Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
level2.exe

Overview

General Information

Sample name:level2.exe
Analysis ID:1436366
MD5:342a6865ba2400f978e72f94d3c69e40
SHA1:56b6201c503864d3fc8f80d6414f4f2de4a98567
SHA256:86ab24486b8ac6877c1fca99f6132b2ec86400b66518695f0ca6224e4aa8a403
Tags:exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • level2.exe (PID: 5496 cmdline: "C:\Users\user\Desktop\level2.exe" MD5: 342A6865BA2400F978E72F94D3C69E40)
    • conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: level2.exeAvira: detected
Source: level2.exeReversingLabs: Detection: 34%
Source: level2.exeVirustotal: Detection: 43%Perma Link
Source: level2.exeJoe Sandbox ML: detected

Compliance

barindex
Source: C:\Users\user\Desktop\level2.exeUnpacked PE file: 0.2.level2.exe.c40000.0.unpack
Source: level2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: level2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\level2.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\level2.exeCode function: 0_2_00007FFD9B8A16090_2_00007FFD9B8A1609
Source: C:\Users\user\Desktop\level2.exeCode function: 0_2_00007FFD9B8A2F190_2_00007FFD9B8A2F19
Source: C:\Users\user\Desktop\level2.exeCode function: 0_2_00007FFD9B8A21F90_2_00007FFD9B8A21F9
Source: level2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal84.evad.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\level2.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_03
Source: level2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: level2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\level2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: level2.exeReversingLabs: Detection: 34%
Source: level2.exeVirustotal: Detection: 43%
Source: C:\Users\user\Desktop\level2.exeFile read: C:\Users\user\Desktop\level2.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\level2.exe "C:\Users\user\Desktop\level2.exe"
Source: C:\Users\user\Desktop\level2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\level2.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\level2.exeSection loaded: cryptbase.dllJump to behavior
Source: level2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: level2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\level2.exeUnpacked PE file: 0.2.level2.exe.c40000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
Source: C:\Users\user\Desktop\level2.exeUnpacked PE file: 0.2.level2.exe.c40000.0.unpack
Source: level2.exe, bSVG.cs.Net Code: XdFM System.Reflection.Assembly.Load(byte[])
Source: 0.2.level2.exe.12ff1508.2.raw.unpack, bSVG.cs.Net Code: XdFM System.Reflection.Assembly.Load(byte[])
Source: 0.2.level2.exe.12fd9ac0.1.raw.unpack, bSVG.cs.Net Code: XdFM System.Reflection.Assembly.Load(byte[])
Source: level2.exe, FMxX.csHigh entropy of concatenated method names: 'hgyU', 'rMRI', 'ZBIz', 'bSGU', 'FsIV', 'udOO', 'pxaG', 'ZHOa', 'lPES', 'oCQd'
Source: 0.2.level2.exe.12ff1508.2.raw.unpack, FMxX.csHigh entropy of concatenated method names: 'hgyU', 'rMRI', 'ZBIz', 'bSGU', 'FsIV', 'udOO', 'pxaG', 'ZHOa', 'lPES', 'oCQd'
Source: 0.2.level2.exe.12fd9ac0.1.raw.unpack, FMxX.csHigh entropy of concatenated method names: 'hgyU', 'rMRI', 'ZBIz', 'bSGU', 'FsIV', 'udOO', 'pxaG', 'ZHOa', 'lPES', 'oCQd'
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\level2.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\level2.exeMemory allocated: 1AFD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\level2.exeWindow / User API: threadDelayed 616Jump to behavior
Source: C:\Users\user\Desktop\level2.exeWindow / User API: threadDelayed 9380Jump to behavior
Source: C:\Users\user\Desktop\level2.exe TID: 7176Thread sleep time: -616000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\level2.exe TID: 7176Thread sleep time: -9380000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\level2.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed

Anti Debugging

barindex
Source: C:\Users\user\Desktop\level2.exeProcess Stats: CPU usage > 42% for more than 60s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\level2.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\level2.exeQueries volume information: C:\Users\user\Desktop\level2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\level2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
121
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory121
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
Software Packing
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
level2.exe34%ReversingLabsByteCode-MSIL.Trojan.Mamut
level2.exe43%VirustotalBrowse
level2.exe100%AviraTR/Dropper.Gen
level2.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1436366
Start date and time:2024-05-04 19:31:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 18s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:level2.exe
Detection:MAL
Classification:mal84.evad.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
19:32:25API Interceptor17188111x Sleep call for process: level2.exe modified
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\level2.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):369
Entropy (8bit):4.375777799748655
Encrypted:false
SSDEEP:6:FK/SpevBjXyExFJIkaQgg1+SNJL50rcj1yE1z0ygANF0N99ROjxOD5e:8+QBTNxLIkaLg1nJl7j1yn7Ac79gtge
MD5:EB269B7A84D0E9DCF6EB01DD71A6AB60
SHA1:404764B1AD8360F6F6B990AA00265B2EE5EC83E4
SHA-256:F654FC9E2476CC2F5BB2241376DBD080978D6095859268430C4A772DEBC470C0
SHA-512:F844AA2BFC6719DED7F196FABF56E5DF2722D0B4127578323D98A842AF867445798FEA057760A38A049E67B2034288AA8C8841779BAD7CF64AE204083EB52C1D
Malicious:false
Reputation:low
Preview:Welcome to The Gauntlet, brave adventurer!..You have been chosen to embark on a quest to retrieve the legendary Sword of Power...You must journey through the treacherous Caverns of Doom to find it...Beware, for many have entered the caverns, but none have returned...Do you have the courage to face the challenges that lie ahead?..Press any key to begin your quest.....
File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.548923196899289
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:level2.exe
File size:96'784 bytes
MD5:342a6865ba2400f978e72f94d3c69e40
SHA1:56b6201c503864d3fc8f80d6414f4f2de4a98567
SHA256:86ab24486b8ac6877c1fca99f6132b2ec86400b66518695f0ca6224e4aa8a403
SHA512:cbedd7aa63d0bec1729075cbd0ddbd723f90809919de9c9b4a48237642621e501749eb151d71778175636f08c73eb5d581ac66b5600c3241c16f6071d2ef2062
SSDEEP:1536:bz67ENhMnqvYDlE0K+jb6DGvTLHbm3FC7qju2jtaQKJnjx6AzVdl3d+LQ:P67ENhMnqvglI+j+DGvTLHbmU7qjuAtM
TLSH:3993224697C47F2FCA3B1A3544E3821F0A36AB031719AB4E66610E916A12FD36C1FF75
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w.f.................p............... ........@.. ....................................@................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x418eee
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x660577D3 [Thu Mar 28 13:59:47 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x18e980x53.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x600.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x16ef40x17000e0363553524360eb748e9f3d9b7fd5bdFalse0.37814198369565216data5.55954103679308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x1a0000x6000x600f9ff8431954806e0af799478e135f007False0.3802083333333333data4.733123049719177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1c0000xc0x200a7b80dbb92ee87c0a6640fc562df6696False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x1a0a00x224dataEnglishUnited States0.4781021897810219
RT_MANIFEST0x1a2c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
DLLImport
mscoree.dll_CorExeMain
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:19:31:49
Start date:04/05/2024
Path:C:\Users\user\Desktop\level2.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\level2.exe"
Imagebase:0xc40000
File size:96'784 bytes
MD5 hash:342A6865BA2400F978E72F94D3C69E40
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:19:31:49
Start date:04/05/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:10.6%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:6
    Total number of Limit Nodes:0
    execution_graph 5582 7ffd9b8a506d 5583 7ffd9b8a5077 VirtualProtect 5582->5583 5585 7ffd9b8a53c1 5583->5585 5586 7ffd9b8a503d 5587 7ffd9b8a5042 VirtualProtect 5586->5587 5589 7ffd9b8a53c1 5587->5589
    Memory Dump Source
    • Source File: 00000000.00000002.4053798327.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_level2.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 887d42c02908c6118f180e10bad278c44fa9a175bcd7bf338142cfd87fb34dda
    • Instruction ID: 042ed58128d2e711ef2ef675edf966f0cf3320bd7d92916f448c33d640483b57
    • Opcode Fuzzy Hash: 887d42c02908c6118f180e10bad278c44fa9a175bcd7bf338142cfd87fb34dda
    • Instruction Fuzzy Hash: 17C2E430F1960A4FE76987ACC8E467873D1EB4A704F2641B9D09EC72E7DD29ED838650
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 990 7ffd9b8a1609-7ffd9b8a160f 991 7ffd9b8a1612-7ffd9b8a1640 990->991 992 7ffd9b8a1611 990->992 994 7ffd9b8a1650-7ffd9b8a1654 991->994 992->991 995 7ffd9b8a1656-7ffd9b8a1657 994->995 996 7ffd9b8a1688-7ffd9b8a168c 994->996 999 7ffd9b8a165e-7ffd9b8a1662 995->999 997 7ffd9b8a168e-7ffd9b8a1696 996->997 998 7ffd9b8a16a2-7ffd9b8a16b3 996->998 1000 7ffd9b8a169c-7ffd9b8a169d 997->1000 1001 7ffd9b8a17db-7ffd9b8a17e0 997->1001 1002 7ffd9b8a16b9-7ffd9b8a16c5 998->1002 1003 7ffd9b8a17e1-7ffd9b8a17f5 998->1003 1005 7ffd9b8a1669-7ffd9b8a1678 999->1005 1000->998 1001->1003 1002->1003 1004 7ffd9b8a16cb-7ffd9b8a16d2 1002->1004 1014 7ffd9b8a17f7-7ffd9b8a17fb 1003->1014 1015 7ffd9b8a17fd-7ffd9b8a1941 1003->1015 1008 7ffd9b8a1701-7ffd9b8a1707 1004->1008 1009 7ffd9b8a16d4-7ffd9b8a16d6 1004->1009 1005->1003 1013 7ffd9b8a167e-7ffd9b8a1682 1005->1013 1008->1003 1012 7ffd9b8a170d-7ffd9b8a1719 1008->1012 1010 7ffd9b8a1786-7ffd9b8a1789 1009->1010 1011 7ffd9b8a16dc-7ffd9b8a16e2 1009->1011 1010->1003 1016 7ffd9b8a178b-7ffd9b8a179a 1010->1016 1011->1003 1017 7ffd9b8a16e8-7ffd9b8a16f4 1011->1017 1012->1003 1018 7ffd9b8a171f-7ffd9b8a1726 1012->1018 1013->996 1014->1015 1063 7ffd9b8a196e-7ffd9b8a1975 1015->1063 1064 7ffd9b8a1943-7ffd9b8a1949 1015->1064 1020 7ffd9b8a179f-7ffd9b8a17a2 1016->1020 1017->1003 1021 7ffd9b8a16fa-7ffd9b8a16fe 1017->1021 1022 7ffd9b8a1756-7ffd9b8a175a 1018->1022 1023 7ffd9b8a1728-7ffd9b8a172b 1018->1023 1024 7ffd9b8a17aa-7ffd9b8a17b0 1020->1024 1025 7ffd9b8a17a4-7ffd9b8a17a5 1020->1025 1021->1008 1027 7ffd9b8a175c-7ffd9b8a175d 1022->1027 1028 7ffd9b8a1762-7ffd9b8a1766 1022->1028 1023->1001 1026 7ffd9b8a1731-7ffd9b8a1737 1023->1026 1024->1003 1030 7ffd9b8a17b2-7ffd9b8a17bb 1024->1030 1025->1024 1026->1003 1031 7ffd9b8a173d-7ffd9b8a1749 1026->1031 1027->1028 1028->1009 1032 7ffd9b8a176c-7ffd9b8a1770 1028->1032 1030->1003 1033 7ffd9b8a17bd-7ffd9b8a17c3 1030->1033 1031->1003 1034 7ffd9b8a174f-7ffd9b8a1753 1031->1034 1035 7ffd9b8a1780-7ffd9b8a1784 1032->1035 1036 7ffd9b8a1772-7ffd9b8a177b 1032->1036 1038 7ffd9b8a17c9-7ffd9b8a17da 1033->1038 1039 7ffd9b8a1642-7ffd9b8a1646 1033->1039 1034->1022 1035->1010 1035->1020 1036->1035 1039->994 1040 7ffd9b8a1648-7ffd9b8a164b 1039->1040 1040->994 1065 7ffd9b8a1976-7ffd9b8a19ce 1063->1065 1064->1065 1066 7ffd9b8a194b-7ffd9b8a196d 1064->1066 1072 7ffd9b8a19d0-7ffd9b8a19d6 1065->1072 1073 7ffd9b8a19df-7ffd9b8a19e5 1065->1073 1066->1063 1076 7ffd9b8a19e6 1072->1076 1077 7ffd9b8a19d8-7ffd9b8a19de 1072->1077 1073->1076 1078 7ffd9b8a19e8 1076->1078 1079 7ffd9b8a19f4-7ffd9b8a19f6 1076->1079 1077->1073 1085 7ffd9b8a19ed-7ffd9b8a19ee 1077->1085 1078->1085 1080 7ffd9b8a19f8 1079->1080 1081 7ffd9b8a1a02-7ffd9b8a1a06 1079->1081 1086 7ffd9b8a19fb-7ffd9b8a19fe 1080->1086 1083 7ffd9b8a1a08 1081->1083 1084 7ffd9b8a1a10-7ffd9b8a1a66 1081->1084 1088 7ffd9b8a1a09-7ffd9b8a1a0e 1083->1088 1096 7ffd9b8a1a69-7ffd9b8a1a7f 1084->1096 1085->1086 1087 7ffd9b8a19f0 1085->1087 1086->1088 1089 7ffd9b8a1a00 1086->1089 1087->1079 1088->1084 1089->1081 1096->1096 1097 7ffd9b8a1a81-7ffd9b8a1a9e 1096->1097
    Memory Dump Source
    • Source File: 00000000.00000002.4053798327.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_level2.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4c5b3eca949098c86f08fffdbea10d3178b09852812f9203bb70c5eb74d6d859
    • Instruction ID: 8f1e12b4a832a2bbd0dde48802563a67b5ec05aff43d262e8fab7b566c5ca063
    • Opcode Fuzzy Hash: 4c5b3eca949098c86f08fffdbea10d3178b09852812f9203bb70c5eb74d6d859
    • Instruction Fuzzy Hash: 79F12822B0D16A8AD71A77BCB86A5F97B90DF46334F0942B7D19E8B0D7EC087447C291
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    Memory Dump Source
    • Source File: 00000000.00000002.4053798327.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_level2.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b5efec51c2c825fd4fa74708c5f2ffa85e2dcc6592624408a58206dfda9cc6a7
    • Instruction ID: 610c249a114a66f8ee11e1cff61e410ca954faa053c33ea3dc582733e35c6228
    • Opcode Fuzzy Hash: b5efec51c2c825fd4fa74708c5f2ffa85e2dcc6592624408a58206dfda9cc6a7
    • Instruction Fuzzy Hash: F8416A31A0DB894FEB19DB68881A9F97BF0EF66311F04417FD049C30A3CB656846C791
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 14 7ffd9b8a506d-7ffd9b8a53bf VirtualProtect 23 7ffd9b8a53c7-7ffd9b8a53ef 14->23 24 7ffd9b8a53c1 14->24 24->23
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4053798327.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_level2.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID:
    • API String ID: 544645111-0
    • Opcode ID: e285d976fa9eb529c8963135d6f070069df4b9220d891d1dcfa55f4d1485e727
    • Instruction ID: d24481d579fb3976d0428a78ea1875441c057aba325baf4edd8d6c31e30ff366
    • Opcode Fuzzy Hash: e285d976fa9eb529c8963135d6f070069df4b9220d891d1dcfa55f4d1485e727
    • Instruction Fuzzy Hash: 80412431A0DA884FDB19DB689C5AAF97BF0EF56310F0441BFD089C71A3CB616846CB91
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4053798327.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_level2.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 258ae3eaa0280b8046714db1c6e59a88037507ddf087315820f0b608eacfa7a8
    • Instruction ID: fe6b323b134b9958572ebe82f585b951e06598391003ee6746a7458450b6372e
    • Opcode Fuzzy Hash: 258ae3eaa0280b8046714db1c6e59a88037507ddf087315820f0b608eacfa7a8
    • Instruction Fuzzy Hash: 3182C230F1E11A4FE27D8BAC8AE467873D1FB4A714F665278D09EC71A7D928ED438250
    Uniqueness

    Uniqueness Score: -1.00%