dec4bcfdd69fe5f363ec
                              • Instruction Fuzzy Hash: 602156B9C006699BCB14CF9AC5447AEFBF4EB48320F10816AD918B7740D378A944CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 064D09C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: fbc49796827404ddded107a7f24b57c55c60a360059f89c1e84bd1b638f11c52
                              • Instruction ID: 632f1c227010140017f20a82d44fca608fbd54d279274da4c3ef50949dfa29ea
                              • Opcode Fuzzy Hash: fbc49796827404ddded107a7f24b57c55c60a360059f89c1e84bd1b638f11c52
                              • Instruction Fuzzy Hash: 051126B6D00248DFDB20CF9AD844ADFFBF4EB88710F10842AE459A7250C375A545CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 064D09C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 88e82002f4eb2aa2b1bb08ded3107a37739ea53ca10db138bfdd033065677509
                              • Instruction ID: 25ceae379b3309e9c4c58abcf808c7593cbc5bc5ac74e5b32ac73a1ff88668b5
                              • Opcode Fuzzy Hash: 88e82002f4eb2aa2b1bb08ded3107a37739ea53ca10db138bfdd033065677509
                              • Instruction Fuzzy Hash: 4E11F0B6D00249CFDB20CF9AD844ADEFBF4EB88720F14846AE459A7250C379A545CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 064D0756
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: a6a49bfc3c3e5c138c2f3e991957af1b29f7a63f8075a3fc46321e4016e69686
                              • Instruction ID: c4186c88859968652d6a2931e2d63a240cf6f3e0f0b47b4b3cf2094a329cdc9a
                              • Opcode Fuzzy Hash: a6a49bfc3c3e5c138c2f3e991957af1b29f7a63f8075a3fc46321e4016e69686
                              • Instruction Fuzzy Hash: D61113B5C003498FCB50DF9AC444ADEFBF4EB88714F10842AD469B7210C375A545CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OleInitialize.OLE32(00000000), ref: 064D75B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: 95a8cc9833bcc1938a689e5fc051898cdb48ec53e4ef6fd07a30d0ba71cc89b0
                              • Instruction ID: 1df71a0d1355f685a71eb5a0c2657c252df8dbd19525bf867fc5277e2d82c32e
                              • Opcode Fuzzy Hash: 95a8cc9833bcc1938a689e5fc051898cdb48ec53e4ef6fd07a30d0ba71cc89b0
                              • Instruction Fuzzy Hash: B61103B58002498FCB20DF9AD544BDEFBF4EB48324F10841AD559A7750C378A584CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OleInitialize.OLE32(00000000), ref: 064D75B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: d1be61047bd2ce9fbf76ce77d4dcb85236c3fd1d885555a68a87109779ceac32
                              • Instruction ID: 26a48026d3cb821f16ef4c28ca3fdce415f6d2c68b9af34f8511637c7b930a63
                              • Opcode Fuzzy Hash: d1be61047bd2ce9fbf76ce77d4dcb85236c3fd1d885555a68a87109779ceac32
                              • Instruction Fuzzy Hash: 2F1100B5D002488FCB60DF9AD548BDEBBF8EB48324F20845AE558A7750D378A944CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075102246.0000000000DAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DAD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_dad000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b532ef21bd4398bb33eff8e7f73bf2d838c30a3d46b312b8cb24aa1061055c5d
                              • Instruction ID: c238434fb1b2abb256dd2334fef3ddfcb056c2fd5560b10b8cd107b77074bf08
                              • Opcode Fuzzy Hash: b532ef21bd4398bb33eff8e7f73bf2d838c30a3d46b312b8cb24aa1061055c5d
                              • Instruction Fuzzy Hash: EE216A71900200DFCB04DF04C9C4B17BFA6FB9A318F24C569D80A0B656C336D846C7B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075134450.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_dbd000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d474b6d32ef7a5592ba7dea66e5c894df10649c876a7755715263e94d16331a1
                              • Instruction ID: bd3c4d194f225baa1ab0463e5021d568d511bc8bf4a15851bc35e6cd891b07ce
                              • Opcode Fuzzy Hash: d474b6d32ef7a5592ba7dea66e5c894df10649c876a7755715263e94d16331a1
                              • Instruction Fuzzy Hash: E02134B1500340DFDB05DF18C9C0B66BBA6FB84314F24C56DD84A4B256D33AD846CA71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4078784352.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64f0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6ad6d4eb73b15dfebb34713080a3c721cff5863a69a261ceef58f53edcecea23
                              • Instruction ID: 6326cf324569c3791d8977abe271938ba77bd8c6a9a1a9b1c220ab874b7e4d85
                              • Opcode Fuzzy Hash: 6ad6d4eb73b15dfebb34713080a3c721cff5863a69a261ceef58f53edcecea23
                              • Instruction Fuzzy Hash: 97216738306B509FC7069B24D42889EBF73BBC96213048346D98287786CB34E993CBD6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4078784352.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64f0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6a871898af2f873e2410888b10d4e857b07a7989ae93db7a24967a361a622aa4
                              • Instruction ID: 3c80c333092c0a37908c42b8d2e0fdb72dad02493426e635a194cd02b68a167d
                              • Opcode Fuzzy Hash: 6a871898af2f873e2410888b10d4e857b07a7989ae93db7a24967a361a622aa4
                              • Instruction Fuzzy Hash: F111AC38303B159B87059F25D45889EBB63FBCC6213509306E94687B45CB34F9D3CAD5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075102246.0000000000DAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DAD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_dad000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                              • Instruction ID: 59eaaf3ecb3e4298f0edb19fe39919f5fea0b2cc5af9e8097c5b3f4ec5073c9f
                              • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                              • Instruction Fuzzy Hash: 0911E676904240CFCB16CF14D5C4B16BF72FB95318F28C6A9DD0A0B656C33AD85ACBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075134450.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_dbd000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                              • Instruction ID: e806af7b4cb81e7da9352750ad63804d5519c78feab7ece760ee165f9f73960b
                              • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                              • Instruction Fuzzy Hash: 3711BE75504280CFDB01CF14D5C4B55BF62FB44314F28C6AADC0A4B656D33AD80ACB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4078784352.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64f0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9f8d28f97add09e687e4895a0f7f2489d114e053e0b0767e52357643bb2c7cb6
                              • Instruction ID: fce0d9fb6b2327364e02724edfd86c37a6a9dee372e0709a160f07920565c0ea
                              • Opcode Fuzzy Hash: 9f8d28f97add09e687e4895a0f7f2489d114e053e0b0767e52357643bb2c7cb6
                              • Instruction Fuzzy Hash: C4114738302B159B8709AB29D45889EBB67FBCC6213149316ED4683B45CB34FDD38AD5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 89a96e7be41736d2b222a50e92f9d98edcac3da74d58700671180984a987e8dd
                              • Instruction ID: 73a5d88965f742b4acb7083295ef6eb391bd42e71256cefeaa69a2099431fb37
                              • Opcode Fuzzy Hash: 89a96e7be41736d2b222a50e92f9d98edcac3da74d58700671180984a987e8dd
                              • Instruction Fuzzy Hash: 1752F6B8D80706CFEB10CF18E8881997BB1FB41714FE14A2AD6516B6E0D7B875A6CF44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4078738408.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_64d0000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f5df48b3a2fd751e4d3b82c54188f172cc95c7770a67d627a18901ed907e7507
                              • Instruction ID: 0ef3bccce2b54488dd75df18bcf21ec970b2bc4cde69ae736e29bbb300fd100f
                              • Opcode Fuzzy Hash: f5df48b3a2fd751e4d3b82c54188f172cc95c7770a67d627a18901ed907e7507
                              • Instruction Fuzzy Hash: FBD14930E00209CFEB55DFA9C958BAEBBF1AF44704F15856AE409AF3A5DB70D945CB80
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.4075429519.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2850000_xtnhsVjQTxvH.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ad9b46ca87a86dd07de2f48069b37afcaab0152aebd497792fc83eb4e3b55949
                              • Instruction ID: 0fba4230a97ab812b02d342da2812e724f7df8008edb1bc383cfdf538d998b73
                              • Opcode Fuzzy Hash: ad9b46ca87a86dd07de2f48069b37afcaab0152aebd497792fc83eb4e3b55949
                              • Instruction Fuzzy Hash: E6917278E00219CFDF10CFA9D9857DDBBF2AF88318F148129E849E7294EB749845CB91
                              Uniqueness

                              Uniqueness Score: -1.00%