Analysis Report dt9XEhpeQQ
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Machine Learning detection for sample | Show sources |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
System Summary: |
---|
Potential malicious icon found | Show sources |
Source: | Icon embedded in PE file: |
Source: | Process Stats: |
Source: | Code function: | 0_2_0227578F |
Source: | Code function: | 0_2_00401368 | |
Source: | Code function: | 0_2_0227578F | |
Source: | Code function: | 0_2_02274A31 | |
Source: | Code function: | 0_2_02272A05 | |
Source: | Code function: | 0_2_0227127D | |
Source: | Code function: | 0_2_02270247 | |
Source: | Code function: | 0_2_022782E3 | |
Source: | Code function: | 0_2_022776CE | |
Source: | Code function: | 0_2_02271F06 | |
Source: | Code function: | 0_2_02272F01 | |
Source: | Code function: | 0_2_02274700 | |
Source: | Code function: | 0_2_02271F11 | |
Source: | Code function: | 0_2_02270763 | |
Source: | Code function: | 0_2_02278F6A | |
Source: | Code function: | 0_2_0227737E | |
Source: | Code function: | 0_2_02278F7C | |
Source: | Code function: | 0_2_02274B5A | |
Source: | Code function: | 0_2_022723A5 | |
Source: | Code function: | 0_2_022717A4 | |
Source: | Code function: | 0_2_02270F82 | |
Source: | Code function: | 0_2_02271389 | |
Source: | Code function: | 0_2_02271793 | |
Source: | Code function: | 0_2_022783EB | |
Source: | Code function: | 0_2_0227282E | |
Source: | Code function: | 0_2_0227903F | |
Source: | Code function: | 0_2_0227541A | |
Source: | Code function: | 0_2_02272869 | |
Source: | Code function: | 0_2_02273041 | |
Source: | Code function: | 0_2_02272CBB | |
Source: | Code function: | 0_2_02271C8D | |
Source: | Code function: | 0_2_0227389C | |
Source: | Code function: | 0_2_02271498 | |
Source: | Code function: | 0_2_022784E9 | |
Source: | Code function: | 0_2_022730D6 | |
Source: | Code function: | 0_2_02274922 | |
Source: | Code function: | 0_2_0227452A | |
Source: | Code function: | 0_2_02277929 | |
Source: | Code function: | 0_2_022741B9 | |
Source: | Code function: | 0_2_022725ED | |
Source: | Code function: | 0_2_022705C4 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Section loaded: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Data Obfuscation: |
---|
Yara detected GuLoader | Show sources |
Source: | File source: |
Source: | Code function: | 0_2_004190FB | |
Source: | Code function: | 0_2_0041B156 | |
Source: | Code function: | 0_2_0041DB0C | |
Source: | Code function: | 0_2_00419F9A | |
Source: | Code function: | 0_2_00621621 | |
Source: | Code function: | 0_2_00623091 | |
Source: | Code function: | 0_2_00621891 | |
Source: | Code function: | 0_2_00624891 | |
Source: | Code function: | 0_2_00626091 | |
Source: | Code function: | 0_2_00620091 | |
Source: | Code function: | 0_2_006220A1 | |
Source: | Code function: | 0_2_006238A1 | |
Source: | Code function: | 0_2_006250A1 | |
Source: | Code function: | 0_2_006268A1 | |
Source: | Code function: | 0_2_006208A1 | |
Source: | Code function: | 0_2_00620871 | |
Source: | Code function: | 0_2_00622071 | |
Source: | Code function: | 0_2_00623871 | |
Source: | Code function: | 0_2_00625071 | |
Source: | Code function: | 0_2_00626871 | |
Source: | Code function: | 0_2_00621081 | |
Source: | Code function: | 0_2_00622881 | |
Source: | Code function: | 0_2_00624081 | |
Source: | Code function: | 0_2_00625881 | |
Source: | Code function: | 0_2_00627081 | |
Source: | Code function: | 0_2_00621051 | |
Source: | Code function: | 0_2_00622851 | |
Source: | Code function: | 0_2_00624051 | |
Source: | Code function: | 0_2_00627051 | |
Source: | Code function: | 0_2_00625851 | |
Source: | Code function: | 0_2_00624861 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion: |
---|
Contains functionality to detect hardware virtualization (CPUID execution measurement) | Show sources |
Source: | Code function: | 0_2_0227578F | |
Source: | Code function: | 0_2_022782E3 | |
Source: | Code function: | 0_2_02272F01 | |
Source: | Code function: | 0_2_02274700 | |
Source: | Code function: | 0_2_02278F6A | |
Source: | Code function: | 0_2_022723A5 | |
Source: | Code function: | 0_2_02270F82 | |
Source: | Code function: | 0_2_022783EB | |
Source: | Code function: | 0_2_0227282E | |
Source: | Code function: | 0_2_02273041 | |
Source: | Code function: | 0_2_02272CBB | |
Source: | Code function: | 0_2_022784E9 | |
Source: | Code function: | 0_2_022730D6 | |
Source: | Code function: | 0_2_0227452A | |
Source: | Code function: | 0_2_02277929 | |
Source: | Code function: | 0_2_022741B9 |
Detected RDTSC dummy instruction sequence (likely for instruction hammering) | Show sources |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Tries to detect virtualization through RDTSC time measurements | Show sources |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Code function: | 0_2_0227578F |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Anti Debugging: |
---|
Found potential dummy code loops (likely to delay analysis) | Show sources |
Source: | Process Stats: |
Source: | Code function: | 0_2_0227578F |
Source: | Code function: | 0_2_022782E3 | |
Source: | Code function: | 0_2_02275346 | |
Source: | Code function: | 0_2_02277390 | |
Source: | Code function: | 0_2_0227787F | |
Source: | Code function: | 0_2_02272CBB | |
Source: | Code function: | 0_2_0227389C |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Virtualization/Sandbox Evasion11 | OS Credential Dumping | Security Software Discovery41 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection1 | LSASS Memory | Virtualization/Sandbox Evasion11 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information1 | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Information Discovery31 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 431849 |
Start date: | 09.06.2021 |
Start time: | 12:54:54 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | dt9XEhpeQQ (renamed file extension from none to exe) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 36 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal76.rans.troj.evad.winEXE@1/0@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
Created / dropped Files |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 3.8630055260118947 |
TrID: |
|
File name: | dt9XEhpeQQ.exe |
File size: | 204800 |
MD5: | 5423976b486afd6a8dad047fb947b190 |
SHA1: | f04947aa1b4e9500e4b31d2365ac886447ba4427 |
SHA256: | e73ecaf549049b8c4f8701e55c95220e09890df2d93ef52465ccd4b448a6d19f |
SHA512: | 8b4e3e0110d9a24efc2b4fd4ba79bc9aa5dfedb0d567259cd7068d361d7a1f85bfb55dca921700bb90faf3ade1820ce87b6b8e60f9436dff0b90780e084b1dd6 |
SSDEEP: | 1536:9hWwhz1ljHnmEik/dZNgmZZfOc7Gec1GvI5wumCWC0tkC:+whR/dZNgmz2Qq1GUwumCWC0tV |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L....4DK..................... ......h.............@................ |
File Icon |
---|
Icon Hash: | 20047c7c70f0e004 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x401368 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x4B443402 [Wed Jan 6 06:56:02 2010 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | b2e3727c442d471988cc35e3702b319a |
Entrypoint Preview |
---|
Instruction |
---|
push 00429D64h |
call 00007F8C6CD67A43h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
xor byte ptr [eax], al |
add byte ptr [eax], al |
cmp byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
adc bh, bl |
fstp tbyte ptr [ebx+497210B7h] |
mov bl, 10h |
lds eax, fword ptr [esi-14E51407h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax], eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
test al, 58h |
adc al, 03h |
je 00007F8C6CD67AB7h |
jc 00007F8C6CD67AC4h |
popad |
outsb |
add byte ptr [ebx], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
dec esp |
xor dword ptr [eax], eax |
adc byte ptr [esi], dl |
push edi |
pushfd |
sbb al, ah |
sbb eax, 59A949B2h |
clc |
or al, F3h |
test byte ptr [edi], ch |
outsd |
inc ebx |
push FFFFFFC0h |
add bl, dl |
jbe 00007F8C6CD679ECh |
dec esp |
mov ebx, 622546F3h |
dec esi |
jnle 00007F8C6CD67A8Dh |
dec edi |
lodsd |
xor ebx, dword ptr [ecx-48EE309Ah] |
or al, 00h |
stosb |
add byte ptr [eax-2Dh], ah |
xchg eax, ebx |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
mov eax, 43000288h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add eax, 56445200h |
dec ecx |
dec esi |
add byte ptr [48000801h], cl |
outsd |
insd |
bound esp, dword ptr [ecx+6Eh] |
imul eax, dword ptr [eax], 19h |
add dword ptr [eax], eax |
inc edx |
add byte ptr [edx], ah |
add byte ptr [eax+ecx], ah |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2f214 | 0x28 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x31000 | 0x994 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x228 | 0x20 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0x128 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2e6ec | 0x2f000 | False | 0.229549326795 | data | 3.95505433936 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0xa7c | 0x1000 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x31000 | 0x994 | 0x1000 | False | 0.17919921875 | data | 2.11718629693 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x31864 | 0x130 | data | ||
RT_ICON | 0x3157c | 0x2e8 | data | ||
RT_ICON | 0x31454 | 0x128 | GLS_BINARY_LSB_FIRST | ||
RT_GROUP_ICON | 0x31424 | 0x30 | data | ||
RT_VERSION | 0x31150 | 0x2d4 | data | English | United States |
Imports |
---|
DLL | Import |
---|---|
MSVBVM60.DLL | _CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaStrToAnsi, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr |
Version Infos |
---|
Description | Data |
---|---|
Translation | 0x0409 0x04b0 |
LegalCopyright | CInc. |
InternalName | Skiftela2 |
FileVersion | 1.00 |
CompanyName | Jummes |
LegalTrademarks | CInc. |
Comments | Jummes |
ProductName | Jummes |
ProductVersion | 1.00 |
FileDescription | Jummes |
OriginalFilename | Skiftela2.exe |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 12:55:39 |
Start date: | 09/06/2021 |
Path: | C:\Users\user\Desktop\dt9XEhpeQQ.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 204800 bytes |
MD5 hash: | 5423976B486AFD6A8DAD047FB947B190 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Visual Basic |
Yara matches: |
|
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|
Execution Graph |
---|
Execution Coverage: | 1.1% |
Dynamic/Decrypted Code Coverage: | 68.8% |
Signature Coverage: | 36.8% |
Total number of Nodes: | 516 |
Total number of Limit Nodes: | 49 |
Graph
Executed Functions |
---|
Function 0227578F, Relevance: 6.1, APIs: 1, Strings: 2, Instructions: 838memorynativeCOMMON
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042B834, Relevance: 248.0, APIs: 136, Strings: 5, Instructions: 1279COMMON
C-Code - Quality: 51% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
C-Code - Quality: 53% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 006215F3, Relevance: .0, Instructions: 17COMMON
Control-flow Graph |
---|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042AE64, Relevance: .0, Instructions: 8COMMON
Control-flow Graph |
---|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042AEB8, Relevance: .0, Instructions: 8COMMON
Control-flow Graph |
---|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Function 02272CBB, Relevance: 5.2, Strings: 3, Instructions: 1427COMMON
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02278F6A, Relevance: 4.7, Strings: 3, Instructions: 980COMMON
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022723A5, Relevance: 4.6, Strings: 3, Instructions: 861COMMON
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02277929, Relevance: 4.5, Strings: 3, Instructions: 766COMMON
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227282E, Relevance: 3.4, Strings: 2, Instructions: 950COMMON
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022741B9, Relevance: 3.2, Strings: 2, Instructions: 713COMMON
Control-flow Graph |
---|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227452A, Relevance: 3.0, Strings: 2, Instructions: 542COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02274700, Relevance: 2.9, Strings: 2, Instructions: 445COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02274922, Relevance: 2.8, Strings: 2, Instructions: 346COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02274A31, Relevance: 2.8, Strings: 2, Instructions: 296COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02274B5A, Relevance: 2.8, Strings: 2, Instructions: 251COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02271F06, Relevance: 1.7, Strings: 1, Instructions: 475COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02271C8D, Relevance: 1.7, Strings: 1, Instructions: 471COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022705C4, Relevance: 1.6, Strings: 1, Instructions: 353COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02270763, Relevance: 1.6, Strings: 1, Instructions: 314COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022776CE, Relevance: 1.5, Strings: 1, Instructions: 299COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227737E, Relevance: 1.5, Strings: 1, Instructions: 298COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02271793, Relevance: 1.5, Strings: 1, Instructions: 297COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02270F82, Relevance: 1.5, Strings: 1, Instructions: 234COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02271389, Relevance: 1.5, Strings: 1, Instructions: 210COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02271498, Relevance: 1.4, Strings: 1, Instructions: 188COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02278F7C, Relevance: 1.4, Strings: 1, Instructions: 187COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227903F, Relevance: 1.4, Strings: 1, Instructions: 180COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227127D, Relevance: 1.3, Strings: 1, Instructions: 93COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022782E3, Relevance: .5, Instructions: 471COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02272F01, Relevance: .3, Instructions: 336COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02273041, Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227389C, Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022730D6, Relevance: .2, Instructions: 239COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022783EB, Relevance: .2, Instructions: 226COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02272869, Relevance: .2, Instructions: 214COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02270247, Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022784E9, Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02271F11, Relevance: .2, Instructions: 168COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022717A4, Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02272A05, Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 022725ED, Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227541A, Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0227787F, Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02275346, Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02277390, Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042EC4E, Relevance: 109.0, APIs: 58, Strings: 4, Instructions: 464COMMON
Control-flow Graph |
---|
C-Code - Quality: 47% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
C-Code - Quality: 50% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |