Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL DELIVERY.exe

Overview

General Information

Sample Name:DHL DELIVERY.exe
Analysis ID:635261
MD5:56a08fd913bfc20fa0f15a4fb204bac9
SHA1:b135f9c44b2847d494f1b2d843444711c8421cc0
SHA256:37305d441b0332e9756a972f0585748807fb90ef363116aa6a224cefa120d09e
Tags:AgentTeslaDHLexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • DHL DELIVERY.exe (PID: 6860 cmdline: "C:\Users\user\Desktop\DHL DELIVERY.exe" MD5: 56A08FD913BFC20FA0F15A4FB204BAC9)
    • DHL DELIVERY.exe (PID: 6984 cmdline: C:\Users\user\Desktop\DHL DELIVERY.exe MD5: 56A08FD913BFC20FA0F15A4FB204BAC9)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "amycarrol@cobinparkop.com", "Password": "WLhpQ58eJQHBZqb", "Host": "smtp.privateemail.com"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000003.00000000.463670113.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000000.463670113.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000003.00000000.464161754.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 20 entries
            SourceRuleDescriptionAuthorStrings
            3.0.DHL DELIVERY.exe.400000.12.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              3.0.DHL DELIVERY.exe.400000.12.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                3.0.DHL DELIVERY.exe.400000.12.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32b07:$s10: logins
                • 0x3256e:$s11: credential
                • 0x2eb86:$g1: get_Clipboard
                • 0x2eb94:$g2: get_Keyboard
                • 0x2eba1:$g3: get_Password
                • 0x2fe7b:$g4: get_CtrlKeyDown
                • 0x2fe8b:$g5: get_ShiftKeyDown
                • 0x2fe9c:$g6: get_AltKeyDown
                3.0.DHL DELIVERY.exe.400000.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  3.0.DHL DELIVERY.exe.400000.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 31 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "amycarrol@cobinparkop.com", "Password": "WLhpQ58eJQHBZqb", "Host": "smtp.privateemail.com"}
                    Source: DHL DELIVERY.exeVirustotal: Detection: 30%Perma Link
                    Source: DHL DELIVERY.exeReversingLabs: Detection: 34%
                    Source: DHL DELIVERY.exeJoe Sandbox ML: detected
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 3.2.DHL DELIVERY.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 3.0.DHL DELIVERY.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 3.0.DHL DELIVERY.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8

                    Exploits

                    barindex
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43098e8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6860, type: MEMORYSTR
                    Source: DHL DELIVERY.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: DHL DELIVERY.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: c:\BuildAgent\work\1f3f66b1f4c88f9c\Runtime\src\System.Web.Cors\obj\Release\System.Web.Cors.pdb source: DHL DELIVERY.exe
                    Source: Joe Sandbox ViewIP Address: 66.29.159.53 66.29.159.53
                    Source: global trafficTCP traffic: 192.168.2.5:49775 -> 66.29.159.53:587
                    Source: global trafficTCP traffic: 192.168.2.5:49775 -> 66.29.159.53:587
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fnqsTS.com
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.privateemail.com
                    Source: DHL DELIVERY.exeString found in binary or memory: http://www.random.org/sequences/
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.697005706.00000000034A2000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696995944.000000000349A000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696902033.0000000003470000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696858077.0000000003432000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696885279.000000000346C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x2Ivz0L9UI.com
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                    Source: DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: smtp.privateemail.com

                    System Summary

                    barindex
                    Source: 3.0.DHL DELIVERY.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 3.0.DHL DELIVERY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.44234f8.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.43e34d8.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.43098e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.43098e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.43c34b8.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.43e34d8.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 3.2.DHL DELIVERY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.DHL DELIVERY.exe.44234f8.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007b70BF74AAu002d2FA9u002d4ECDu002d9893u002dC24D8DB7A007u007d/u0030A2BE619u002d75E9u002d4F9Fu002d8F5Bu002d67FE7571C6DB.csLarge array initialization: .cctor: array initializer size 11629
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b70BF74AAu002d2FA9u002d4ECDu002d9893u002dC24D8DB7A007u007d/u0030A2BE619u002d75E9u002d4F9Fu002d8F5Bu002d67FE7571C6DB.csLarge array initialization: .cctor: array initializer size 11629
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007b70BF74AAu002d2FA9u002d4ECDu002d9893u002dC24D8DB7A007u007d/u0030A2BE619u002d75E9u002d4F9Fu002d8F5Bu002d67FE7571C6DB.csLarge array initialization: .cctor: array initializer size 11629
                    Source: 3.2.DHL DELIVERY.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b70BF74AAu002d2FA9u002d4ECDu002d9893u002dC24D8DB7A007u007d/u0030A2BE619u002d75E9u002d4F9Fu002d8F5Bu002d67FE7571C6DB.csLarge array initialization: .cctor: array initializer size 11629
                    Source: DHL DELIVERY.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 3.0.DHL DELIVERY.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 3.0.DHL DELIVERY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.DHL DELIVERY.exe.44234f8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.DHL DELIVERY.exe.43e34d8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.DHL DELIVERY.exe.43098e8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 1.2.DHL DELIVERY.exe.43098e8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.DHL DELIVERY.exe.43c34b8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.DHL DELIVERY.exe.43e34d8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 3.2.DHL DELIVERY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.DHL DELIVERY.exe.44234f8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_028176A01_2_028176A0
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_028104901_2_02810490
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_0281DA081_2_0281DA08
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_02819A681_2_02819A68
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_028127481_2_02812748
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_0281047F1_2_0281047F
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_0281E5701_2_0281E570
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_0281F9981_2_0281F998
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_02819F681_2_02819F68
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_00AD61671_2_00AD6167
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_0159F0803_2_0159F080
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_0159F3C83_2_0159F3C8
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_015961203_2_01596120
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_061EBBB03_2_061EBBB0
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_061EC9003_2_061EC900
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_061E1FF83_2_061E1FF8
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_061E00403_2_061E0040
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_00AD61673_2_00AD6167
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: String function: 061E5A60 appears 55 times
                    Source: DHL DELIVERY.exe, 00000001.00000002.468229611.0000000002C09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQXOZ VPa.exe2 vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exe, 00000001.00000002.466221634.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Web.Cors.dllL vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exe, 00000001.00000002.472974687.00000000043AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQXOZ VPa.exe2 vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exe, 00000001.00000002.473251720.0000000004423000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQXOZ VPa.exe2 vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exe, 00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQXOZ VPa.exe2 vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exe, 00000003.00000002.693156633.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Web.Cors.dllL vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exe, 00000003.00000002.693211185.00000000010F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exeBinary or memory string: OriginalFilenameSystem.Web.Cors.dllL vs DHL DELIVERY.exe
                    Source: DHL DELIVERY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: DHL DELIVERY.exeVirustotal: Detection: 30%
                    Source: DHL DELIVERY.exeReversingLabs: Detection: 34%
                    Source: DHL DELIVERY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\DHL DELIVERY.exe "C:\Users\user\Desktop\DHL DELIVERY.exe"
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess created: C:\Users\user\Desktop\DHL DELIVERY.exe C:\Users\user\Desktop\DHL DELIVERY.exe
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess created: C:\Users\user\Desktop\DHL DELIVERY.exe C:\Users\user\Desktop\DHL DELIVERY.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@3/0@1/2
                    Source: DHL DELIVERY.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: DHL DELIVERY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: DHL DELIVERY.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: DHL DELIVERY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: c:\BuildAgent\work\1f3f66b1f4c88f9c\Runtime\src\System.Web.Cors\obj\Release\System.Web.Cors.pdb source: DHL DELIVERY.exe
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 1_2_02810490 push eax; retf 5500h1_2_02810DFE
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_061E9BF7 push es; ret 3_2_061EAA84
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeCode function: 3_2_061E3139 push es; iretd 3_2_061E313C
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.9180819868

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: localgroup administrators aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6860, type: MEMORYSTR
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: DHL DELIVERY.exe, 00000001.00000002.467073176.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exe TID: 7108Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exe TID: 7112Thread sleep count: 5902 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exe TID: 7112Thread sleep count: 2855 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWindow / User API: threadDelayed 5902Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWindow / User API: threadDelayed 2855Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\EnumNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: DHL DELIVERY.exe, 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: DHL DELIVERY.exe, u0033652008427/u0035457087416.csReference to suspicious API methods: ('7773566935', 'GetProcAddress@kernel32'), ('2945618246', 'LoadLibrary@kernel32')
                    Source: 1.0.DHL DELIVERY.exe.a60000.0.unpack, u0033652008427/u0035457087416.csReference to suspicious API methods: ('7773566935', 'GetProcAddress@kernel32'), ('2945618246', 'LoadLibrary@kernel32')
                    Source: 1.2.DHL DELIVERY.exe.a60000.0.unpack, u0033652008427/u0035457087416.csReference to suspicious API methods: ('7773566935', 'GetProcAddress@kernel32'), ('2945618246', 'LoadLibrary@kernel32')
                    Source: 3.0.DHL DELIVERY.exe.a60000.1.unpack, u0033652008427/u0035457087416.csReference to suspicious API methods: ('7773566935', 'GetProcAddress@kernel32'), ('2945618246', 'LoadLibrary@kernel32')
                    Source: 3.0.DHL DELIVERY.exe.a60000.2.unpack, u0033652008427/u0035457087416.csReference to suspicious API methods: ('7773566935', 'GetProcAddress@kernel32'), ('2945618246', 'LoadLibrary@kernel32')
                    Source: 3.0.DHL DELIVERY.exe.400000.8.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 3.0.DHL DELIVERY.exe.400000.4.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 3.2.DHL DELIVERY.exe.a60000.1.unpack, u0033652008427/u0035457087416.csReference to suspicious API methods: ('7773566935', 'GetProcAddress@kernel32'), ('2945618246', 'LoadLibrary@kernel32')
                    Source: 3.0.DHL DELIVERY.exe.400000.10.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 3.2.DHL DELIVERY.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeProcess created: C:\Users\user\Desktop\DHL DELIVERY.exe C:\Users\user\Desktop\DHL DELIVERY.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Users\user\Desktop\DHL DELIVERY.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Users\user\Desktop\DHL DELIVERY.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.44234f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43e34d8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43c34b8.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43e34d8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.DHL DELIVERY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.44234f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.463670113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.464161754.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.462833671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.461699324.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.473923703.000000000452C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.472974687.00000000043AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.473251720.0000000004423000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6860, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6984, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\DHL DELIVERY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: Yara matchFile source: 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6984, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.44234f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43e34d8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43c34b8.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.43e34d8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.DHL DELIVERY.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.DHL DELIVERY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHL DELIVERY.exe.44234f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.463670113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.464161754.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.462833671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.461699324.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.473923703.000000000452C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.472974687.00000000043AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.473251720.0000000004423000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6860, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DHL DELIVERY.exe PID: 6984, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception11
                    Process Injection
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Native API
                    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts131
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    211
                    Security Software Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
                    Process Injection
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin Shares2
                    Data from Local System
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                    Deobfuscate/Decode Files or Information
                    NTDS131
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureScheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Hidden Users
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common3
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    Remote System Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                    Software Packing
                    DCSync114
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DHL DELIVERY.exe31%VirustotalBrowse
                    DHL DELIVERY.exe35%ReversingLabsByteCode-MSIL.Trojan.Injuke
                    DHL DELIVERY.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    3.0.DHL DELIVERY.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    3.0.DHL DELIVERY.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    3.0.DHL DELIVERY.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    3.2.DHL DELIVERY.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    3.0.DHL DELIVERY.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    3.0.DHL DELIVERY.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                    http://x2Ivz0L9UI.com0%Avira URL Cloudsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://fnqsTS.com0%Avira URL Cloudsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    smtp.privateemail.com
                    66.29.159.53
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.random.org/sequences/DHL DELIVERY.exefalse
                        high
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://sectigo.com/CPS0DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org%%startupfolder%DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        low
                        http://x2Ivz0L9UI.comDHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.697005706.00000000034A2000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696995944.000000000349A000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696902033.0000000003470000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696858077.0000000003432000.00000004.00000800.00020000.00000000.sdmp, DHL DELIVERY.exe, 00000003.00000002.696885279.000000000346C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.sectigo.com0DHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fnqsTS.comDHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.org%DHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        low
                        http://smtp.privateemail.comDHL DELIVERY.exe, 00000003.00000002.696918969.0000000003476000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwDHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://DynDns.comDynDNSnamejidpasswordPsi/PsiDHL DELIVERY.exe, 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          66.29.159.53
                          smtp.privateemail.comUnited States
                          19538ADVANTAGECOMUSfalse
                          IP
                          192.168.2.1
                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:635261
                          Start date and time: 27/05/202218:03:222022-05-27 18:03:22 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 34s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:DHL DELIVERY.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:21
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.expl.evad.winEXE@3/0@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 0.4% (good quality ratio 0.4%)
                          • Quality average: 70.1%
                          • Quality standard deviation: 24.3%
                          HCA Information:
                          • Successful, ratio: 96%
                          • Number of executed functions: 62
                          • Number of non-executed functions: 4
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          18:04:54API Interceptor713x Sleep call for process: DHL DELIVERY.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          66.29.159.53SecuriteInfo.com.Trojan.GenericKD.49032101.27844.exeGet hashmaliciousBrowse
                            HALKBANK.exeGet hashmaliciousBrowse
                              HALKBANK.exeGet hashmaliciousBrowse
                                HALKBANK.exeGet hashmaliciousBrowse
                                  HALKBANK.exeGet hashmaliciousBrowse
                                    SW0P9o9ksjpBsnr.exeGet hashmaliciousBrowse
                                      5.exeGet hashmaliciousBrowse
                                        xxTzyGLZx5.exeGet hashmaliciousBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          smtp.privateemail.comSecuriteInfo.com.Trojan.GenericKD.49032101.27844.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          HALKBANK.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          HALKBANK.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          HALKBANK.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          HALKBANK.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          SW0P9o9ksjpBsnr.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          5.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          xxTzyGLZx5.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          triage_dropped_file.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          3CcIcrAcTaqztNz.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          quotation #Uff08HY20 PP .exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          Invoicel-datasheet.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          Invoicel-datasheet.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          dark.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          0ZZqw52a6S.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          5D8K69LJBi.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          SecuriteInfo.com.Trojan.Win32.Save.a.22692.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          Baw29sc72T.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          P.O# 70058629.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          DHL paper-work awaiting address verification.exeGet hashmaliciousBrowse
                                          • 199.193.7.228
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          ADVANTAGECOMUSyW4CYO3d2Z.exeGet hashmaliciousBrowse
                                          • 66.29.142.85
                                          lams465321.exeGet hashmaliciousBrowse
                                          • 66.29.132.145
                                          vicki.htmGet hashmaliciousBrowse
                                          • 66.29.157.122
                                          Commercial Invoice_xlsx.exeGet hashmaliciousBrowse
                                          • 66.29.155.228
                                          Bill Of Lading-Original_xlsx.exeGet hashmaliciousBrowse
                                          • 66.29.155.228
                                          EY_Document_Order459099.exeGet hashmaliciousBrowse
                                          • 66.29.155.51
                                          triage_dropped_file.exeGet hashmaliciousBrowse
                                          • 66.29.155.51
                                          shipment documents for SST2112-250..exeGet hashmaliciousBrowse
                                          • 66.29.142.85
                                          invoicecopy.exeGet hashmaliciousBrowse
                                          • 66.29.155.228
                                          pago111GR.xlsxGet hashmaliciousBrowse
                                          • 66.29.155.51
                                          lvNEkejxhv.exeGet hashmaliciousBrowse
                                          • 66.29.132.9
                                          https://dodeliver.com.pk/portal/fie.zipGet hashmaliciousBrowse
                                          • 66.29.134.113
                                          SecuriteInfo.com.Trojan.GenericKD.49032101.27844.exeGet hashmaliciousBrowse
                                          • 66.29.159.53
                                          https://www.minstroy.saratov.gov.ru/communication/blog/admin-blg/1.php?pagen=12Get hashmaliciousBrowse
                                          • 66.29.137.41
                                          Drawing for specification.xlsxGet hashmaliciousBrowse
                                          • 66.29.146.86
                                          SecuriteInfo.com.W32.MSIL_Agent.CTU.genEldorado.31574.exeGet hashmaliciousBrowse
                                          • 66.29.155.51
                                          https://sync.crwdcntrl.net/map/c=9828/tp=ADBE/gdpr=0/gdpr_consent=/tpid=62553350917825036762023184708005776201?https%3A%2F%2Fsign-smpu724eb7r29qzs1gw162nd2cilb0gppxkyfq3q1rk.website%E2%80%8B.yandexcloud.net%23dbrodie@standrew.co.ukGet hashmaliciousBrowse
                                          • 66.29.133.103
                                          SecuriteInfo.com.Variant.Jaik.72878.4306.exeGet hashmaliciousBrowse
                                          • 66.29.155.228
                                          https://youtube.vi5y.com/zl77b324Get hashmaliciousBrowse
                                          • 66.29.145.90
                                          StatementCopy#Globalfoundries899824Globalfoundries514-#Ud83d#Udcde49087.HTMGet hashmaliciousBrowse
                                          • 66.29.152.136
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.907392354286095
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:DHL DELIVERY.exe
                                          File size:574976
                                          MD5:56a08fd913bfc20fa0f15a4fb204bac9
                                          SHA1:b135f9c44b2847d494f1b2d843444711c8421cc0
                                          SHA256:37305d441b0332e9756a972f0585748807fb90ef363116aa6a224cefa120d09e
                                          SHA512:cae86e058d6416a72aaa97d5cb970a9cd12a21f65af1bee3ffe0924c787791b8f0366991a9fb0137e537e9226f06167cf5ac1c3cd1ab462615ea0a9bb0430f22
                                          SSDEEP:12288:KK2HUdEv8+F2wPLcYfqqDLNoE3TkyuFmcFiGZjC8Ng9n:KK2HrvY8zHNoCTkyuBFM8y
                                          TLSH:30C4129037B96F2BEA7E4EF98176106443B1B6066B50C3CE2DD276EE11E3F018E55A13
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.KR..............0.3...@.......-.... ........@.. ....................... ............`................................
                                          Icon Hash:00828e8e8686b000
                                          Entrypoint:0x48db2d
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                          Time Stamp:0x524B8F74 [Wed Oct 2 03:13:56 2013 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x8da4c0x4a.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x434.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x900000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x8da960x1c.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x8bb330x8bc00False0.911831604987data7.9180819868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .rsrc0x8e0000x4340x600False0.305989583333data2.56725335834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x900000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_VERSION0x8e0580x3dcdata
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          DescriptionData
                                          Translation0x0000 0x04b0
                                          LegalCopyright Microsoft Corporation. All rights reserved.
                                          Assembly Version5.0.0.0
                                          InternalNameSystem.Web.Cors.dll
                                          FileVersion5.0.11001.0
                                          CompanyNameMicrosoft Corporation.
                                          ProductNameMicrosoft ASP.NET MVC
                                          ProductVersion5.0.11001.0
                                          FileDescriptionSystem.Web.Cors (88a1bd8d3344b5df289577425c0314e7f521e88a)
                                          OriginalFilenameSystem.Web.Cors.dll
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 27, 2022 18:05:02.151860952 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:02.321647882 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:02.321768999 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:02.493024111 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:02.493402958 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:02.662947893 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:02.663575888 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:02.663954020 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:02.834335089 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:02.874758005 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.046480894 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.047969103 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.048019886 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.048053026 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.048080921 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.048084974 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.048115015 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.048130035 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.075139046 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.244549990 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.245537043 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.387064934 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.556396961 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.557019949 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.558290005 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.727574110 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.729589939 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.730511904 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:03.899827003 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.903959036 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:03.906023979 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.075403929 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.078903913 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.079385042 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.248735905 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.290292025 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.290813923 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.460079908 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.461122990 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.478138924 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.478338957 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.479090929 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.479360104 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:05:04.647291899 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.647352934 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.648190022 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.648361921 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.706700087 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:05:04.926225901 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:06:42.094340086 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:06:42.263477087 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:06:42.264010906 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:06:42.264039993 CEST5874977566.29.159.53192.168.2.5
                                          May 27, 2022 18:06:42.264090061 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:06:42.266407967 CEST49775587192.168.2.566.29.159.53
                                          May 27, 2022 18:06:42.435457945 CEST5874977566.29.159.53192.168.2.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 27, 2022 18:05:02.100497961 CEST5393453192.168.2.58.8.8.8
                                          May 27, 2022 18:05:02.121862888 CEST53539348.8.8.8192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          May 27, 2022 18:05:02.100497961 CEST192.168.2.58.8.8.80x9d0eStandard query (0)smtp.privateemail.comA (IP address)IN (0x0001)
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          May 27, 2022 18:05:02.121862888 CEST8.8.8.8192.168.2.50x9d0eNo error (0)smtp.privateemail.com66.29.159.53A (IP address)IN (0x0001)
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          May 27, 2022 18:05:02.493024111 CEST5874977566.29.159.53192.168.2.5220 PrivateEmail.com prod Mail Node
                                          May 27, 2022 18:05:02.493402958 CEST49775587192.168.2.566.29.159.53EHLO 980108
                                          May 27, 2022 18:05:02.663575888 CEST5874977566.29.159.53192.168.2.5250-mta-08.privateemail.com
                                          250-PIPELINING
                                          250-SIZE 81788928
                                          250-ETRN
                                          250-AUTH PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-CHUNKING
                                          250 STARTTLS
                                          May 27, 2022 18:05:02.663954020 CEST49775587192.168.2.566.29.159.53STARTTLS
                                          May 27, 2022 18:05:02.834335089 CEST5874977566.29.159.53192.168.2.5220 Ready to start TLS

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:1
                                          Start time:18:04:32
                                          Start date:27/05/2022
                                          Path:C:\Users\user\Desktop\DHL DELIVERY.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\DHL DELIVERY.exe"
                                          Imagebase:0xa60000
                                          File size:574976 bytes
                                          MD5 hash:56A08FD913BFC20FA0F15A4FB204BAC9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.473923703.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.473923703.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.472974687.00000000043AB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.472974687.00000000043AB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.472421072.00000000042F2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.473251720.0000000004423000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.473251720.0000000004423000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:3
                                          Start time:18:04:44
                                          Start date:27/05/2022
                                          Path:C:\Users\user\Desktop\DHL DELIVERY.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\DHL DELIVERY.exe
                                          Imagebase:0xa60000
                                          File size:574976 bytes
                                          MD5 hash:56A08FD913BFC20FA0F15A4FB204BAC9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.692251401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.463670113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.463670113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.464161754.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.464161754.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.462833671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.462833671.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.461699324.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.461699324.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.695721560.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:21.4%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:56%
                                            Total number of Nodes:25
                                            Total number of Limit Nodes:0
                                            execution_graph 7129 2810470 7130 281047c 7129->7130 7133 2810490 7129->7133 7141 281047f 7129->7141 7134 28104bb 7133->7134 7149 2811480 7134->7149 7153 2811488 7134->7153 7135 2810517 7136 28105d9 7135->7136 7137 2811480 VirtualProtect 7135->7137 7138 2811488 VirtualProtect 7135->7138 7137->7136 7138->7136 7142 28104bb 7141->7142 7147 2811480 VirtualProtect 7142->7147 7148 2811488 VirtualProtect 7142->7148 7143 2810517 7144 28105d9 7143->7144 7145 2811480 VirtualProtect 7143->7145 7146 2811488 VirtualProtect 7143->7146 7145->7144 7146->7144 7147->7143 7148->7143 7150 28114d0 VirtualProtect 7149->7150 7152 281150b 7150->7152 7152->7135 7154 28114d0 VirtualProtect 7153->7154 7156 281150b 7154->7156 7156->7135 7157 2810f98 7158 2810feb LoadLibraryA 7157->7158 7160 2811099 7158->7160

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 28176a0-28176c4 1 28178d9-2817915 0->1 2 28176ca-2817733 0->2 9 2817917-2817962 1->9 10 2817969-281796b 1->10 27 2817787-2817792 2->27 9->10 12 2817975-281797b 10->12 13 281796d 10->13 14 2817985-2817991 12->14 15 281797d-281797f 12->15 13->12 15->14 29 2817794 27->29 30 281779a-281779c 27->30 31 2817796-2817798 29->31 32 281779e 29->32 33 28177a3-28177a5 30->33 31->30 31->32 32->33 34 2817735-281777c 33->34 35 28177a7-28177ac 33->35 65 2817784 34->65 36 28177f0-28177fb 35->36 37 2817803-2817805 36->37 38 28177fd 36->38 42 281780c-281780e 37->42 40 2817807 38->40 41 28177ff-2817801 38->41 40->42 41->37 41->40 43 2817810-2817815 42->43 44 28177ae-28177ed 42->44 46 281788a-2817895 43->46 44->36 48 2817897 46->48 49 281789d-281789f 46->49 52 28178a1 48->52 53 2817899-281789b 48->53 51 28178a6-28178a8 49->51 54 2817817-281783c 51->54 55 28178ae-28178d6 51->55 52->51 53->49 53->52 62 281784c-281784e 54->62 63 281783e-281784a 54->63 67 2817851-281787e 62->67 63->67 65->27 70 2817887 67->70 70->46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8|l$fish
                                            • API String ID: 0-3163508401
                                            • Opcode ID: 69207abb57e202e12af9baa9a56c896a7aeef4601c170241c7e75eac708c16f9
                                            • Instruction ID: b606c498bb1fe9f22de67823663391874c2914e5d4305793dc9eb12d4ee2a0b7
                                            • Opcode Fuzzy Hash: 69207abb57e202e12af9baa9a56c896a7aeef4601c170241c7e75eac708c16f9
                                            • Instruction Fuzzy Hash: 32919E78B002169FDB04DFB5D895AAEF7B6FF88314F10882DE446DB291DB74A905CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 71 2810490-28104db call 2810e01 call 281127f 76 28104f3-2810512 71->76 77 28104dd-28104e3 71->77 241 2810515 call 2811480 76->241 242 2810515 call 2811488 76->242 78 28104e5 77->78 79 28104e7-28104e9 77->79 78->76 79->76 80 2810517-281058d 91 28105bf-28105d4 80->91 92 281058f-2810597 80->92 238 28105d7 call 2811480 91->238 239 28105d7 call 2811488 91->239 93 28105a6-28105ac 92->93 94 2810599-281059e 92->94 96 28105b2-28105bd 93->96 97 2810de7-2810dfd 93->97 94->93 95 28105d9-2810605 100 2810625-281065a 95->100 101 2810607-2810619 95->101 96->91 96->92 105 2810660 100->105 106 281065c-281065e 100->106 101->101 102 281061b 101->102 102->100 107 2810663-28106f8 105->107 106->107 118 28106fa-28106fc 107->118 119 28106fe 107->119 120 2810701-28108ea 118->120 119->120 158 28108f0-2810a0e 120->158 159 2810db8-2810dce 120->159 176 2810a40-2810c64 158->176 177 2810a10-2810a3a 158->177 159->97 210 2810c66-2810cc2 call 2811548 176->210 211 2810cda-2810cf5 176->211 177->176 230 2810cc8 210->230 216 2810cf7-2810d4a 211->216 217 2810d58-2810d97 211->217 235 2810d50-2810d56 216->235 232 2810d9d 217->232 231 2810da3-2810db2 230->231 231->158 231->159 232->231 235->231 238->95 239->95 241->80 242->80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: `l
                                            • API String ID: 0-1787797062
                                            • Opcode ID: 74bc10d352106644e6c0be336dcc1dfb8d5a3c72cb678eeedb2f7f22b6e880bd
                                            • Instruction ID: 4e58af169c33cffa3fd5f988422515eb18674accabe1dee80c61a10f15f947c8
                                            • Opcode Fuzzy Hash: 74bc10d352106644e6c0be336dcc1dfb8d5a3c72cb678eeedb2f7f22b6e880bd
                                            • Instruction Fuzzy Hash: 644260357001149FDB089B64C851F6A77B7AF89308F1484A8D50A9B3BACF75DC52DB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 243 281047f-28104af 244 28104bb-28104db call 281127f 243->244 408 28104b5 call 2810e01 243->408 248 28104f3-2810512 244->248 249 28104dd-28104e3 244->249 413 2810515 call 2811480 248->413 414 2810515 call 2811488 248->414 250 28104e5 249->250 251 28104e7-28104e9 249->251 250->248 251->248 252 2810517-281058d 263 28105bf-28105d4 252->263 264 281058f-2810597 252->264 410 28105d7 call 2811480 263->410 411 28105d7 call 2811488 263->411 265 28105a6-28105ac 264->265 266 2810599-281059e 264->266 268 28105b2-28105bd 265->268 269 2810de7-2810dfd 265->269 266->265 267 28105d9-2810605 272 2810625-281065a 267->272 273 2810607-2810619 267->273 268->263 268->264 277 2810660 272->277 278 281065c-281065e 272->278 273->273 274 281061b 273->274 274->272 279 2810663-28106f8 277->279 278->279 290 28106fa-28106fc 279->290 291 28106fe 279->291 292 2810701-28108ea 290->292 291->292 330 28108f0-2810a0e 292->330 331 2810db8-2810dce 292->331 348 2810a40-2810c64 330->348 349 2810a10-2810a3a 330->349 331->269 382 2810c66-2810cc2 call 2811548 348->382 383 2810cda-2810cf5 348->383 349->348 402 2810cc8 382->402 388 2810cf7-2810d4a 383->388 389 2810d58-2810d97 383->389 407 2810d50-2810d56 388->407 404 2810d9d 389->404 403 2810da3-2810db2 402->403 403->330 403->331 404->403 407->403 408->244 410->267 411->267 413->252 414->252
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: `l
                                            • API String ID: 0-1787797062
                                            • Opcode ID: 49fc0dba2c1a0df41d7efac1c28ad70d4537455b374ffedc4d3eef0a494730f6
                                            • Instruction ID: fd2cc0f4959d69f5a60be661bc907963b3ed4315c3ef5f186f722ed3c855f946
                                            • Opcode Fuzzy Hash: 49fc0dba2c1a0df41d7efac1c28ad70d4537455b374ffedc4d3eef0a494730f6
                                            • Instruction Fuzzy Hash: DF3250357001159FDB189BA4C851F6A7BB7EF88308F1480A8E50A9B3BACF75DC52DB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 472 281da08-281da30 473 281da36-281da62 call 2819ff8 call 281a670 472->473 474 281db58-281dbb0 472->474 473->474 485 281da68-281da7b 473->485 478 281dbb6-281dbe7 call 281d878 call 2819ff8 474->478 479 281dcb9-281dcf3 474->479 478->479 498 281dbed-281dc0d call 281a670 478->498 487 281dcf9-281dd1f call 2819ff8 479->487 488 281ddff-281de40 479->488 489 281da7d-281da8c 485->489 490 281da8e 485->490 487->488 499 281dd25-281dd99 call 281a670 * 4 487->499 500 281dfe6-281e007 488->500 501 281de46-281de8a call 281d878 * 2 call 2819ff8 488->501 492 281da93-281da98 489->492 490->492 495 281daf4-281db24 call 281a368 492->495 496 281da9a-281dab3 492->496 508 281db29-281db36 495->508 505 281dabd-281daf2 call 281a368 496->505 512 281dc1a-281dc2f 498->512 513 281dc0f-281dc18 498->513 546 281dda6-281ddad 499->546 547 281dd9b-281dda4 499->547 520 281e011-281e024 call 281db70 500->520 501->500 541 281de90-281dec5 501->541 505->508 508->474 514 281db38-281db55 508->514 524 281dc33-281dc38 512->524 513->512 518 281dc31 513->518 518->524 529 281dc3a-281dc52 524->529 530 281dc8f-281dc95 524->530 535 281dc54-281dc5a 529->535 536 281dc6a-281dc7a 529->536 530->479 534 281dc97-281dca2 530->534 543 281dca8-281dcb6 534->543 537 281dc5c 535->537 538 281dc5e-281dc68 535->538 536->479 539 281dc7c-281dc8d 536->539 537->536 538->536 539->543 550 281def2-281df09 541->550 551 281dec7-281ded6 541->551 549 281ddaf-281ddfc call 281a368 546->549 547->549 556 281df36-281df45 550->556 557 281df0b-281df34 550->557 558 281dedf-281def0 551->558 559 281df48-281df8e call 281a368 556->559 557->559 558->559 559->500 564 281df90-281dfc3 559->564 564->500 566 281dfc5-281dfe3 564->566
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53331d4adb380850b4668491d71c0d09168492260eda1ce3cdf8d50685015c0e
                                            • Instruction ID: 71f8519ebeacb9dbde088d9bf3c42d2325655efca846471c1b115e25eb59fccd
                                            • Opcode Fuzzy Hash: 53331d4adb380850b4668491d71c0d09168492260eda1ce3cdf8d50685015c0e
                                            • Instruction Fuzzy Hash: 4C22D479A042558FCB15CF69C880A9EBBF7FF89300B15C5AAD445EB3A2DB30AD45CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 842 2819a68-2819a9e 843 2819ab0-2819aee 842->843 844 2819aa0-2819aa9 842->844 849 2819af0 843->849 850 2819afb-2819b15 843->850 844->843 849->850 852 2819b6a-2819b75 850->852 853 2819b77 852->853 854 2819b7d-2819b7f 852->854 855 2819b81 853->855 856 2819b79-2819b7b 853->856 857 2819b86-2819b88 854->857 855->857 856->854 856->855 858 2819b17-2819b26 857->858 859 2819b8a-2819c00 857->859 860 2819dcc 858->860 861 2819b2c-2819b3c 858->861 859->860 864 2819c06-2819c40 859->864 863 2819dd1-2819df4 860->863 861->860 866 2819b42-2819b69 861->866 869 2819df6-2819e06 863->869 870 2819e0e 863->870 864->860 871 2819c46-2819c89 864->871 866->852 869->870 871->860 876 2819c8f-2819cd4 871->876 876->860 878 2819cda-2819cee 876->878 898 2819cf1 call 281a581 878->898 899 2819cf1 call 281a359 878->899 900 2819cf1 call 281a368 878->900 880 2819cf7-2819d0c 881 2819d19-2819d3a 880->881 882 2819d0e 880->882 885 2819db4-2819dca 881->885 886 2819d3c-2819d52 881->886 882->881 885->863 886->860 887 2819d54-2819d71 886->887 890 2819d80 887->890 891 2819d73-2819d7e 887->891 892 2819d82-2819d87 890->892 891->892 893 2819d89-2819d9c 892->893 894 2819d9e-2819db2 892->894 893->885 894->885 898->880 899->880 900->880
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21c55a9e96722fc558d226885a949308497665b015a8dd78bd0c377a4fcb03b8
                                            • Instruction ID: 82c5a905148823168469a1eb2b48b66f21806a0590944b901ffdd348cbf665ec
                                            • Opcode Fuzzy Hash: 21c55a9e96722fc558d226885a949308497665b015a8dd78bd0c377a4fcb03b8
                                            • Instruction Fuzzy Hash: 4ED13B39A00219CFCB05CF64D894A9DFBB6FF88314B16C655E845AB361DB71ED82CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 415 2810f95-2810ff7 418 2810ff9-281101e 415->418 419 281104b-2811097 LoadLibraryA 415->419 418->419 424 2811020-2811022 418->424 422 28110a0-28110d1 419->422 423 2811099-281109f 419->423 429 28110e1 422->429 430 28110d3-28110d7 422->430 423->422 426 2811045-2811048 424->426 427 2811024-281102e 424->427 426->419 431 2811030 427->431 432 2811032-2811041 427->432 435 28110e2 429->435 430->429 433 28110d9 430->433 431->432 432->432 434 2811043 432->434 433->429 434->426 435->435
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 02811087
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: e15352e991d4d2866c20672fe9b803d9ccc583ad3eb510599bed2e0d23558ced
                                            • Instruction ID: c29e3b17da691aa8a4287bcad0ce56ccd0d2a73d0b5909d4ce1b1bca54ce6b59
                                            • Opcode Fuzzy Hash: e15352e991d4d2866c20672fe9b803d9ccc583ad3eb510599bed2e0d23558ced
                                            • Instruction Fuzzy Hash: BC4158B8E006488FDB10CFA9C889BDEBBF5AB48704F108129D919F7384D7749845CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 436 2810f98-2810ff7 438 2810ff9-281101e 436->438 439 281104b-2811097 LoadLibraryA 436->439 438->439 444 2811020-2811022 438->444 442 28110a0-28110d1 439->442 443 2811099-281109f 439->443 449 28110e1 442->449 450 28110d3-28110d7 442->450 443->442 446 2811045-2811048 444->446 447 2811024-281102e 444->447 446->439 451 2811030 447->451 452 2811032-2811041 447->452 455 28110e2 449->455 450->449 453 28110d9 450->453 451->452 452->452 454 2811043 452->454 453->449 454->446 455->455
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 02811087
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 284b7d13499bd5e483d38dae1e5dace299fedaab44d27b87ac1b62cfeeeb680d
                                            • Instruction ID: 77fd67663bb8389c6f0fb0e58bdb12894e0d67beda9be05ec4db4bcb3961970d
                                            • Opcode Fuzzy Hash: 284b7d13499bd5e483d38dae1e5dace299fedaab44d27b87ac1b62cfeeeb680d
                                            • Instruction Fuzzy Hash: 014136B8E006988FDB10CFA9C889BDEBBF5AB48714F108129D919F7384D7759845CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 456 2811480-2811509 VirtualProtect 459 2811512-2811537 456->459 460 281150b-2811511 456->460 460->459
                                            APIs
                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 028114FC
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 393c7dbd8e4edb2144d41a1201edb759b56a82de0e45b19d7320c671147092b8
                                            • Instruction ID: 3e00f57804ff6d8353e9324abff7a0afe47b7d6c5e2f2996a044e7e4af09b40a
                                            • Opcode Fuzzy Hash: 393c7dbd8e4edb2144d41a1201edb759b56a82de0e45b19d7320c671147092b8
                                            • Instruction Fuzzy Hash: 732113B5D002498FCB10DFAAC884AEEFBF9FF48324F14882AD559A7250C7749945CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 464 2811488-2811509 VirtualProtect 467 2811512-2811537 464->467 468 281150b-2811511 464->468 468->467
                                            APIs
                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 028114FC
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: a460bf9db6298c71b4ba4851852928a6c22b82053522f340b355df6c68eda120
                                            • Instruction ID: cd510f9e8ea1315770eb7178a2916c2651bddb026c7a18437f82afe5362b1343
                                            • Opcode Fuzzy Hash: a460bf9db6298c71b4ba4851852928a6c22b82053522f340b355df6c68eda120
                                            • Instruction Fuzzy Hash: 0311F4B5D002499FCB10DFAAC884BEEFBF9BF48324F54882AD519A7250C7749944CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 901 2830980-2830999 902 2830955-283097c 901->902 903 283099b-28309cd 901->903 904 28309d3-28309e0 903->904 905 2830d4e-2830d8c 903->905 904->905 907 28309e6-2830a1d 904->907 907->905 913 2830a23-2830a2d 907->913 913->905 914 2830a33-2830a6a 913->914 914->905 918 2830a70-2830a7a 914->918 918->905 919 2830a80-2830ab7 918->919 919->905 923 2830abd-2830ac7 919->923 923->905 924 2830acd-2830b01 923->924 924->905 928 2830b07-2830b11 924->928 928->905 929 2830b17-2830b4b 928->929 929->905 933 2830b51-2830b5b 929->933 933->905 934 2830b61-2830b96 933->934 934->905 938 2830b9c-2830ba6 934->938 938->905 939 2830bac-2830be0 938->939 939->905 943 2830be6-2830bf0 939->943 943->905 944 2830bf6-2830c2a 943->944 944->905 948 2830c30-2830c3a 944->948 948->905 949 2830c40-2830c77 948->949 949->905 953 2830c7d-2830c87 949->953 953->905 954 2830c8d-2830cc2 953->954 954->905 958 2830cc8-2830cd2 954->958 958->905 959 2830cd4-2830d20 958->959 963 2830d2a-2830d3a 959->963 964 2830d3f-2830d4b 963->964
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c09c9bdf67a4bfcbce2d69ba6b5a2bdaed225389c14975771f707e45d2a9675b
                                            • Instruction ID: c921ef7613b6bcf87b9365109cea992cd97919fe1da6f769f3b87c7efc31c10e
                                            • Opcode Fuzzy Hash: c09c9bdf67a4bfcbce2d69ba6b5a2bdaed225389c14975771f707e45d2a9675b
                                            • Instruction Fuzzy Hash: 02C13679D00109EFCF15DFA4C980A9DBBB6FF09304B208196E519AB225DB32F955DF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 965 28309a0-28309cd 966 28309d3-28309e0 965->966 967 2830d4e-2830d8c 965->967 966->967 968 28309e6-2830a1d 966->968 968->967 974 2830a23-2830a2d 968->974 974->967 975 2830a33-2830a6a 974->975 975->967 979 2830a70-2830a7a 975->979 979->967 980 2830a80-2830ab7 979->980 980->967 984 2830abd-2830ac7 980->984 984->967 985 2830acd-2830b01 984->985 985->967 989 2830b07-2830b11 985->989 989->967 990 2830b17-2830b4b 989->990 990->967 994 2830b51-2830b5b 990->994 994->967 995 2830b61-2830b96 994->995 995->967 999 2830b9c-2830ba6 995->999 999->967 1000 2830bac-2830be0 999->1000 1000->967 1004 2830be6-2830bf0 1000->1004 1004->967 1005 2830bf6-2830c2a 1004->1005 1005->967 1009 2830c30-2830c3a 1005->1009 1009->967 1010 2830c40-2830c77 1009->1010 1010->967 1014 2830c7d-2830c87 1010->1014 1014->967 1015 2830c8d-2830cc2 1014->1015 1015->967 1019 2830cc8-2830cd2 1015->1019 1019->967 1020 2830cd4-2830d3a 1019->1020 1025 2830d3f-2830d4b 1020->1025
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d882dcf86e25c4f587f7e25bdc49064ef6a9a9cec3ff4f129a7d5e06f31acb49
                                            • Instruction ID: adc43402fcc09cb6068a1121695e7f0ebaa34d880633f0c6d5a9ecec2969b798
                                            • Opcode Fuzzy Hash: d882dcf86e25c4f587f7e25bdc49064ef6a9a9cec3ff4f129a7d5e06f31acb49
                                            • Instruction Fuzzy Hash: DFC14579D00109EFCF25DFA4C980A9DBBB6FF09304B208156E51AAB225DB32F955DF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c3d0a660d0cb8c832ed2cfb241a9a405bd008a0a6e45d1e426ee3aa835f7c383
                                            • Instruction ID: 6a25ea72ce09c1e8c3ec02806b9bcd426e54c7700c059baeb1cc69cac25d2030
                                            • Opcode Fuzzy Hash: c3d0a660d0cb8c832ed2cfb241a9a405bd008a0a6e45d1e426ee3aa835f7c383
                                            • Instruction Fuzzy Hash: 27716879D00109DFCB05DFE4C88499EFBBAFF49314B1081A6E519AB265DB32EC56CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e16ee671e41cac15b8aae94382aa270714ae80f318ed89acfb7e235bf3d36f0
                                            • Instruction ID: 6ff7c49f2220c1cc43ec1218a24aa3a2e42d5b50adc0b94ba400d6d64d80eb8c
                                            • Opcode Fuzzy Hash: 3e16ee671e41cac15b8aae94382aa270714ae80f318ed89acfb7e235bf3d36f0
                                            • Instruction Fuzzy Hash: 0A715779D00109DFCB05DF94C884ADDFBBAFF49314B108166E919AB265DB32E856CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 13ff8349fda77977f7a56e39a251988794f1ff713a9577cb5de39e231729cc86
                                            • Instruction ID: 5c79fa448d188a2a9c663c7501cb89e3691d7f9aee17c3b7445483b6d7065985
                                            • Opcode Fuzzy Hash: 13ff8349fda77977f7a56e39a251988794f1ff713a9577cb5de39e231729cc86
                                            • Instruction Fuzzy Hash: 9951BA79D00119EFCF05DFA4D88099EBBB6FF49305B108466E919AB221DB31ED15CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ccd590f2de97afc699f065d4cf6459c2dc616e82e97b76abf8c846642d598a9
                                            • Instruction ID: be636a828c5730a1a644027ff12c573c5d3652360a5fb714f141379a8a4c03b1
                                            • Opcode Fuzzy Hash: 7ccd590f2de97afc699f065d4cf6459c2dc616e82e97b76abf8c846642d598a9
                                            • Instruction Fuzzy Hash: AF518A79E00119EFCF05DFA4D88099EBBB6FF49305B108466E919AB221DB31ED15CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 167667cca25fcc1522bbf33087b9a40f44366863f750b912377c0a73394d2441
                                            • Instruction ID: f548e9ae8bec052d5aab396d45ddb18eb78479c74c4eca59ccd14719feea8b24
                                            • Opcode Fuzzy Hash: 167667cca25fcc1522bbf33087b9a40f44366863f750b912377c0a73394d2441
                                            • Instruction Fuzzy Hash: FF41F475900249CFCF02DFA4D884EAEBFB6FF49314B05C09AE559EB262D7349806CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466746292.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2830000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bd2259c7b9557f494b785490be2c193fe1cebc8aceb220d85e9a798679dc0834
                                            • Instruction ID: 4da645832b33e588e1af690f6b4953539d9632608310c702f2f6412dc5f50bad
                                            • Opcode Fuzzy Hash: bd2259c7b9557f494b785490be2c193fe1cebc8aceb220d85e9a798679dc0834
                                            • Instruction Fuzzy Hash: C0318079A00119DFCF01DF98D884EAEBBB6FF48315B108126E919A7321D7359916CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \l$\l
                                            • API String ID: 0-3451059530
                                            • Opcode ID: 43848eeca8fb1a33d884af4cc1900ebe1ca9d990fdbc9a2ad36ca0ecce623a3b
                                            • Instruction ID: 98ecb5c6c9dec2a18bb77dcbb25d6405505fadddb8094b1ffdcfb4bd4c2af543
                                            • Opcode Fuzzy Hash: 43848eeca8fb1a33d884af4cc1900ebe1ca9d990fdbc9a2ad36ca0ecce623a3b
                                            • Instruction Fuzzy Hash: 64E1D73AE00B1ACBCB11CFA5C8012EEB3F6AF9E705B254919D505BF550D771AE86CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 701c4d8ffcc1f60031994b28aa5b7ab158273e6514614a76d215c0aada066c9e
                                            • Instruction ID: e07d3afe11c260abbc03b9343814e6537a74781e9cae4476561abde288bae4a7
                                            • Opcode Fuzzy Hash: 701c4d8ffcc1f60031994b28aa5b7ab158273e6514614a76d215c0aada066c9e
                                            • Instruction Fuzzy Hash: 37023D7DA005258FDB18DF79C884A6DB7BABF88714B158569E809DB3B9DB30EC01CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb64bc387571e997023f2f68c5b475eb7a70f0fe38f005abd3ff1a95efda8365
                                            • Instruction ID: 5a7c15ac2488638e465f537f1e4469a416a00bff9cea3ec31350a9333b40f987
                                            • Opcode Fuzzy Hash: bb64bc387571e997023f2f68c5b475eb7a70f0fe38f005abd3ff1a95efda8365
                                            • Instruction Fuzzy Hash: B9D1B33DA066058FCB1CCF64D580AAEB7F6EF48318B258469E50ADB292CB75EC45CB40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.466715658.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2810000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2c369b2597ab6ea5ea2c8791673f9d6750dd12a407cea5deaa8a7ee94887db6c
                                            • Instruction ID: 27780baa235600b67ab0a0a74025f75e5d07af8a9d80c71429969a772ce97c26
                                            • Opcode Fuzzy Hash: 2c369b2597ab6ea5ea2c8791673f9d6750dd12a407cea5deaa8a7ee94887db6c
                                            • Instruction Fuzzy Hash: CBD1C379604215CFCB15CF69C48099EBBF6FF89300B09C5AAE859DB2A6D730E951CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:20.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:283
                                            Total number of Limit Nodes:2
                                            execution_graph 28871 1590850 28872 159085d 28871->28872 28876 61e6050 28872->28876 28881 61e6041 28872->28881 28873 159086f 28877 61e6070 28876->28877 28886 61e66e0 28877->28886 28891 61e66d0 28877->28891 28878 61e60e3 28878->28873 28882 61e604f 28881->28882 28884 61e66d0 66 API calls 28882->28884 28885 61e66e0 66 API calls 28882->28885 28883 61e60e3 28883->28873 28884->28883 28885->28883 28888 61e66e9 28886->28888 28887 61e67e1 28887->28878 28888->28887 28896 61e67f8 28888->28896 28935 61e67e7 28888->28935 28893 61e66e9 28891->28893 28892 61e67e1 28892->28878 28893->28892 28894 61e67f8 66 API calls 28893->28894 28895 61e67e7 66 API calls 28893->28895 28894->28893 28895->28893 28897 61e6817 28896->28897 28898 61e683f 28897->28898 28974 61e7c7f 28897->28974 28978 61e76ff 28897->28978 28984 61e767e 28897->28984 28990 61e76c3 28897->28990 28996 61e7ac5 28897->28996 29002 61e7744 28897->29002 29008 61e7cc7 28897->29008 29012 61e7d4b 28897->29012 29016 61e7b4f 28897->29016 29022 61e77ce 28897->29022 29028 61e7552 28897->29028 29036 61e7bd9 28897->29036 29042 61e7858 28897->29042 29048 61e7ddb 28897->29048 29052 61e7e23 28897->29052 29056 61e7ea7 28897->29056 29060 61e7927 28897->29060 29066 61e79b1 28897->29066 29072 61e7c37 28897->29072 29076 61e7639 28897->29076 29082 61e75b8 28897->29082 29090 61e7a3b 28897->29090 29096 61e7a80 28897->29096 29102 61e7d03 28897->29102 29106 61e7789 28897->29106 29112 61e7b0a 28897->29112 29118 61e7d93 28897->29118 29122 61e7813 28897->29122 29128 61e7b94 28897->29128 29134 61e789d 28897->29134 29140 61e78e2 28897->29140 29146 61e7e6b 28897->29146 29150 61e796c 28897->29150 29156 61e7573 28897->29156 29164 61e75f4 28897->29164 29172 61e79f6 28897->29172 28936 61e67ee 28935->28936 28937 61e683f 28935->28937 28936->28937 28938 61e789d 2 API calls 28936->28938 28939 61e7b94 2 API calls 28936->28939 28940 61e7813 2 API calls 28936->28940 28941 61e7d93 KiUserExceptionDispatcher 28936->28941 28942 61e7b0a 2 API calls 28936->28942 28943 61e7789 2 API calls 28936->28943 28944 61e7d03 KiUserExceptionDispatcher 28936->28944 28945 61e7a80 2 API calls 28936->28945 28946 61e7a3b 2 API calls 28936->28946 28947 61e75b8 3 API calls 28936->28947 28948 61e7639 2 API calls 28936->28948 28949 61e7c37 KiUserExceptionDispatcher 28936->28949 28950 61e79b1 2 API calls 28936->28950 28951 61e7927 2 API calls 28936->28951 28952 61e7ea7 KiUserExceptionDispatcher 28936->28952 28953 61e7e23 KiUserExceptionDispatcher 28936->28953 28954 61e7ddb KiUserExceptionDispatcher 28936->28954 28955 61e7858 2 API calls 28936->28955 28956 61e7bd9 2 API calls 28936->28956 28957 61e7552 3 API calls 28936->28957 28958 61e77ce 2 API calls 28936->28958 28959 61e7b4f 2 API calls 28936->28959 28960 61e7d4b KiUserExceptionDispatcher 28936->28960 28961 61e7cc7 KiUserExceptionDispatcher 28936->28961 28962 61e7744 2 API calls 28936->28962 28963 61e7ac5 2 API calls 28936->28963 28964 61e76c3 2 API calls 28936->28964 28965 61e767e 2 API calls 28936->28965 28966 61e76ff 2 API calls 28936->28966 28967 61e7c7f KiUserExceptionDispatcher 28936->28967 28968 61e79f6 2 API calls 28936->28968 28969 61e75f4 3 API calls 28936->28969 28970 61e7573 3 API calls 28936->28970 28971 61e796c 2 API calls 28936->28971 28972 61e7e6b KiUserExceptionDispatcher 28936->28972 28973 61e78e2 2 API calls 28936->28973 28938->28937 28939->28937 28940->28937 28941->28937 28942->28937 28943->28937 28944->28937 28945->28937 28946->28937 28947->28937 28948->28937 28949->28937 28950->28937 28951->28937 28952->28937 28953->28937 28954->28937 28955->28937 28956->28937 28957->28937 28958->28937 28959->28937 28960->28937 28961->28937 28962->28937 28963->28937 28964->28937 28965->28937 28966->28937 28967->28937 28968->28937 28969->28937 28970->28937 28971->28937 28972->28937 28973->28937 28975 61e7c90 28974->28975 28976 61e7ece KiUserExceptionDispatcher 28975->28976 28977 61e7eed 28976->28977 28977->28898 28979 61e7710 28978->28979 28980 61e7c00 KiUserExceptionDispatcher 28979->28980 28981 61e7c1c KiUserExceptionDispatcher 28980->28981 28983 61e7eed 28981->28983 28983->28898 28985 61e768f 28984->28985 28986 61e7c00 KiUserExceptionDispatcher 28985->28986 28987 61e7c1c KiUserExceptionDispatcher 28986->28987 28989 61e7eed 28987->28989 28989->28898 28991 61e76d4 28990->28991 28992 61e7c00 KiUserExceptionDispatcher 28991->28992 28993 61e7c1c KiUserExceptionDispatcher 28992->28993 28995 61e7eed 28993->28995 28995->28898 28997 61e7ad6 28996->28997 28998 61e7c00 KiUserExceptionDispatcher 28997->28998 28999 61e7c1c KiUserExceptionDispatcher 28998->28999 29001 61e7eed 28999->29001 29001->28898 29003 61e7755 29002->29003 29004 61e7c00 KiUserExceptionDispatcher 29003->29004 29005 61e7c1c KiUserExceptionDispatcher 29004->29005 29007 61e7eed 29005->29007 29007->28898 29009 61e7cd8 29008->29009 29010 61e7ece KiUserExceptionDispatcher 29009->29010 29011 61e7eed 29010->29011 29011->28898 29013 61e7d5c 29012->29013 29014 61e7ece KiUserExceptionDispatcher 29013->29014 29015 61e7eed 29014->29015 29015->28898 29017 61e7b60 29016->29017 29018 61e7c00 KiUserExceptionDispatcher 29017->29018 29019 61e7c1c KiUserExceptionDispatcher 29018->29019 29021 61e7eed 29019->29021 29021->28898 29023 61e77df 29022->29023 29024 61e7c00 KiUserExceptionDispatcher 29023->29024 29025 61e7c1c KiUserExceptionDispatcher 29024->29025 29027 61e7eed 29025->29027 29027->28898 29029 61e7558 KiUserExceptionDispatcher 29028->29029 29031 61e7637 29029->29031 29032 61e7c00 KiUserExceptionDispatcher 29031->29032 29033 61e7c1c KiUserExceptionDispatcher 29032->29033 29035 61e7eed 29033->29035 29035->28898 29037 61e7bea 29036->29037 29038 61e7c00 KiUserExceptionDispatcher 29037->29038 29039 61e7c1c KiUserExceptionDispatcher 29038->29039 29041 61e7eed 29039->29041 29041->28898 29043 61e7869 29042->29043 29044 61e7c00 KiUserExceptionDispatcher 29043->29044 29045 61e7c1c KiUserExceptionDispatcher 29044->29045 29047 61e7eed 29045->29047 29047->28898 29049 61e7dec 29048->29049 29050 61e7ece KiUserExceptionDispatcher 29049->29050 29051 61e7eed 29050->29051 29051->28898 29053 61e7e34 29052->29053 29054 61e7ece KiUserExceptionDispatcher 29053->29054 29055 61e7eed 29054->29055 29055->28898 29057 61e7eb8 29056->29057 29058 61e7ece KiUserExceptionDispatcher 29057->29058 29059 61e7eed 29058->29059 29059->28898 29061 61e7938 29060->29061 29062 61e7c00 KiUserExceptionDispatcher 29061->29062 29063 61e7c1c KiUserExceptionDispatcher 29062->29063 29065 61e7eed 29063->29065 29065->28898 29067 61e79c2 29066->29067 29068 61e7c00 KiUserExceptionDispatcher 29067->29068 29069 61e7c1c KiUserExceptionDispatcher 29068->29069 29071 61e7eed 29069->29071 29071->28898 29073 61e7c48 29072->29073 29074 61e7ece KiUserExceptionDispatcher 29073->29074 29075 61e7eed 29074->29075 29075->28898 29077 61e764a 29076->29077 29078 61e7c00 KiUserExceptionDispatcher 29077->29078 29079 61e7c1c KiUserExceptionDispatcher 29078->29079 29081 61e7eed 29079->29081 29081->28898 29083 61e75c9 29082->29083 29084 61e7618 KiUserExceptionDispatcher 29083->29084 29085 61e7637 29084->29085 29086 61e7c00 KiUserExceptionDispatcher 29085->29086 29087 61e7c1c KiUserExceptionDispatcher 29086->29087 29089 61e7eed 29087->29089 29089->28898 29091 61e7a4c 29090->29091 29092 61e7c00 KiUserExceptionDispatcher 29091->29092 29093 61e7c1c KiUserExceptionDispatcher 29092->29093 29095 61e7eed 29093->29095 29095->28898 29097 61e7a91 29096->29097 29098 61e7c00 KiUserExceptionDispatcher 29097->29098 29099 61e7c1c KiUserExceptionDispatcher 29098->29099 29101 61e7eed 29099->29101 29101->28898 29103 61e7d14 29102->29103 29104 61e7ece KiUserExceptionDispatcher 29103->29104 29105 61e7eed 29104->29105 29105->28898 29107 61e779a 29106->29107 29108 61e7c00 KiUserExceptionDispatcher 29107->29108 29109 61e7c1c KiUserExceptionDispatcher 29108->29109 29111 61e7eed 29109->29111 29111->28898 29113 61e7b1b 29112->29113 29114 61e7c00 KiUserExceptionDispatcher 29113->29114 29115 61e7c1c KiUserExceptionDispatcher 29114->29115 29117 61e7eed 29115->29117 29117->28898 29119 61e7da4 29118->29119 29120 61e7ece KiUserExceptionDispatcher 29119->29120 29121 61e7eed 29120->29121 29121->28898 29123 61e7824 29122->29123 29124 61e7c00 KiUserExceptionDispatcher 29123->29124 29125 61e7c1c KiUserExceptionDispatcher 29124->29125 29127 61e7eed 29125->29127 29127->28898 29129 61e7ba5 29128->29129 29130 61e7c00 KiUserExceptionDispatcher 29129->29130 29131 61e7c1c KiUserExceptionDispatcher 29130->29131 29133 61e7eed 29131->29133 29133->28898 29135 61e78ae 29134->29135 29136 61e7c00 KiUserExceptionDispatcher 29135->29136 29137 61e7c1c KiUserExceptionDispatcher 29136->29137 29139 61e7eed 29137->29139 29139->28898 29141 61e78f3 29140->29141 29142 61e7c00 KiUserExceptionDispatcher 29141->29142 29143 61e7c1c KiUserExceptionDispatcher 29142->29143 29145 61e7eed 29143->29145 29145->28898 29147 61e7e7c 29146->29147 29148 61e7ece KiUserExceptionDispatcher 29147->29148 29149 61e7eed 29148->29149 29149->28898 29151 61e797d 29150->29151 29152 61e7c00 KiUserExceptionDispatcher 29151->29152 29153 61e7c1c KiUserExceptionDispatcher 29152->29153 29155 61e7eed 29153->29155 29155->28898 29157 61e7584 29156->29157 29158 61e7618 KiUserExceptionDispatcher 29157->29158 29159 61e7637 29158->29159 29160 61e7c00 KiUserExceptionDispatcher 29159->29160 29161 61e7c1c KiUserExceptionDispatcher 29160->29161 29163 61e7eed 29161->29163 29163->28898 29165 61e7605 29164->29165 29166 61e7618 KiUserExceptionDispatcher 29165->29166 29167 61e7637 29166->29167 29168 61e7c00 KiUserExceptionDispatcher 29167->29168 29169 61e7c1c KiUserExceptionDispatcher 29168->29169 29171 61e7eed 29169->29171 29171->28898 29173 61e7a07 29172->29173 29174 61e7c00 KiUserExceptionDispatcher 29173->29174 29175 61e7c1c KiUserExceptionDispatcher 29174->29175 29177 61e7eed 29175->29177 29177->28898 29178 159add0 29179 159add5 29178->29179 29182 1599dc0 29179->29182 29181 159ae25 29183 159c8f0 LoadLibraryA 29182->29183 29185 159c9cc 29183->29185 29186 1594540 29187 1594554 29186->29187 29190 159478a 29187->29190 29188 159455d 29191 1594793 29190->29191 29196 159496c 29190->29196 29201 1594986 29190->29201 29206 1594870 29190->29206 29211 159485f 29190->29211 29191->29188 29197 159491f 29196->29197 29197->29196 29198 15949ab 29197->29198 29216 1594c67 29197->29216 29221 1594c78 29197->29221 29202 1594999 29201->29202 29203 15949ab 29201->29203 29204 1594c78 2 API calls 29202->29204 29205 1594c67 2 API calls 29202->29205 29204->29203 29205->29203 29207 15948b4 29206->29207 29208 15949ab 29207->29208 29209 1594c78 2 API calls 29207->29209 29210 1594c67 2 API calls 29207->29210 29209->29208 29210->29208 29212 1594870 29211->29212 29213 15949ab 29212->29213 29214 1594c78 2 API calls 29212->29214 29215 1594c67 2 API calls 29212->29215 29214->29213 29215->29213 29217 1594c78 29216->29217 29226 1594cc8 29217->29226 29230 1594cbb 29217->29230 29218 1594c96 29218->29198 29222 1594c86 29221->29222 29224 1594cc8 RtlEncodePointer 29222->29224 29225 1594cbb RtlEncodePointer 29222->29225 29223 1594c96 29223->29198 29224->29223 29225->29223 29227 1594d02 29226->29227 29228 1594d2c RtlEncodePointer 29227->29228 29229 1594d55 29227->29229 29228->29229 29229->29218 29231 1594d02 29230->29231 29232 1594d2c RtlEncodePointer 29231->29232 29233 1594d55 29231->29233 29232->29233 29233->29218

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7618
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 9fc23121a7a66d1b596322b98c675ef005b866b09df44e3d2604a0e0e5cdd34c
                                            • Instruction ID: 3516856016b003fda3c1ca115ed94f434a7b6956cb158f5767cdc7e4a7234199
                                            • Opcode Fuzzy Hash: 9fc23121a7a66d1b596322b98c675ef005b866b09df44e3d2604a0e0e5cdd34c
                                            • Instruction Fuzzy Hash: 3902BA35902259CFEB69EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7618
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: cbcd20829c011d75236822644b001324bd5c79025be23ad9ac418012744d6cc0
                                            • Instruction ID: 40c4a061669e2a3f921526a3e4dbfc25039f5b0c2527d9c9786726717b3e79a4
                                            • Opcode Fuzzy Hash: cbcd20829c011d75236822644b001324bd5c79025be23ad9ac418012744d6cc0
                                            • Instruction Fuzzy Hash: 1B02CC35902259CFEB69EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7618
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 829da99a9fd3a3cfd2bde5a1a3537cd4874778385c4448663eb12644bc7422f8
                                            • Instruction ID: f05a66934bc056c03e12ddb67aa591f93b04d506f5f083b3b26c8e2e0c7c36fc
                                            • Opcode Fuzzy Hash: 829da99a9fd3a3cfd2bde5a1a3537cd4874778385c4448663eb12644bc7422f8
                                            • Instruction Fuzzy Hash: 4202CB35902259CFEB69EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7618
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 6567b2547e49a22a0a5880d5c2884679568899df38e9df6cb3c13504451b4cfa
                                            • Instruction ID: 976b512789b3f0d62225399e406a62e9ab4e44708b9c26a3860d472c92a58ef3
                                            • Opcode Fuzzy Hash: 6567b2547e49a22a0a5880d5c2884679568899df38e9df6cb3c13504451b4cfa
                                            • Instruction Fuzzy Hash: B902CB35902269CFEB65EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 581 61e7639-61e765d call 61e5a60 call 61e5bf0 718 61e765d call 61efabf 581->718 719 61e765d call 61efee0 581->719 720 61e765d call 61eff41 581->720 587 61e7663-61e8216 KiUserExceptionDispatcher * 2 715 61e821c-61e825f 587->715 718->587 719->587 720->587
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: c19486a5fe90ea17976a9538ae16620efdc51b29bc4aaf38fd4413d749c694f2
                                            • Instruction ID: 6c63255870fea5e94a046a269fdab544afb47d5acbae50d4481689b8d7821acc
                                            • Opcode Fuzzy Hash: c19486a5fe90ea17976a9538ae16620efdc51b29bc4aaf38fd4413d749c694f2
                                            • Instruction Fuzzy Hash: 3F02CB35902259CFEB65EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 76c3045ca39eeae5e0241ee410e033fef42af32977f389339983ab24d260f800
                                            • Instruction ID: 8beb8356be752edc5c761b77ff26d733b38374c324902b6bc70ec809862ccdcd
                                            • Opcode Fuzzy Hash: 76c3045ca39eeae5e0241ee410e033fef42af32977f389339983ab24d260f800
                                            • Instruction Fuzzy Hash: 30F1CB35902259CFEBA5EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 56951fe3defe8469c5ffce643682489ff2b81df0be3aebf74d4eff3daf1ed726
                                            • Instruction ID: 388da62fc77a2de4c0604e70175aea54b73b8815e03dc9756badf581910b04eb
                                            • Opcode Fuzzy Hash: 56951fe3defe8469c5ffce643682489ff2b81df0be3aebf74d4eff3daf1ed726
                                            • Instruction Fuzzy Hash: 32F1CB35902259CFDB65EF30E888699B7B2FF4930AF1045D9D51A92350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: c0a1b4465c35f667373e06fb58e6d5cb181e8be0b7c1dd1ae8a5fa796123404f
                                            • Instruction ID: d1a5cf5f7981dff96216fecca91e16befff7d79c1b07cdf72193664147abf1a2
                                            • Opcode Fuzzy Hash: c0a1b4465c35f667373e06fb58e6d5cb181e8be0b7c1dd1ae8a5fa796123404f
                                            • Instruction Fuzzy Hash: F6F1DB35902269CFDBA5EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 1a2b326fe6f41193ed8d47510091e7070a769e774e320bb0a45c879a81da2c44
                                            • Instruction ID: a6aa7c0e2859e3c7530071cb0f5470a402e103138297f2b9fb828b4477a48fd7
                                            • Opcode Fuzzy Hash: 1a2b326fe6f41193ed8d47510091e7070a769e774e320bb0a45c879a81da2c44
                                            • Instruction Fuzzy Hash: A7F1DA35902269CFEB65EF30E888699B7B2FF4930AF1045D9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 070b11205eff9442058570ab61e205ff312fc5b3663c5e71b9fd81873e1aa958
                                            • Instruction ID: 0e3a438afc0b58fb04385e2b44cf528625eb062b21e0eea6223a217049854d0a
                                            • Opcode Fuzzy Hash: 070b11205eff9442058570ab61e205ff312fc5b3663c5e71b9fd81873e1aa958
                                            • Instruction Fuzzy Hash: 78E1CA35902269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: d1f192ae1fc377999f82ad24ae1606576bbfc4a0afc98ad4062d7f31dcfd70d4
                                            • Instruction ID: e07aa6e51de949b2d04c45f907d46a7324af55aa08854b49c50b66e98832d656
                                            • Opcode Fuzzy Hash: d1f192ae1fc377999f82ad24ae1606576bbfc4a0afc98ad4062d7f31dcfd70d4
                                            • Instruction Fuzzy Hash: 43E1CA35902269CFDBA5EF70E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 8feccd91a9a691ebbf9799bba8d6a0b630014bdf9853e5a9564f4737cac0f605
                                            • Instruction ID: da017dde8a3f933336a68f1758065e66913650864d246b97560c8ec896f68679
                                            • Opcode Fuzzy Hash: 8feccd91a9a691ebbf9799bba8d6a0b630014bdf9853e5a9564f4737cac0f605
                                            • Instruction Fuzzy Hash: EDE1DA35902269CFDBA5EF70E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 7fdbc1dfcf041f9216459ea5f989046f32b2ca6e83ed640befd95c17c7f04de2
                                            • Instruction ID: e933a8caa3cb1dc5015247bbe3371d76666613d578f175a948babdaca47ee7f2
                                            • Opcode Fuzzy Hash: 7fdbc1dfcf041f9216459ea5f989046f32b2ca6e83ed640befd95c17c7f04de2
                                            • Instruction Fuzzy Hash: 9BE1D935902269CFDBA5EF70E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: e6328b2ac3bb3d2a044a91eb86f8670f30c4d92fde986d4bdd5a85cc7ee14e45
                                            • Instruction ID: 36c5363576215bd440032b3b64d79ede04bf55cfa7cd0ca6328c4822866a194c
                                            • Opcode Fuzzy Hash: e6328b2ac3bb3d2a044a91eb86f8670f30c4d92fde986d4bdd5a85cc7ee14e45
                                            • Instruction Fuzzy Hash: 98D1DA35902269CFDBA5EF70E888699B7B2BF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: b7beb7ea26a1efa26bcc34be9a6b07937993f5ce444b358b7c74423defe4fd83
                                            • Instruction ID: 637eae299ea45727c8f9a474d1420f5ff3093943a64a5dd94b6b57924f8e8491
                                            • Opcode Fuzzy Hash: b7beb7ea26a1efa26bcc34be9a6b07937993f5ce444b358b7c74423defe4fd83
                                            • Instruction Fuzzy Hash: 3CD1D935902269CFDBA5EF30E888699B7B2BF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 862f3f0be9ef7240f133d377ea143c02b34ae5441b453254acc4a4ec8cb66769
                                            • Instruction ID: db1a498d8818b28c558a0af7db6d99c19b7d5f90999732ef6e731a8119b0ee1d
                                            • Opcode Fuzzy Hash: 862f3f0be9ef7240f133d377ea143c02b34ae5441b453254acc4a4ec8cb66769
                                            • Instruction Fuzzy Hash: 0AD1E935902269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 212d18c96c40d7bba8dbace9a695bbd46915e491f248c42d781a482377efcf3b
                                            • Instruction ID: 709ee64e20071f9f548eaa6c1ae2736ce6bc7a671341d6e4b3d7cd5fd6a8f75a
                                            • Opcode Fuzzy Hash: 212d18c96c40d7bba8dbace9a695bbd46915e491f248c42d781a482377efcf3b
                                            • Instruction Fuzzy Hash: 9CC1DA35906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: d9d0071724d8e6b5773f0fe8f193a034ba17c08853cf4455c94a8ced466980d1
                                            • Instruction ID: 617681465a612f86220686f05b7c5b9884b782983d38d0e540fcefa8ac689fe8
                                            • Opcode Fuzzy Hash: d9d0071724d8e6b5773f0fe8f193a034ba17c08853cf4455c94a8ced466980d1
                                            • Instruction Fuzzy Hash: 91C1DA35906269CFDBA5EF30D888699B7B2FF4930AF1045D9D50AA2350CB399EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: ceb7f17c36d0dffe7f5798a03d5680695e6d7c53988435a04262f0f4bf65542a
                                            • Instruction ID: 98d819de219ce1071bf40fba9c177ca124f1f558254ba75771d2282981a38845
                                            • Opcode Fuzzy Hash: ceb7f17c36d0dffe7f5798a03d5680695e6d7c53988435a04262f0f4bf65542a
                                            • Instruction Fuzzy Hash: ACC1E935906269CFDBA5EF30D888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 3a9217e34cd23b436a3d5acc7ca9f854a3a0c5c68f8b10d194ce8d41589a964d
                                            • Instruction ID: ff246ad1d4293133a64c05029f4225d314a1195aba7991c1ce78f1241274ffe6
                                            • Opcode Fuzzy Hash: 3a9217e34cd23b436a3d5acc7ca9f854a3a0c5c68f8b10d194ce8d41589a964d
                                            • Instruction Fuzzy Hash: 1BB1D835906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 07687f62122bf1b5ae0ab814673f048b01ff9c711d71ede6bf1915041752c552
                                            • Instruction ID: 87867b8b69b6ae6b516d617a036d412d6e7fbf70ade949cf1db49d70fa3203e4
                                            • Opcode Fuzzy Hash: 07687f62122bf1b5ae0ab814673f048b01ff9c711d71ede6bf1915041752c552
                                            • Instruction Fuzzy Hash: 91B1F835906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: f68a4cbb3715c2adfcf377c37afe0b4cc6d083680b8dc0acb013ed35bbe1b528
                                            • Instruction ID: baf56e12ca566743b0734fd1f818e1b1fa6640c5da0d7a8856e1406316979571
                                            • Opcode Fuzzy Hash: f68a4cbb3715c2adfcf377c37afe0b4cc6d083680b8dc0acb013ed35bbe1b528
                                            • Instruction Fuzzy Hash: 4CB1E835906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359DC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 2e679ad8c4bfafaa74bb8fd145df517e6c04ecdd64408b447ca626dbb969a4ee
                                            • Instruction ID: db9593c0cf5c89da088f77634e1982771ba851d3724457db88d48ae6112f2366
                                            • Opcode Fuzzy Hash: 2e679ad8c4bfafaa74bb8fd145df517e6c04ecdd64408b447ca626dbb969a4ee
                                            • Instruction Fuzzy Hash: A4A1E835906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359DC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: be4b051f4a031d5cbfcc353bccd719ebf38ee69f3cf763dc981fce6685cb7a04
                                            • Instruction ID: 5ae5cd880793b724a03dabb3d0831fa81018fc338913086ec462096fb4d7cb81
                                            • Opcode Fuzzy Hash: be4b051f4a031d5cbfcc353bccd719ebf38ee69f3cf763dc981fce6685cb7a04
                                            • Instruction Fuzzy Hash: 2BA1F835906269CFDBA5EF30E888699B7B2BF4930AF1045D9D50AA2350CB359DC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 3d23bc9ce4c899d20fe064b12827f40290f155cf19c9b0af7fd5369139678a8c
                                            • Instruction ID: 372a6871eab75acc983d0bc3bce6ca1c5dbd69672b7d4e2ac943f583912ac93d
                                            • Opcode Fuzzy Hash: 3d23bc9ce4c899d20fe064b12827f40290f155cf19c9b0af7fd5369139678a8c
                                            • Instruction Fuzzy Hash: F7A10935906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359DC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7C00
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 7dc6633f7e5093ee47bf624531da43b4ac963835ee8f2ecd517933c8c8f440f5
                                            • Instruction ID: d6fb93ff62e305f1ad416bbbe1d2fb374d58a1882e84fc73b71a1f4b946e2de9
                                            • Opcode Fuzzy Hash: 7dc6633f7e5093ee47bf624531da43b4ac963835ee8f2ecd517933c8c8f440f5
                                            • Instruction Fuzzy Hash: A5911935906269CFDBA5EF30E888699B7B2FF4930AF1045D9D50AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.693789153.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_14fd000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: """""
                                            • API String ID: 0-1040415110
                                            • Opcode ID: d0fbe8b4a5060cf70d11cd3dd2d7c2fbaf04078afafa7fdd816205772e096538
                                            • Instruction ID: ee2bff635f5bc19e71b07fd0a69b16f5a774e6097b8d14615ca5f3201e7fec06
                                            • Opcode Fuzzy Hash: d0fbe8b4a5060cf70d11cd3dd2d7c2fbaf04078afafa7fdd816205772e096538
                                            • Instruction Fuzzy Hash: 3F72486191E3C65FDB438BB55C349847FB05E63198B1E84EFC680DF2B7D169984AC322
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 38e2b9cf3f27aa9a483768806737b6d25c2f6223a8c21cf18be465cae6c8aea4
                                            • Instruction ID: 706b691838fd66d53a3a5c763e0e5720bd5f638d2d682dd177f877e3e3e06097
                                            • Opcode Fuzzy Hash: 38e2b9cf3f27aa9a483768806737b6d25c2f6223a8c21cf18be465cae6c8aea4
                                            • Instruction Fuzzy Hash: CF911A35906269CFDBA5EF30D888699B7B2BF4930AF1045D9D50AA2350CB359DC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: abfa54ffdbfd98d9b95b1b8144f688f1f6dc85474d15ea2c70750eac760a2621
                                            • Instruction ID: 58401eb116e112aa2b85ab9f115931e66377e7a984707c90b240d07efacccf80
                                            • Opcode Fuzzy Hash: abfa54ffdbfd98d9b95b1b8144f688f1f6dc85474d15ea2c70750eac760a2621
                                            • Instruction Fuzzy Hash: 50812935906268CFDBA5EF30E888699B7B2FF4930AF1045E9D50A92350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: bec89d2b0fe1d7250a238a65f7e3b60b8388cec72a6b5fbfddfd26733d82dc3d
                                            • Instruction ID: d26dc501dadcc246109fd11ddc4a7eeb623c5e789d2ac9f56a47d91c5d32ef5d
                                            • Opcode Fuzzy Hash: bec89d2b0fe1d7250a238a65f7e3b60b8388cec72a6b5fbfddfd26733d82dc3d
                                            • Instruction Fuzzy Hash: 7A713935906268CFDBA5EF30E888699B7B2BF4930AF1045E9D51A92350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 9dc901f2a4551da9c674b86e152a4832dc332103ea03350dafd7ce81b5a31f03
                                            • Instruction ID: 99b0c5fd02c4fd10bd11e157253892ffaa706e6e37bb8a4403815bce185fb7be
                                            • Opcode Fuzzy Hash: 9dc901f2a4551da9c674b86e152a4832dc332103ea03350dafd7ce81b5a31f03
                                            • Instruction Fuzzy Hash: AB713A35906268CFDBA5EF30D888699B7B2BF4930AF1045E9D51AA2350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 62a628690e2d81ead0176bde93fff547626753b8fa67c723ed0667e467a922ea
                                            • Instruction ID: 7799a71e52a7a209d0d81fd15fd66ff1e0e8ee359dfda38aaab847e249d0f2b6
                                            • Opcode Fuzzy Hash: 62a628690e2d81ead0176bde93fff547626753b8fa67c723ed0667e467a922ea
                                            • Instruction Fuzzy Hash: 73712A35906268CFDBA5EF30D88869DB7B2BF4930AF1045E9D51A92350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: c1fbb384d381d1ff3eccc399a1227dc68ab6f93976cb7dbb24e56f5fe102fb08
                                            • Instruction ID: bf453446c84456a137fdf827ff1fced2faab7893304f24c261715f4543c864fb
                                            • Opcode Fuzzy Hash: c1fbb384d381d1ff3eccc399a1227dc68ab6f93976cb7dbb24e56f5fe102fb08
                                            • Instruction Fuzzy Hash: C4611B35902269CFDBA5EF30D88869DB7B2BF4930AF1045E9D51A92350CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: c6dd3a68be4586ea884eecb49e6cc7c1cc6cee48207b9636cc99a3c20bec9cc0
                                            • Instruction ID: 7bfdaffe020d495b8d3d3e83ce91186b858dc51cf4c2e793f6ed51bf1687d7b0
                                            • Opcode Fuzzy Hash: c6dd3a68be4586ea884eecb49e6cc7c1cc6cee48207b9636cc99a3c20bec9cc0
                                            • Instruction Fuzzy Hash: 2451FA35902269CFDBA5EF30E888699B7B2BF4930AF1045E9D51E92250CB359E81CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 8b6e6895145377947e77827a237405f01ced922e6770103302738365cd7bcb16
                                            • Instruction ID: 5924f96a69c88c648fe402cb1f01ac9e079dbcf1a13deb211a7b49b6afdfe9ac
                                            • Opcode Fuzzy Hash: 8b6e6895145377947e77827a237405f01ced922e6770103302738365cd7bcb16
                                            • Instruction Fuzzy Hash: DC51F935902269CFDBA5EF30E88869DB7B2BF4930AF1045E9D51A92250CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.693789153.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_14fd000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: """""
                                            • API String ID: 0-1040415110
                                            • Opcode ID: 9dbecf1abdc0e9a288036ef8a54a983181e558bcd0a0bdce36ba03ee5a9434f5
                                            • Instruction ID: 16217c84c82104bbc8735a57353cd4a563bbd74c1a1fc0300ada08e8849c6645
                                            • Opcode Fuzzy Hash: 9dbecf1abdc0e9a288036ef8a54a983181e558bcd0a0bdce36ba03ee5a9434f5
                                            • Instruction Fuzzy Hash: 95917A6450E3C19FDB038BB588646803FB19F53295B1F94EFC680EF2B7D129984AC762
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 89bfffa4c26899c13ecaa9859a65ba3ab373aab7c5394c7203d135a6a2440677
                                            • Instruction ID: e5ddf05c935c3ba3c9f185648db8b87baaf0d1969aeacd737eab2cdd596defe4
                                            • Opcode Fuzzy Hash: 89bfffa4c26899c13ecaa9859a65ba3ab373aab7c5394c7203d135a6a2440677
                                            • Instruction Fuzzy Hash: 4751FA35902269CFDBA5EF30E88869DB7B2BF4930AF1045E9D51E92250CB359EC1CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 061E7ECE
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.697738547.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_61e0000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 941e304ab58992b4e25dd48abd739cdd5f2fb44f50ebe9ad0eb1611d146e9470
                                            • Instruction ID: dc8f3357eb643bd7e9b0470ca356ce4f6bb05d5074c0e18dbcbea9c84f82128d
                                            • Opcode Fuzzy Hash: 941e304ab58992b4e25dd48abd739cdd5f2fb44f50ebe9ad0eb1611d146e9470
                                            • Instruction Fuzzy Hash: 9451FB35902269CFDBA5EF30D88869DB7B2BF4930AF1045E9D51A92250CB359E81CF52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 0159C9BA
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.694143245.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_1590000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f109c1cbd97c2954ccfb77a4778902760a5440b8c4631c2b3eca59a26de98585
                                            • Instruction ID: 390a26447738228e32eccb5d369718adc2b7b851db0a593094c8c9fad7942761
                                            • Opcode Fuzzy Hash: f109c1cbd97c2954ccfb77a4778902760a5440b8c4631c2b3eca59a26de98585
                                            • Instruction Fuzzy Hash: 753133B5D002898FDF14CFA9C8857AEBFB1BF09314F14852EE855AB290D7789485CF92
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 0159C9BA
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.694143245.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_1590000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f8daf267848c28e782fe990d9465ae1189a663ddde1438db993b0bde2f64de76
                                            • Instruction ID: 58acc9649ebf321ae19b325e906e17029d6f76301d64928fb1e272dd5473748b
                                            • Opcode Fuzzy Hash: f8daf267848c28e782fe990d9465ae1189a663ddde1438db993b0bde2f64de76
                                            • Instruction Fuzzy Hash: A23116B1D002499FDF14CFA9C4857AEBBF1BF08314F148529E815AB390D778A845CF96
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 01594D42
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.694143245.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_1590000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: dae5cd99f1bdfff97695d77b7daa2a944b9bef9f43598620ccdd7b5393e5a705
                                            • Instruction ID: f12990dfbb6f3e1f056d9108926cc95933051089610575b2d976d70e358ce453
                                            • Opcode Fuzzy Hash: dae5cd99f1bdfff97695d77b7daa2a944b9bef9f43598620ccdd7b5393e5a705
                                            • Instruction Fuzzy Hash: 70218CB68013458FCB10DFA9C6497AEBBF4FF08314F24882AD445EB641D7386945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 01594D42
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.694143245.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_1590000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: 50eded1199508459ca6c6587d8a9fa9b03a948b4006f941b3f77b6fdb5e2217c
                                            • Instruction ID: 154cd5eeab11806d920bf319d268a01959b7581689fc910365d401a64d30eeca
                                            • Opcode Fuzzy Hash: 50eded1199508459ca6c6587d8a9fa9b03a948b4006f941b3f77b6fdb5e2217c
                                            • Instruction Fuzzy Hash: 9511ACB59013458FCB10DFA9C60879EBFF4FB48314F24882AD404A7640D7386945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.693704753.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_14ed000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fa5e2d64462cc37865641756a227eaf3c3e98f554ece40f708fc08cbc12b3fa0
                                            • Instruction ID: a44d94a46f15192a9fd20c4e4fb6d606495b95050ef4d193e7711decd9156caf
                                            • Opcode Fuzzy Hash: fa5e2d64462cc37865641756a227eaf3c3e98f554ece40f708fc08cbc12b3fa0
                                            • Instruction Fuzzy Hash: 0E212871904340DFDB05CF94D9C8B27BBE5FB88329F24896AD8050B326C336D856CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.693789153.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_14fd000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cdd7702019c7eef841531b361bb5a9165dd9c7942d924b1f2e187ce01bac1bc9
                                            • Instruction ID: 1289aced1b18ba750027a10fcab6e68cdcb48d57d4c3f04e0dbb477c7f83ffd2
                                            • Opcode Fuzzy Hash: cdd7702019c7eef841531b361bb5a9165dd9c7942d924b1f2e187ce01bac1bc9
                                            • Instruction Fuzzy Hash: 18213771504200DFCB05CF64D8C4B26BBA5FB84318F24C97EDA495B366C33AD806CAA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000003.00000002.693704753.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_14ed000_DHL DELIVERY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 67a26b7e00566609b61cc6e7b6904e6af9279d8b55cc0f39cc8370a306dd16ad
                                            • Instruction ID: 37d25e9c2b93440e4aa81bc65f3802966dccb939311e73a1cd8c749a8bcb3fdc
                                            • Opcode Fuzzy Hash: 67a26b7e00566609b61cc6e7b6904e6af9279d8b55cc0f39cc8370a306dd16ad
                                            • Instruction Fuzzy Hash: F511D376804280CFCB12CF54D9C4B16BFB1FF84324F2486AAD8450B766C33AD45ACBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%