Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HHGHJJUILn.exe

Overview

General Information

Sample Name:HHGHJJUILn.exe
Analysis ID:764040
MD5:103f2ca898f5c7285a3651f23d926218
SHA1:aded75bc932ddb0c9b17f257f82a5be822cab8e6
SHA256:10633d83edea2308a01d9bcbd507737bf66e93550be49239cd801257f79c7d37
Tags:exe
Infos:

Detection

DarkCloud
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected DarkCloud
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Writes to foreign memory regions
Detected potential unwanted application
Tries to steal Crypto Currency Wallets
Writes or reads registry keys via WMI
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
Drops PE files to the user root directory
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Drops PE files to the user directory
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • HHGHJJUILn.exe (PID: 5460 cmdline: C:\Users\user\Desktop\HHGHJJUILn.exe MD5: 103F2CA898F5C7285A3651F23D926218)
    • vbc.exe (PID: 5168 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
    • vbc.exe (PID: 5140 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
    • vbc.exe (PID: 5132 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
    • vbc.exe (PID: 4772 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
    00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
      Process Memory Space: HHGHJJUILn.exe PID: 5460SUSP_Reversed_Base64_Encoded_EXEDetects an base64 encoded executable with reversed charactersFlorian Roth
      • 0x212b6:$s2: AAAAAAAAAAoVT
      • 0x19769f:$s2: AAAAAAAAAAoVT
      • 0x2af0d0:$s2: AAAAAAAAAAoVT
      Process Memory Space: HHGHJJUILn.exe PID: 5460JoeSecurity_DarkCloudYara detected DarkCloudJoe Security
        Process Memory Space: vbc.exe PID: 4772JoeSecurity_DarkCloudYara detected DarkCloudJoe Security
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          0.2.HHGHJJUILn.exe.252d0175a70.4.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
            0.2.HHGHJJUILn.exe.252d0175a70.4.unpackMALWARE_Win_A310LoggerDetects A310LoggerditekSHen
            • 0x2f958:$s1: Temporary Directory * for
            • 0x2f994:$s2: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*RD_
            • 0x31b98:$s6: Content-Disposition: form-data; name="document"; filename="
            • 0x2f940:$s7: CopyHere
            • 0x2f8fc:$s9: Shell.Application
            • 0x2fca0:$s9: shell.application
            • 0x31d0c:$s10: SetRequestHeader
            • 0x2fa3c:$s12: @TITLE Removing
            • 0x2fa74:$s13: @RD /S /Q "
            0.2.HHGHJJUILn.exe.252d012dbe0.3.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
              0.2.HHGHJJUILn.exe.252d012dbe0.3.unpackMALWARE_Win_A310LoggerDetects A310LoggerditekSHen
              • 0x77b0:$s1: Temporary Directory * for
              • 0x77ec:$s2: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*RD_
              • 0x99f0:$s6: Content-Disposition: form-data; name="document"; filename="
              • 0x7798:$s7: CopyHere
              • 0x7754:$s9: Shell.Application
              • 0x7af8:$s9: shell.application
              • 0x9b64:$s10: SetRequestHeader
              • 0x7894:$s12: @TITLE Removing
              • 0x78cc:$s13: @RD /S /Q "
              4.0.vbc.exe.400000.0.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
                Click to see the 5 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: HHGHJJUILn.exeJoe Sandbox ML: detected
                Source: 4.3.vbc.exe.502d8d0.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.unpackAvira: Label: TR/Dropper.Gen
                Source: 4.0.vbc.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
                Source: 4.2.vbc.exe.502d8d0.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: HHGHJJUILn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: HHGHJJUILn.pdb source: HHGHJJUILn.exe
                Source: Binary string: W.pdb4 source: HHGHJJUILn.exe, 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, vbsqlite3.dll.4.dr
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\BUMBUM.pdb source: HHGHJJUILn.exe, 00000000.00000002.248728659.00000252BF9A1000.00000004.00000800.00020000.00000000.sdmp, HHGHJJUILn.exe, 00000000.00000002.248645893.00000252BE0D0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\BUMBUM.pdbBSJB source: HHGHJJUILn.exe, 00000000.00000002.248728659.00000252BF9A1000.00000004.00000800.00020000.00000000.sdmp, HHGHJJUILn.exe, 00000000.00000002.248645893.00000252BE0D0000.00000004.08000000.00040000.00000000.sdmp

                Networking

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeDNS query: name: showip.net
                Source: Joe Sandbox ViewIP Address: 162.55.60.2 162.55.60.2
                Source: HHGHJJUILn.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                Source: HHGHJJUILn.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: HHGHJJUILn.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
                Source: HHGHJJUILn.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                Source: HHGHJJUILn.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: HHGHJJUILn.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceCodeSigningCA.crt0
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0O
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl3.digicert.com/sha2-ha-cs-g1.crl00
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: HHGHJJUILn.exeString found in binary or memory: http://crl4.digicert.com/sha2-ha-cs-g1.crl0L
                Source: HHGHJJUILn.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: HHGHJJUILn.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: HHGHJJUILn.exeString found in binary or memory: http://ocsp.digicert.com0I
                Source: HHGHJJUILn.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: HHGHJJUILn.exeString found in binary or memory: http://ocsp.digicert.com0P
                Source: HHGHJJUILn.exeString found in binary or memory: http://ocsp.digicert.com0R
                Source: vbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org
                Source: vbc.exe, 00000004.00000002.510113204.0000000004FFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.net/
                Source: HHGHJJUILn.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                Source: vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.maxmind.com
                Source: LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: HHGHJJUILn.exe, 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                Source: vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
                Source: vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
                Source: vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
                Source: vbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://showip.net/
                Source: vbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://showip.net/?checkip=
                Source: vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unpkg.com/leaflet
                Source: HHGHJJUILn.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: vbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.281674526.0000000005085000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.272371184.0000000005085000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.openstreetmap.org/copyright
                Source: unknownDNS traffic detected: queries for: showip.net
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Project1sqliteHost: showip.net

                System Summary

                barindex
                Source: 0.2.HHGHJJUILn.exe.252d0175a70.4.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                Source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                Source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                Source: 0.2.HHGHJJUILn.exe.252d0175a70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                Source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                Source: HHGHJJUILn.exePE Siganture Subject Chain: CN=Wen Jia Liu, O=Wen Jia Liu, L=Sydney, S=New South Wales, C=AU
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: HHGHJJUILn.exe, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csLong String: Length: 745497
                Source: HHGHJJUILn.exe, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csLong String: Length: 29301
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csLong String: Length: 837648
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csLong String: Length: 29301
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csLong String: Length: 837648
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csLong String: Length: 29301
                Source: 0.2.HHGHJJUILn.exe.252d0175a70.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                Source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                Source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                Source: 0.2.HHGHJJUILn.exe.252d0175a70.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                Source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                Source: Process Memory Space: HHGHJJUILn.exe PID: 5460, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeCode function: 0_2_00007FFDC87E0E1D0_2_00007FFDC87E0E1D
                Source: HHGHJJUILn.exeStatic PE information: No import functions for PE file found
                Source: HHGHJJUILn.exe, 00000000.00000002.248728659.00000252BF9A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBUMBUM.dll. vs HHGHJJUILn.exe
                Source: HHGHJJUILn.exe, 00000000.00000002.248645893.00000252BE0D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBUMBUM.dll. vs HHGHJJUILn.exe
                Source: HHGHJJUILn.exe, 00000000.00000002.248401710.00000252BDF3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HHGHJJUILn.exe
                Source: HHGHJJUILn.exe, 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirebase.exe vs HHGHJJUILn.exe
                Source: HHGHJJUILn.exeStatic PE information: invalid certificate
                Source: Joe Sandbox ViewDropped File: C:\Users\Public\vbsqlite3.dll DCFCD16FBF0511D3F2B3792E5493FA22D7291E4BB2EFBFA5ADE5002A04FC2CAB
                Source: vbsqlite3.dll.4.drStatic PE information: Section: UPX1 ZLIB complexity 0.9930182122564936
                Source: HHGHJJUILn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\HHGHJJUILn.exe C:\Users\user\Desktop\HHGHJJUILn.exe
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HHGHJJUILn.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/3@1/1
                Source: HHGHJJUILn.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 47.53%
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                Source: HHGHJJUILn.exe, 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: C*\AC:\Users\user1\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1sqlite.vbp
                Source: vbc.exe, 00000004.00000002.509871994.000000000043F000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: =@*\AC:\Users\user1\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1sqlite.vbp
                Source: HHGHJJUILn.exeString found in binary or memory: %/adD
                Source: HHGHJJUILn.exe, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.csCryptographic APIs: 'CreateDecryptor'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: HHGHJJUILn.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: HHGHJJUILn.exeStatic file information: File size 1631776 > 1048576
                Source: HHGHJJUILn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: HHGHJJUILn.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x188800
                Source: HHGHJJUILn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: HHGHJJUILn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: HHGHJJUILn.pdb source: HHGHJJUILn.exe
                Source: Binary string: W.pdb4 source: HHGHJJUILn.exe, 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, vbsqlite3.dll.4.dr
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\BUMBUM.pdb source: HHGHJJUILn.exe, 00000000.00000002.248728659.00000252BF9A1000.00000004.00000800.00020000.00000000.sdmp, HHGHJJUILn.exe, 00000000.00000002.248645893.00000252BE0D0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\BUMBUM.pdbBSJB source: HHGHJJUILn.exe, 00000000.00000002.248728659.00000252BF9A1000.00000004.00000800.00020000.00000000.sdmp, HHGHJJUILn.exe, 00000000.00000002.248645893.00000252BE0D0000.00000004.08000000.00040000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: HHGHJJUILn.exe, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.cs.Net Code: Fb1AEOaU7 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.cs.Net Code: Fb1AEOaU7 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.cs.Net Code: Fb1AEOaU7 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: HHGHJJUILn.exe, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: HHGHJJUILn.exeStatic PE information: real checksum: 0x194b5f should be: 0x1917bd
                Source: vbsqlite3.dll.4.drStatic PE information: real checksum: 0x0 should be: 0x2ae74
                Source: HHGHJJUILn.exeStatic PE information: 0xBC772981 [Thu Mar 13 08:46:57 2070 UTC]
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: HHGHJJUILn.exe, HHGHJJUILn/Form1.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'YuOqfTprM', 'MLNZSZRFrajNUp8qsp', 'QKFPvBtNpBg69j7Nnf', 'OX6eQ4cexP0VbKZYHd', 'bsysAD7ggZAVgKjpwe', 'pJgmfyX8ODddoG1ri3', 'EdoPmEr7rodWECslCW', 'Wp9BtVBZUNcCDe2G4j'
                Source: HHGHJJUILn.exe, En1Psw4F6pV2BGk3HS/ksk0w2p0NeUeOsNX1k.csHigh entropy of concatenated method names: 'tItAnDqvZw', 'q9cAVedEOK', 'vogA065LUG', '.ctor', 'kLjw4iIsCLsZtxc4lksN0j', '.cctor', 'megHtLN4uvGf4nCRjm', 'G4LOidn2EpGskKj5dn', 'UeEp48U6NOtmIrWXau', 'Yd6kaMVw5VqNsnPYj8'
                Source: HHGHJJUILn.exe, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csHigh entropy of concatenated method names: 'Fb1AEOaU7', 'P6xUHAj56', '.cctor', 'A06XxWmccOiN4rKPjE', 'ckqFXlFonRXwg7hGMo', 'mi7ZZuYZOG800P2wrb', 'S2nGXdJDRjIatIq3yl', 'vKbcCMELP1Ff62L5Oc', 'dyH6VaCeOOc3qHO1sU'
                Source: HHGHJJUILn.exe, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.csHigh entropy of concatenated method names: '.cctor', 'w5iB4s0vtohFt', 'EVrnj8HXc', 'hW9V16hSn', 'XA20E1B6m', 'X9jZKh2WY', 'YuD7NMJ3H', 'yu2GulHW3', 'NSb63FLLs', 'ruvfdsjMx'
                Source: HHGHJJUILn.exe, gJMOHJbIEe0MYsJbwl/GjqP19iwYoYd3r8X3Q.csHigh entropy of concatenated method names: 'bttB4s00sthd0', '.ctor', '.cctor', 'P1FDtSURv5Uv1lFtlE', 'JVDxtvDUYWhjE6hJg7', 'hwBvASNOS9VEAeE2CW', 'nsq8D2qkGJ1RlLF3S8', 'oqM2QpLak1XUxIwwB6', 'wQNnYvW1BlqUUlaKig', 'yiPfGpOSQn7WMKo59Y'
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, HHGHJJUILn/Form1.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'YuOqfTprM', 'MLNZSZRFrajNUp8qsp', 'QKFPvBtNpBg69j7Nnf', 'OX6eQ4cexP0VbKZYHd', 'bsysAD7ggZAVgKjpwe', 'pJgmfyX8ODddoG1ri3', 'EdoPmEr7rodWECslCW', 'Wp9BtVBZUNcCDe2G4j'
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csHigh entropy of concatenated method names: 'Fb1AEOaU7', 'P6xUHAj56', '.cctor', 'A06XxWmccOiN4rKPjE', 'ckqFXlFonRXwg7hGMo', 'mi7ZZuYZOG800P2wrb', 'S2nGXdJDRjIatIq3yl', 'vKbcCMELP1Ff62L5Oc', 'dyH6VaCeOOc3qHO1sU'
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, En1Psw4F6pV2BGk3HS/ksk0w2p0NeUeOsNX1k.csHigh entropy of concatenated method names: 'tItAnDqvZw', 'q9cAVedEOK', 'vogA065LUG', '.ctor', 'kLjw4iIsCLsZtxc4lksN0j', '.cctor', 'megHtLN4uvGf4nCRjm', 'G4LOidn2EpGskKj5dn', 'UeEp48U6NOtmIrWXau', 'Yd6kaMVw5VqNsnPYj8'
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.csHigh entropy of concatenated method names: '.cctor', 'w5iB4s0vtohFt', 'EVrnj8HXc', 'hW9V16hSn', 'XA20E1B6m', 'X9jZKh2WY', 'YuD7NMJ3H', 'yu2GulHW3', 'NSb63FLLs', 'ruvfdsjMx'
                Source: 0.0.HHGHJJUILn.exe.252bdc30000.0.unpack, gJMOHJbIEe0MYsJbwl/GjqP19iwYoYd3r8X3Q.csHigh entropy of concatenated method names: 'bttB4s00sthd0', '.ctor', '.cctor', 'P1FDtSURv5Uv1lFtlE', 'JVDxtvDUYWhjE6hJg7', 'hwBvASNOS9VEAeE2CW', 'nsq8D2qkGJ1RlLF3S8', 'oqM2QpLak1XUxIwwB6', 'wQNnYvW1BlqUUlaKig', 'yiPfGpOSQn7WMKo59Y'
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, HHGHJJUILn/Form1.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'YuOqfTprM', 'MLNZSZRFrajNUp8qsp', 'QKFPvBtNpBg69j7Nnf', 'OX6eQ4cexP0VbKZYHd', 'bsysAD7ggZAVgKjpwe', 'pJgmfyX8ODddoG1ri3', 'EdoPmEr7rodWECslCW', 'Wp9BtVBZUNcCDe2G4j'
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, AcmWjvFtj9egtnnJX9/dZ7qkvqcNhO85yPNrX.csHigh entropy of concatenated method names: 'Fb1AEOaU7', 'P6xUHAj56', '.cctor', 'A06XxWmccOiN4rKPjE', 'ckqFXlFonRXwg7hGMo', 'mi7ZZuYZOG800P2wrb', 'S2nGXdJDRjIatIq3yl', 'vKbcCMELP1Ff62L5Oc', 'dyH6VaCeOOc3qHO1sU'
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, En1Psw4F6pV2BGk3HS/ksk0w2p0NeUeOsNX1k.csHigh entropy of concatenated method names: 'tItAnDqvZw', 'q9cAVedEOK', 'vogA065LUG', '.ctor', 'kLjw4iIsCLsZtxc4lksN0j', '.cctor', 'megHtLN4uvGf4nCRjm', 'G4LOidn2EpGskKj5dn', 'UeEp48U6NOtmIrWXau', 'Yd6kaMVw5VqNsnPYj8'
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, o3eGGqBtdpdaBbRpbh/yV5CsNT40LRKh3Lcnn.csHigh entropy of concatenated method names: '.cctor', 'w5iB4s0vtohFt', 'EVrnj8HXc', 'hW9V16hSn', 'XA20E1B6m', 'X9jZKh2WY', 'YuD7NMJ3H', 'yu2GulHW3', 'NSb63FLLs', 'ruvfdsjMx'
                Source: 0.2.HHGHJJUILn.exe.252bdc30000.0.unpack, gJMOHJbIEe0MYsJbwl/GjqP19iwYoYd3r8X3Q.csHigh entropy of concatenated method names: 'bttB4s00sthd0', '.ctor', '.cctor', 'P1FDtSURv5Uv1lFtlE', 'JVDxtvDUYWhjE6hJg7', 'hwBvASNOS9VEAeE2CW', 'nsq8D2qkGJ1RlLF3S8', 'oqM2QpLak1XUxIwwB6', 'wQNnYvW1BlqUUlaKig', 'yiPfGpOSQn7WMKo59Y'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile created: C:\Users\Public\vbsqlite3.dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile created: C:\Users\Public\vbsqlite3.dllJump to dropped file

                Boot Survival

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile created: C:\Users\Public\vbsqlite3.dllJump to dropped file
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exe TID: 2248Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeDropped PE file which has not been started: C:\Users\Public\vbsqlite3.dllJump to dropped file
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: vbc.exe, 00000004.00000002.510113204.0000000004FFA000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 401000Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 43F000Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 440000Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 4D9A008Jump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeQueries volume information: C:\Users\user\Desktop\HHGHJJUILn.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HHGHJJUILn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d0175a70.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d0175a70.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HHGHJJUILn.exe PID: 5460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4772, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4772, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4772, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d0175a70.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d0175a70.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HHGHJJUILn.exe.252d012dbe0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HHGHJJUILn.exe PID: 5460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4772, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4772, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Windows Management Instrumentation
                Path Interception311
                Process Injection
                111
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer2
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Obfuscated Files or Information
                Cached Domain Credentials12
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items221
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                HHGHJJUILn.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\Public\vbsqlite3.dll0%ReversingLabs
                C:\Users\Public\vbsqlite3.dll1%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                4.3.vbc.exe.502d8d0.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                0.2.HHGHJJUILn.exe.252d012dbe0.3.unpack100%AviraTR/Dropper.GenDownload File
                4.0.vbc.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
                0.2.HHGHJJUILn.exe.252d0175a70.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                4.2.vbc.exe.502d8d0.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                showip.net
                162.55.60.2
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://showip.net/false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                      high
                      https://search.yahoo.com?fr=crmas_sfpvbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                        high
                        https://duckduckgo.com/chrome_newtabvbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                          high
                          http://schema.orgvbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://duckduckgo.com/ac/?q=LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                              high
                              https://www.google.com/images/branding/product/ico/googleg_lodp.icovbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                                high
                                https://api.telegram.org/botHHGHJJUILn.exe, 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  https://showip.net/vbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://www.openstreetmap.org/copyrightvbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.281674526.0000000005085000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.272371184.0000000005085000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://unpkg.com/leafletvbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://search.yahoo.com?fr=crmas_sfpfvbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                                          high
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                                            high
                                            https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchvbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                                              high
                                              http://www.maxmind.comvbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://showip.net/?checkip=vbc.exe, 00000004.00000003.271857889.0000000005087000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271870029.000000000507C000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.271831148.0000000005090000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                                                    high
                                                    https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=vbc.exe, 00000004.00000003.272068154.00000000050B9000.00000004.00000020.00020000.00000000.sdmp, LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama.4.drfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      162.55.60.2
                                                      showip.netUnited States
                                                      35893ACPCAfalse
                                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                                      Analysis ID:764040
                                                      Start date and time:2022-12-09 10:56:11 +01:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 6m 54s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Sample file name:HHGHJJUILn.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:15
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@9/3@1/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:
                                                      • Successful, ratio: 49.2% (good quality ratio 42.7%)
                                                      • Quality average: 61.9%
                                                      • Quality standard deviation: 37.1%
                                                      HCA Information:
                                                      • Successful, ratio: 97%
                                                      • Number of executed functions: 7
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      10:57:25API Interceptor1x Sleep call for process: vbc.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      162.55.60.2Neue Ordnung #071244.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      Consulta por pedido.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      DC-098432345678909 (2).exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      Payment Recipt_8387493.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      file.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      Elementi.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      SKM_CIE2201101122.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      firebase.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      Payment Receipt_03748HSBC.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      booking.docGet hashmaliciousBrowse
                                                      • showip.net/
                                                      Booking.docGet hashmaliciousBrowse
                                                      • showip.net/
                                                      K3k4wzvrDA.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      myAkfZFpeD.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      51yt3412Ao.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      f9.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      RFQ - Consulta.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      RFQ - Consulta.imgGet hashmaliciousBrowse
                                                      • showip.net/
                                                      Hesaphareketi-01.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      DKP98765434567000987890.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      BluStealer.bin.exeGet hashmaliciousBrowse
                                                      • showip.net/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      showip.netNeue Ordnung #071244.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      Consulta por pedido.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      DC-098432345678909 (2).exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      Payment Recipt_8387493.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      file.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      Elementi.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      SKM_CIE2201101122.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      firebase.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      Payment Receipt_03748HSBC.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      booking.docGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      Booking.docGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      K3k4wzvrDA.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      myAkfZFpeD.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      51yt3412Ao.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      f9.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      RFQ - Consulta.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      RFQ - Consulta.imgGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      Hesaphareketi-01.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      DKP98765434567000987890.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      BluStealer.bin.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      ACPCA6rowFGzE63.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      xOHlsAm11w.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      5hNS7GdPbp.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      file.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      http://supportiveschooldiscipline.orgGet hashmaliciousBrowse
                                                      • 162.0.209.145
                                                      0x3FuWDGO6.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      dIy9grEJ3y.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      YA8MdefPvk.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      Neue Ordnung #071244.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      3NWI7BuBC4.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      9pwAafcx8L.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      nZmXxXPp9p.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      Consulta por pedido.exeGet hashmaliciousBrowse
                                                      • 162.55.60.2
                                                      SYYtvSH42K.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      1JXdKB8DI5.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      Rec-00min57secs_debra.roberts018.htmGet hashmaliciousBrowse
                                                      • 162.0.222.146
                                                      windll32.exeGet hashmaliciousBrowse
                                                      • 162.55.126.123
                                                      SWIFT.103_18735_PDF.vbsGet hashmaliciousBrowse
                                                      • 162.0.217.158
                                                      buildz.exeGet hashmaliciousBrowse
                                                      • 162.0.217.254
                                                      https://jj.newsstes.online/.01Get hashmaliciousBrowse
                                                      • 162.55.4.52
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      C:\Users\Public\vbsqlite3.dllNeue Ordnung #071244.exeGet hashmaliciousBrowse
                                                        Consulta por pedido.exeGet hashmaliciousBrowse
                                                          Halkbank_Ekstre_20221206_081244_137027,PDF.exeGet hashmaliciousBrowse
                                                            SecuriteInfo.com.Trojan.MSIL.Crypt.8892.8543.exeGet hashmaliciousBrowse
                                                              Halkbank_Ekstre_20221201_081244_137027,PDF.exeGet hashmaliciousBrowse
                                                                ekstre_2212010064088700.exeGet hashmaliciousBrowse
                                                                  Halkbank_Ekstre_20221201_081244_137027.r00.exeGet hashmaliciousBrowse
                                                                    odemePlani.exeGet hashmaliciousBrowse
                                                                      S009892822038800,PDF.exeGet hashmaliciousBrowse
                                                                        S009989282203880000,PDF.exeGet hashmaliciousBrowse
                                                                          14455235542662_20221128.exeGet hashmaliciousBrowse
                                                                            Swift E-Posta Bildirimi 7,500 USD.exeGet hashmaliciousBrowse
                                                                              DC-098432345678909 (2).exeGet hashmaliciousBrowse
                                                                                SecuriteInfo.com.PWSX-gen.2468.20771.exeGet hashmaliciousBrowse
                                                                                  Payment Recipt_8387493.exeGet hashmaliciousBrowse
                                                                                    file.exeGet hashmaliciousBrowse
                                                                                      08765406780909-09dc.exeGet hashmaliciousBrowse
                                                                                        08765406780909-09dc.exeGet hashmaliciousBrowse
                                                                                          Elementi.exeGet hashmaliciousBrowse
                                                                                            SKM_CIE2201101122.exeGet hashmaliciousBrowse
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                                              Category:dropped
                                                                                              Size (bytes):165376
                                                                                              Entropy (8bit):7.894371604278017
                                                                                              Encrypted:false
                                                                                              SSDEEP:3072:eNFwdmspaPg9g9oOavAQBNrPkVdc88GjU+vF6nuxRocX5GOOUleo+c:e8d1/w5KA81IJ8GpF6nuTmOOU
                                                                                              MD5:073A17B6CFB1112C6C838B2FBA06A657
                                                                                              SHA1:A54BB22489EAA8C52EB3E512AEE522320530B0BE
                                                                                              SHA-256:DCFCD16FBF0511D3F2B3792E5493FA22D7291E4BB2EFBFA5ADE5002A04FC2CAB
                                                                                              SHA-512:5BC8307350BD8BA09FA9EEDDDC62F1DBA65DB62EB09AE64E0ADFF4DFAD0937DBEC5B621F294F5980BF77033FAAC3BFE200945C0280606915EE9A82D34A003B9E
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              • Antivirus: Virustotal, Detection: 1%, Browse
                                                                                              Joe Sandbox View:
                                                                                              • Filename: Neue Ordnung #071244.exe, Detection: malicious, Browse
                                                                                              • Filename: Consulta por pedido.exe, Detection: malicious, Browse
                                                                                              • Filename: Halkbank_Ekstre_20221206_081244_137027,PDF.exe, Detection: malicious, Browse
                                                                                              • Filename: SecuriteInfo.com.Trojan.MSIL.Crypt.8892.8543.exe, Detection: malicious, Browse
                                                                                              • Filename: Halkbank_Ekstre_20221201_081244_137027,PDF.exe, Detection: malicious, Browse
                                                                                              • Filename: ekstre_2212010064088700.exe, Detection: malicious, Browse
                                                                                              • Filename: Halkbank_Ekstre_20221201_081244_137027.r00.exe, Detection: malicious, Browse
                                                                                              • Filename: odemePlani.exe, Detection: malicious, Browse
                                                                                              • Filename: S009892822038800,PDF.exe, Detection: malicious, Browse
                                                                                              • Filename: S009989282203880000,PDF.exe, Detection: malicious, Browse
                                                                                              • Filename: 14455235542662_20221128.exe, Detection: malicious, Browse
                                                                                              • Filename: Swift E-Posta Bildirimi 7,500 USD.exe, Detection: malicious, Browse
                                                                                              • Filename: DC-098432345678909 (2).exe, Detection: malicious, Browse
                                                                                              • Filename: SecuriteInfo.com.PWSX-gen.2468.20771.exe, Detection: malicious, Browse
                                                                                              • Filename: Payment Recipt_8387493.exe, Detection: malicious, Browse
                                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                                              • Filename: 08765406780909-09dc.exe, Detection: malicious, Browse
                                                                                              • Filename: 08765406780909-09dc.exe, Detection: malicious, Browse
                                                                                              • Filename: Elementi.exe, Detection: malicious, Browse
                                                                                              • Filename: SKM_CIE2201101122.exe, Detection: malicious, Browse
                                                                                              Reputation:moderate, very likely benign file
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F..p.~.#.~.#.~.#.,!#.~.#.,'#.~.#%..#.~.#.~.#]~.#.,6#.~.#.,1#.~.#., #.~.#.,&#.~.#.,##.~.#Rich.~.#........PE..L......H...........!.....p... .......e.......p............................................@..........................t..D....r..(....p......................\........................................g..H...........................................UPX0....................................UPX1.....p.......h..................@....rsrc.... ...p.......l..............@......................................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                                                                                              Process:C:\Users\user\Desktop\HHGHJJUILn.exe
                                                                                              File Type:CSV text
                                                                                              Category:dropped
                                                                                              Size (bytes):226
                                                                                              Entropy (8bit):5.354940450065058
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
                                                                                              MD5:B10E37251C5B495643F331DB2EEC3394
                                                                                              SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
                                                                                              SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
                                                                                              SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
                                                                                              Malicious:true
                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 3
                                                                                              Category:dropped
                                                                                              Size (bytes):94208
                                                                                              Entropy (8bit):1.2889923589460437
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:Qo1/8dpUXbSzTPJP/6oVuss8Ewn7PrH944:QS/inXrVuss8Ewn7b944
                                                                                              MD5:7901DD9DF50A993306401B7360977746
                                                                                              SHA1:E5BA33E47A3A76CC009EC1D63C5D1A810BE40521
                                                                                              SHA-256:1019C8ADA4DA9DEF665F59DB191CA3A613F954C12813BE5907E1F5CB91C09BE9
                                                                                              SHA-512:90C785D22D0D7F5DA90D52B14010719A5554BB5A7F0029C3F4E11A97AD72A7A600D846174C7B40D47D24B0995CDBAC21E255EC63AC9C07CF6E106572EA181DD5
                                                                                              Malicious:false
                                                                                              Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):4.29079911305477
                                                                                              TrID:
                                                                                              • Win64 Executable GUI Net Framework (217006/5) 47.53%
                                                                                              • Win64 Executable GUI (202006/5) 44.25%
                                                                                              • Win64 Executable (generic) Net Framework (21505/4) 4.71%
                                                                                              • Win64 Executable (generic) (12005/4) 2.63%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.44%
                                                                                              File name:HHGHJJUILn.exe
                                                                                              File size:1631776
                                                                                              MD5:103f2ca898f5c7285a3651f23d926218
                                                                                              SHA1:aded75bc932ddb0c9b17f257f82a5be822cab8e6
                                                                                              SHA256:10633d83edea2308a01d9bcbd507737bf66e93550be49239cd801257f79c7d37
                                                                                              SHA512:19e9732bd86ca29458d3575db2940c14d33266e6d43fad80523a14a47f2eeaf8a6919534509ece55829a4dbeac269c0f6fafa831665af150b9dcee779d3c500a
                                                                                              SSDEEP:12288:nGrB8Ut5pnAYxJsBDrYPL32PWfDyVan2bAESn97ahY9ceFI/t7tH8rxnaj2/e/PD:GrBi8rxnajdM2th9VYy
                                                                                              TLSH:9475BC2A38BA010DB361AD9C6BBCB175910EF7F2163A5C774DF7060A25139F0CB9D626
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....)w...................... ........... ....@...... .............................._K....`................................
                                                                                              Icon Hash:92aca8b2b2a2b286
                                                                                              Entrypoint:0x400000
                                                                                              Entrypoint Section:
                                                                                              Digitally signed:true
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
                                                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0xBC772981 [Thu Mar 13 08:46:57 2070 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:
                                                                                              Signature Valid:false
                                                                                              Signature Issuer:CN=DigiCert High Assurance Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US
                                                                                              Signature Validation Error:The digital signature of the object did not verify
                                                                                              Error Number:-2146869232
                                                                                              Not Before, Not After
                                                                                              • 10/29/2013 5:00:00 PM 1/4/2017 4:00:00 AM
                                                                                              Subject Chain
                                                                                              • CN=Wen Jia Liu, O=Wen Jia Liu, L=Sydney, S=New South Wales, C=AU
                                                                                              Version:3
                                                                                              Thumbprint MD5:FB7AAB26B203432685FBC0FF17F24045
                                                                                              Thumbprint SHA-1:32387AEC09EB287F202E98398189B460F4C61A0D
                                                                                              Thumbprint SHA-256:E0E85619EEF45FCE4421E4BA581060E43BBBF25911CD757DD081DA425DD1DB51
                                                                                              Serial:0FF1EF66BD621C65B74B4DE41425717F
                                                                                              Instruction
                                                                                              dec ebp
                                                                                              pop edx
                                                                                              nop
                                                                                              add byte ptr [ebx], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax+eax], al
                                                                                              add byte ptr [eax], al
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x18e0000x1bfa.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x18ac000x3a20
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x18a5900x1c.text
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000x1886340x188800False0.2850026124601911data4.209755910815595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .sdata0x18c0000x1e80x200False0.857421875data6.638446248926509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .rsrc0x18e0000x1bfa0x1c00False0.3529575892857143data5.504563155253437IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountry
                                                                                              RT_ICON0x18e1b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                                                                                              RT_ICON0x18f2580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                                                                                              RT_GROUP_ICON0x18f6c00x22data
                                                                                              RT_VERSION0x18f6e40x32cdata
                                                                                              RT_MANIFEST0x18fa100x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 9, 2022 10:57:15.916726112 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.940066099 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.940274954 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.942653894 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.964567900 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965302944 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965341091 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965367079 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965387106 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965396881 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965434074 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965460062 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965523005 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965547085 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965570927 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965576887 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965595007 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965595007 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965609074 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965615988 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965636015 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:15.965637922 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965660095 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:15.965668917 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:30.987771988 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:30.987884998 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:57:46.072297096 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:57:46.072392941 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:58:01.175959110 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:58:01.176172018 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:58:16.280128956 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:58:16.280333996 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:58:31.385688066 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:58:31.386337042 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:58:46.488641977 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:58:46.488744020 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:59:01.591901064 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:59:01.592098951 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:59:05.735914946 CET4971180192.168.2.7162.55.60.2
                                                                                              Dec 9, 2022 10:59:05.758949995 CET8049711162.55.60.2192.168.2.7
                                                                                              Dec 9, 2022 10:59:05.759134054 CET4971180192.168.2.7162.55.60.2
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 9, 2022 10:57:15.882508039 CET5050553192.168.2.78.8.8.8
                                                                                              Dec 9, 2022 10:57:15.901057959 CET53505058.8.8.8192.168.2.7
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Dec 9, 2022 10:57:15.882508039 CET192.168.2.78.8.8.80x51cbStandard query (0)showip.netA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Dec 9, 2022 10:57:15.901057959 CET8.8.8.8192.168.2.70x51cbNo error (0)showip.net162.55.60.2A (IP address)IN (0x0001)false
                                                                                              • showip.net
                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                              0192.168.2.749711162.55.60.280C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              TimestampkBytes transferredDirectionData
                                                                                              Dec 9, 2022 10:57:15.942653894 CET148OUTGET / HTTP/1.1
                                                                                              User-Agent: Project1sqlite
                                                                                              Host: showip.net
                                                                                              Dec 9, 2022 10:57:15.965302944 CET149INHTTP/1.1 200 OK
                                                                                              Access-Control-Allow-Headers: *
                                                                                              Access-Control-Allow-Methods: *
                                                                                              Access-Control-Allow-Origin: *
                                                                                              Content-Type: text/html;charset=utf-8
                                                                                              Date: Fri, 09 Dec 2022 09:57:15 GMT
                                                                                              Server: Caddy
                                                                                              Transfer-Encoding: chunked
                                                                                              Data Raw: 32 33 39 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 0a 20 20 20 20 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 43 68 65 63 6b 20 79 6f 75 72 20 49 50 20 61 64 64 72 65 73 73 20 28 49 50 76 34 20 6f 72 20 49 50 76 36 29 2c 20 67 65 6f 67 72 61 70 68 69 63 61 6c 20 49 50 20 6c 6f 63 61 74 69 6f 6e 20 61 6e 64 20 77 68 69 63 68 20 62 72 6f 77 73 65 72 20 61 6e 64 20 4f 53 20 79 6f 75 20 61 72 65 20 75 73 69 6e 67 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 69 70 2c 20 61 64 64 72 65 73 73 2c 20 6c 6f 63 61 74 69 6f 6e 2c 20 67 65 6f 20 6c 6f 63 61 74 69 6f 6e 2c 20 69 70 20 6c 6f 63 61 74 69 6f 6e 2c 20 69 70 20 61 64 64 72 65 73 73 2c 20 63 68 65 63 6b 20 69 70 2c 20 73 68 6f 77 20 69 70 2c 20 73 68 6f 77 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 6c 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 53 68 6f 77 20 49 50 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 77 65 62 73 69 74 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 43 68 65 63 6b 20 79 6f 75 72 20 49 50 20 61 64 64 72 65 73 73 20 28 49 50 76 34 20 6f 72 20 49 50 76 36 29 2c 20 67 65 6f 67 72 61 70 68 69 63 61 6c 20 49 50 20 6c 6f 63 61 74 69 6f 6e 20 61 6e 64 20 77 68 69 63 68 20 62 72 6f 77 73 65 72 20 61 6e 64 20 4f 53 20 79 6f 75 20 61 72 65 20 75 73 69 6e 67 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 66 62 3a 61 64 6d 69 6e 73 22 20 63 6f 6e 74 65 6e 74 3d 22 36 37 36 31 31 30 32 36 35 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 59 6f 75 72 20 49 50 20 61 64 64 72 65 73 73 20 28 49 50 76 34 20 6f 72 20 49 50 76 36 29 2c 20 67 65 6f 67 72 61 70 68 69 63 61 6c 20 49 50 20 6c 6f 63 61 74 69 6f 6e 2c 20 62 72 6f 77 73 65 72 20 61 6e 64 20 6f 70 65 72 61 74 69 6e 67 20 73 79 73 74 65 6d 20 2d 20 53 68 6f 77 20 49 50 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 59 6f 75 72 20 49 50 20 61 64 64 72 65 73 73 20 28 49 50 76 34 20 6f 72 20 49 50 76 36 29 2c 20 67 65 6f 67 72 61 70 68 69 63 61 6c 20 49 50 20 6c 6f 63 61 74 69 6f 6e 2c 20 62 72 6f 77 73 65 72 20 61 6e 64 20 6f 70 65 72 61 74 69 6e 67
                                                                                              Data Ascii: 2393<!DOCTYPE html><html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="description" content="Check your IP address (IPv4 or IPv6), geographical IP location and which browser and OS you are using"> <meta name="keywords" content="ip, address, location, geo location, ip location, ip address, check ip, show ip, show"> <meta name="robots" content="All"> <meta property="og:site_name" content="Show IP"> <meta property="og:type" content="website"> <meta property="og:description" content="Check your IP address (IPv4 or IPv6), geographical IP location and which browser and OS you are using"> <meta property="fb:admins" content="676110265"> <meta property="og:title" content="Your IP address (IPv4 or IPv6), geographical IP location, browser and operating system - Show IP"> <title>Your IP address (IPv4 or IPv6), geographical IP location, browser and operating
                                                                                              Dec 9, 2022 10:57:15.965341091 CET150INData Raw: 20 73 79 73 74 65 6d 20 2d 20 53 68 6f 77 20 49 50 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 3e 0a 20 20 20 20 7b 0a 20 20 20 20 20 20 22 40 63
                                                                                              Data Ascii: system - Show IP</title> <script type="application/ld+json"> { "@context": "http://schema.org", "@type": "WebSite", "url": "https://showip.net/", "potentialAction": { "@type": "SearchAction", "
                                                                                              Dec 9, 2022 10:57:15.965367079 CET152INData Raw: 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 73 20 63 6c 61 73 73 3d 22 61 64 73 62 79 67 6f 6f 67 6c 65 22 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 22 20 64 61 74 61 2d 61 64 2d 63 6c 69 65 6e 74 3d 22 63 61 2d 70 75 62 2d 38
                                                                                              Data Ascii: <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-8790158038613050" data-ad-slot="1075910599" data-ad-format="auto"></ins> <script>(adsbygoogle = window.adsbygoogle || []).push({});</script>
                                                                                              Dec 9, 2022 10:57:15.965387106 CET152INData Raw: 74 2d 31 20 61 64 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 6f 77 20 61 64 62 61 6e 6e 65 72 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 31 32 22 3e 0a
                                                                                              Data Ascii: t-1 ad"> <div class="row adbanner"> <div class="col-md-12"> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-8790158038613050" data-ad-slot="5506110192" data-ad-forma
                                                                                              Dec 9, 2022 10:57:15.965523005 CET153INData Raw: 74 3d 22 61 75 74 6f 22 3e 3c 2f 69 6e 73 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 63 72 69 70 74 3e 28 61 64 73 62 79 67 6f 6f 67 6c 65 20 3d 20 77 69 6e 64 6f 77 2e 61 64 73 62 79 67 6f 6f 67 6c 65 20 7c 7c 20 5b 5d 29 2e 70 75 73
                                                                                              Data Ascii: t="auto"></ins> <script>(adsbygoogle = window.adsbygoogle || []).push({});</script> </div> </div> </div> </div> <div class="row" id="browser-os"> <div class="col-md-10 col-md-off
                                                                                              Dec 9, 2022 10:57:15.965547085 CET155INData Raw: 72 20 2f 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 6f 77 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 33 20 74 65 78
                                                                                              Data Ascii: r /></div></div> <div class="row"> <div class="col-md-3 text-center"><strong>City:</strong> Zurich</div> <div class="col-md-3 text-center"><strong>Country:</strong> Switzerland</div> <div class="c
                                                                                              Dec 9, 2022 10:57:15.965570927 CET156INData Raw: 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 33 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 74 72 6f 6e 67 3e 41 63 63 65 70 74 2d 45 6e 63 6f 64 69 6e 67 3c 2f 73
                                                                                              Data Ascii: "> <div class="col-md-3"> <strong>Accept-Encoding</strong> </div> <div class="col-md-9"> gzip </div> </div> <div class="
                                                                                              Dec 9, 2022 10:57:15.965595007 CET157INData Raw: 20 20 3c 73 63 72 69 70 74 3e 4c 5f 4e 4f 5f 54 4f 55 43 48 20 3d 20 74 72 75 65 3b 3c 2f 73 63 72 69 70 74 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 0a 20 20 20 20 20 20 0a 20 20 20 20 20 20 76 61 72 20 6d 61 70 20 3d 20 4c 2e 6d 61 70 28 27 6d
                                                                                              Data Ascii: <script>L_NO_TOUCH = true;</script> <script> var map = L.map('map').setView([ 47.3682 , 8.5671 ], 15); L.tileLayer('https://{s}.tile.openstreetmap.org/{z}/{x}/{y}.png', { attribution: '&copy; <a href="https:/
                                                                                              Dec 9, 2022 10:57:15.965615988 CET158INData Raw: 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 27 73 63 72 69 70 74 27 29 5b 30 5d 3b 20 73 2e 70 61 72 65 6e 74 4e 6f 64 65 2e 69 6e 73 65 72 74 42 65 66 6f 72 65 28 67 61 2c 20 73 29 3b 0a 20 20 20 20 20 20 7d 29 28 29 3b 0a 20 20 20 20 3c 2f
                                                                                              Data Ascii: ementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); </script> </body></html>
                                                                                              Dec 9, 2022 10:57:15.965636015 CET158INData Raw: 0d 0a 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:10:57:07
                                                                                              Start date:09/12/2022
                                                                                              Path:C:\Users\user\Desktop\HHGHJJUILn.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Users\user\Desktop\HHGHJJUILn.exe
                                                                                              Imagebase:0x252bdc30000
                                                                                              File size:1631776 bytes
                                                                                              MD5 hash:103F2CA898F5C7285A3651F23D926218
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_DarkCloud, Description: Yara detected DarkCloud, Source: 00000000.00000002.251576631.00000252D012D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:low

                                                                                              Target ID:1
                                                                                              Start time:10:57:08
                                                                                              Start date:09/12/2022
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Imagebase:0x8c0000
                                                                                              File size:2688096 bytes
                                                                                              MD5 hash:B3A917344F5610BEEC562556F11300FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:2
                                                                                              Start time:10:57:08
                                                                                              Start date:09/12/2022
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Imagebase:0x8c0000
                                                                                              File size:2688096 bytes
                                                                                              MD5 hash:B3A917344F5610BEEC562556F11300FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:3
                                                                                              Start time:10:57:08
                                                                                              Start date:09/12/2022
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Imagebase:0x8c0000
                                                                                              File size:2688096 bytes
                                                                                              MD5 hash:B3A917344F5610BEEC562556F11300FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:4
                                                                                              Start time:10:57:09
                                                                                              Start date:09/12/2022
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                              Imagebase:0x8c0000
                                                                                              File size:2688096 bytes
                                                                                              MD5 hash:B3A917344F5610BEEC562556F11300FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:Visual Basic
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_DarkCloud, Description: Yara detected DarkCloud, Source: 00000004.00000000.246767038.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:13.8%
                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:20
                                                                                                Total number of Limit Nodes:1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 7ffdc87e0e1d-7ffdc87e0e25 1 7ffdc87e0e28-7ffdc87e0e3a 0->1 2 7ffdc87e0e27 0->2 3 7ffdc87e0e3c-7ffdc87e0e4c 1->3 4 7ffdc87e0e04-7ffdc87e0e1b 1->4 2->1 8 7ffdc87e0e96-7ffdc87e0ed7 call 7ffdc87e02c8 3->8 9 7ffdc87e0e4e-7ffdc87e0e89 3->9 16 7ffdc87e0ed9-7ffdc87e0edb 8->16 17 7ffdc87e0f58 8->17 11 7ffdc87e0e8b 9->11 12 7ffdc87e0e90-7ffdc87e0e93 9->12 11->12 12->8 18 7ffdc87e0f57 16->18 19 7ffdc87e0edd 16->19 20 7ffdc87e0f5d-7ffdc87e0f5e 17->20 18->17 21 7ffdc87e0f20-7ffdc87e0f23 19->21 22 7ffdc87e0edf-7ffdc87e0ee1 19->22 23 7ffdc87e0f63-7ffdc87e0f64 20->23 27 7ffdc87e0f26-7ffdc87e0f2f 21->27 22->20 24 7ffdc87e0ee3 22->24 31 7ffdc87e0f69-7ffdc87e0f70 23->31 24->27 28 7ffdc87e0ee5-7ffdc87e0ee7 24->28 29 7ffdc87e0f32-7ffdc87e0f4d 27->29 28->23 30 7ffdc87e0ee9-7ffdc87e0eed 28->30 29->18 30->31 35 7ffdc87e0eef 30->35 33 7ffdc87e0f75-7ffdc87e0f81 31->33 38 7ffdc87e0f89-7ffdc87e0fac 33->38 35->29 36 7ffdc87e0ef1-7ffdc87e0ef4 35->36 36->33 37 7ffdc87e0ef6-7ffdc87e0f08 36->37 37->38 42 7ffdc87e0f0a-7ffdc87e0f1d 37->42 40 7ffdc87e0ff9-7ffdc87e1061 call 7ffdc87e01f8 38->40 41 7ffdc87e0fae-7ffdc87e0ff3 call 7ffdc87e02c8 call 7ffdc87e0308 38->41 48 7ffdc87e10c3-7ffdc87e1133 call 7ffdc87e02d8 40->48 49 7ffdc87e1063-7ffdc87e1074 40->49 41->40 42->21 60 7ffdc87e113a-7ffdc87e116a 48->60 61 7ffdc87e1135 48->61 51 7ffdc87e1076 49->51 52 7ffdc87e1078-7ffdc87e107d 49->52 51->49 53 7ffdc87e1095-7ffdc87e1096 52->53 54 7ffdc87e107f-7ffdc87e108f 52->54 53->48 54->53 63 7ffdc87e120c-7ffdc87e1246 call 7ffdc87e0218 60->63 64 7ffdc87e1170-7ffdc87e1181 60->64 61->60 71 7ffdc87e128b-7ffdc87e129c 63->71 72 7ffdc87e1248-7ffdc87e1259 63->72 65 7ffdc87e1185-7ffdc87e11c0 call 7ffdc87e0208 64->65 66 7ffdc87e1183 64->66 73 7ffdc87e1205-7ffdc87e1207 65->73 74 7ffdc87e11c2-7ffdc87e11d3 65->74 66->64 75 7ffdc87e12a3-7ffdc87e1306 call 7ffdc87e0248 71->75 76 7ffdc87e129e 71->76 77 7ffdc87e125b 72->77 78 7ffdc87e125d-7ffdc87e125e 72->78 73->71 79 7ffdc87e11d5 74->79 80 7ffdc87e11d7-7ffdc87e11d8 74->80 83 7ffdc87e134b-7ffdc87e136a 75->83 84 7ffdc87e1308-7ffdc87e1319 75->84 76->75 77->72 78->71 79->74 80->73 85 7ffdc87e13fe-7ffdc87e148b call 7ffdc87e0278 83->85 86 7ffdc87e1370-7ffdc87e1381 83->86 87 7ffdc87e131b 84->87 88 7ffdc87e131d-7ffdc87e131e 84->88 101 7ffdc87e14a2-7ffdc87e14a4 85->101 102 7ffdc87e148d-7ffdc87e14a0 85->102 89 7ffdc87e1385-7ffdc87e13b8 call 7ffdc87e0268 86->89 90 7ffdc87e1383 86->90 87->84 88->83 95 7ffdc87e13ba-7ffdc87e13cb 89->95 96 7ffdc87e13fd 89->96 90->86 98 7ffdc87e13cd 95->98 99 7ffdc87e13cf-7ffdc87e13d0 95->99 96->85 98->95 99->96 103 7ffdc87e14aa-7ffdc87e14c0 101->103 102->103 104 7ffdc87e1518-7ffdc87e1532 103->104 105 7ffdc87e14c2-7ffdc87e14d3 103->105 108 7ffdc87e1577-7ffdc87e1598 call 7ffdc87e0258 104->108 109 7ffdc87e1534-7ffdc87e1545 104->109 106 7ffdc87e14d5 105->106 107 7ffdc87e14d7-7ffdc87e1517 call 7ffdc87e0278 105->107 106->105 107->104 114 7ffdc87e159d-7ffdc87e15c0 108->114 112 7ffdc87e1549-7ffdc87e154a 109->112 113 7ffdc87e1547 109->113 112->108 113->109 116 7ffdc87e1605-7ffdc87e164c 114->116 117 7ffdc87e15c2-7ffdc87e15d3 114->117 121 7ffdc87e185b-7ffdc87e187c 116->121 118 7ffdc87e15d5 117->118 119 7ffdc87e15d7-7ffdc87e15d8 117->119 118->117 119->116 122 7ffdc87e1882-7ffdc87e1893 121->122 123 7ffdc87e1651-7ffdc87e16d8 121->123 124 7ffdc87e1895 122->124 125 7ffdc87e1897-7ffdc87e1905 call 7ffdc87e0258 122->125 134 7ffdc87e16de-7ffdc87e16ef 123->134 135 7ffdc87e183d-7ffdc87e1855 123->135 124->122 132 7ffdc87e194a-7ffdc87e1981 125->132 133 7ffdc87e1907-7ffdc87e1918 125->133 142 7ffdc87e19a4-7ffdc87e19c0 132->142 143 7ffdc87e1983-7ffdc87e1994 132->143 136 7ffdc87e191a 133->136 137 7ffdc87e191c-7ffdc87e191d 133->137 138 7ffdc87e16f1 134->138 139 7ffdc87e16f3-7ffdc87e180c call 7ffdc87e02e8 call 7ffdc87e02f8 * 2 call 7ffdc87e0258 134->139 135->121 136->133 137->132 138->134 175 7ffdc87e183c 139->175 176 7ffdc87e180e-7ffdc87e180f 139->176 147 7ffdc87e19c7-7ffdc87e19f3 142->147 148 7ffdc87e19c2 142->148 145 7ffdc87e1996 143->145 146 7ffdc87e1998-7ffdc87e199e 143->146 145->143 146->142 152 7ffdc87e19f9-7ffdc87e1a0a 147->152 153 7ffdc87e1a95-7ffdc87e1acf call 7ffdc87e0238 147->153 148->147 154 7ffdc87e1a0c 152->154 155 7ffdc87e1a0e-7ffdc87e1a49 call 7ffdc87e0228 152->155 163 7ffdc87e1ad1-7ffdc87e1ae2 153->163 164 7ffdc87e1b14-7ffdc87e1b44 call 7ffdc87e0288 153->164 154->152 167 7ffdc87e1a4b-7ffdc87e1a5c 155->167 168 7ffdc87e1a8e-7ffdc87e1a90 155->168 165 7ffdc87e1ae6-7ffdc87e1ae7 163->165 166 7ffdc87e1ae4 163->166 177 7ffdc87e1b89-7ffdc87e1ba7 164->177 178 7ffdc87e1b46-7ffdc87e1b57 164->178 165->164 166->163 171 7ffdc87e1a5e 167->171 172 7ffdc87e1a60-7ffdc87e1a61 167->172 168->164 171->167 172->168 175->135 176->175 179 7ffdc87e1b59 178->179 180 7ffdc87e1b5b-7ffdc87e1b5c 178->180 179->178 180->177
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: @
                                                                                                • API String ID: 0-2766056989
                                                                                                • Opcode ID: 8310d220638fb7cbace2e2e843a92ff0d97c003ee1a0f81de7263575e10f48cb
                                                                                                • Instruction ID: 52a720e4341ae6fe26cd16185bc7e604bfc939322b45b1abcf3d98b0ad2fe39b
                                                                                                • Opcode Fuzzy Hash: 8310d220638fb7cbace2e2e843a92ff0d97c003ee1a0f81de7263575e10f48cb
                                                                                                • Instruction Fuzzy Hash: 4372E570E486298FEBA8DF15C895BE9B7B1FF54305F0041EAD00DA2291DB785AC4CF94
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 183 7ffdc87e38ad-7ffdc87e38b9 184 7ffdc87e38bb-7ffdc87e38c3 183->184 185 7ffdc87e38c4-7ffdc87e3971 183->185 184->185 188 7ffdc87e3999-7ffdc87e3a32 WriteProcessMemory 185->188 189 7ffdc87e3973-7ffdc87e3996 185->189 190 7ffdc87e3a3a-7ffdc87e3a96 188->190 191 7ffdc87e3a34 188->191 189->188 191->190
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 41e057c1ad1c7cbc9c9c74ffc153cd1f9039a9b11ad0dc8520e9626998969c85
                                                                                                • Instruction ID: 6abe769b0594baae918036203ab74cfc646a1c55921eb9dfa7c3a1245ad6b405
                                                                                                • Opcode Fuzzy Hash: 41e057c1ad1c7cbc9c9c74ffc153cd1f9039a9b11ad0dc8520e9626998969c85
                                                                                                • Instruction Fuzzy Hash: 69612370908A5D8FDB98DF98C894BE9BBF1FB69310F1041AED04DE3291DB74A985CB44
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 193 7ffdc87e3555-7ffdc87e3561 194 7ffdc87e356c-7ffdc87e357a 193->194 195 7ffdc87e3563-7ffdc87e356b 193->195 196 7ffdc87e357c-7ffdc87e36ad ReadProcessMemory 194->196 197 7ffdc87e3544-7ffdc87e3551 194->197 195->194 200 7ffdc87e36b5-7ffdc87e370b 196->200 201 7ffdc87e36af 196->201 201->200
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessRead
                                                                                                • String ID:
                                                                                                • API String ID: 1726664587-0
                                                                                                • Opcode ID: 5afc2cc7bba8b846213af7a4d246e0fc73bdc997e1879f673d7f0e4c7d7a3652
                                                                                                • Instruction ID: 89af872b292396c6665c16792d0a83ed09ec64a9a860a2ff10c75113a196cd60
                                                                                                • Opcode Fuzzy Hash: 5afc2cc7bba8b846213af7a4d246e0fc73bdc997e1879f673d7f0e4c7d7a3652
                                                                                                • Instruction Fuzzy Hash: F4514670908A4C8FDB98DF58D895BE9BBF0FB6A310F1041AED04DE3252DA30A985CF44
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 203 7ffdc87e30bd-7ffdc87e31ca CreateProcessW 207 7ffdc87e31cc 203->207 208 7ffdc87e31d2-7ffdc87e32c0 call 7ffdc87e32c1 203->208 207->208
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 9ac3daada06f348724dd3baf45f6d18f58743126089d6923e3c8b7c0a0d91d57
                                                                                                • Instruction ID: 7ebc5fa160b19cc89ba56fe0791380079ce6e179bbb035a7991685ec4b8a7e40
                                                                                                • Opcode Fuzzy Hash: 9ac3daada06f348724dd3baf45f6d18f58743126089d6923e3c8b7c0a0d91d57
                                                                                                • Instruction Fuzzy Hash: 5651D530D08A1D8FDBA4EF18C894BE9B7B1EB69311F0041AAD44DE3691DF35AA81CF40
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 220 7ffdc87e370d-7ffdc87e3719 221 7ffdc87e371b-7ffdc87e3723 220->221 222 7ffdc87e3724-7ffdc87e3857 VirtualAllocEx 220->222 221->222 225 7ffdc87e3859 222->225 226 7ffdc87e385f-7ffdc87e38ab 222->226 225->226
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 2c23856fee153d18113efbb267fc5fe46b7aba532b47edd699d8e361fcdd6fac
                                                                                                • Instruction ID: cea5a5d0be9383dd3888c1ad90179fe76daced49a7da28454ccf8cab7ddaeabf
                                                                                                • Opcode Fuzzy Hash: 2c23856fee153d18113efbb267fc5fe46b7aba532b47edd699d8e361fcdd6fac
                                                                                                • Instruction Fuzzy Hash: EC513530908A4D8FDF98DF58C894BE9BBB1FB6A314F1051AED44DE7291DA30A884CF44
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 228 7ffdc87e33d5-7ffdc87e3474 231 7ffdc87e3496-7ffdc87e34ff Wow64SetThreadContext 228->231 232 7ffdc87e3476-7ffdc87e3493 228->232 233 7ffdc87e3507-7ffdc87e3551 231->233 234 7ffdc87e3501 231->234 232->231 234->233
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: ca8673a6e2b3009c18c89c4c629c5c37b40f5696d2a6fdf97a0fb1e3d558282c
                                                                                                • Instruction ID: dc2f274bfbe5fcf4b74416a2172ab49ca3f2ae015964e93f58c4fab396482a35
                                                                                                • Opcode Fuzzy Hash: ca8673a6e2b3009c18c89c4c629c5c37b40f5696d2a6fdf97a0fb1e3d558282c
                                                                                                • Instruction Fuzzy Hash: 85510770D08A0D8FDB94DF99C885BE9BBF1FBA9311F10826AD008D7255DB749885CF80
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 236 7ffdc87e3a99-7ffdc87e3aa5 237 7ffdc87e3aa7-7ffdc87e3aaf 236->237 238 7ffdc87e3ab0-7ffdc87e3b7a ResumeThread 236->238 237->238 241 7ffdc87e3b7c 238->241 242 7ffdc87e3b82-7ffdc87e3bc0 238->242 241->242
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.252626009.00007FFDC87E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffdc87e0000_HHGHJJUILn.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: 21f7030873bbec75f2dcc221c5e68069316b884fd48b4253d3c1592e2d0513b3
                                                                                                • Instruction ID: 5eb86811c5b0b435b2e23c439670c1aab90788921139541f3caf4de35440af31
                                                                                                • Opcode Fuzzy Hash: 21f7030873bbec75f2dcc221c5e68069316b884fd48b4253d3c1592e2d0513b3
                                                                                                • Instruction Fuzzy Hash: C9413B30D0874C8FDB59DFA8D894BADBBB0EF5A310F1441AED049E7292DA74A885CF51
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%