Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Stub.exe

Overview

General Information

Sample Name:Stub.exe
Analysis ID:778238
MD5:da5c4dbbc80ca5da70237ef8bc281476
SHA1:c6689884e4bf3360fceacbdaff09d211cef3a49d
SHA256:4981bda443713f5cecb9df4d163cd62f1bd038cb897895bb2f81015796676371
Tags:AsyncRATexe
Infos:

Detection

AsyncRAT
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Yara detected AsyncRAT
Snort IDS alert for network traffic
Yara detected Generic Downloader
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Creates a window with clipboard capturing capabilities
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • Stub.exe (PID: 5484 cmdline: C:\Users\user\Desktop\Stub.exe MD5: DA5C4DBBC80CA5DA70237EF8BC281476)
  • cleanup
{"Server": "egrh.linkpc.net", "Port": "5505", "Version": "| Edit 3LOSH RAT", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "true"}
SourceRuleDescriptionAuthorStrings
Stub.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Stub.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Stub.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xd0e6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      Stub.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xd054:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xec38:$a2: Stub.exe
      • 0xecc8:$a2: Stub.exe
      • 0x940c:$a3: get_ActivatePong
      • 0xd26c:$a4: vmware
      • 0xd0e4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0xa49d:$a6: get_SslClient
      SourceRuleDescriptionAuthorStrings
      dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x3ea:$x1: AsyncRAT
      • 0x428:$x1: AsyncRAT
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xa7bb:$x1: AsyncRAT
      • 0xa7f9:$x1: AsyncRAT
      00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x5a7:$x1: AsyncRAT
      • 0x5e5:$x1: AsyncRAT
      00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x5a7:$x1: AsyncRAT
      • 0x5e5:$x1: AsyncRAT
      00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xcee6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        0.0.Stub.exe.50000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.Stub.exe.50000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.0.Stub.exe.50000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xd0e6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            0.0.Stub.exe.50000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xd054:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xec38:$a2: Stub.exe
            • 0xecc8:$a2: Stub.exe
            • 0x940c:$a3: get_ActivatePong
            • 0xd26c:$a4: vmware
            • 0xd0e4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0xa49d:$a6: get_SslClient
            No Sigma rule has matched
            Timestamp:142.202.240.108192.168.2.35505496892030673 01/05/23-09:16:11.192042
            SID:2030673
            Source Port:5505
            Destination Port:49689
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:142.202.240.108192.168.2.35505496892035595 01/05/23-09:16:11.192042
            SID:2035595
            Source Port:5505
            Destination Port:49689
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Stub.exeAvira: detected
            Source: Stub.exeJoe Sandbox ML: detected
            Source: 0.0.Stub.exe.50000.0.unpackAvira: Label: TR/Dropper.Gen
            Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "egrh.linkpc.net", "Port": "5505", "Version": "| Edit 3LOSH RAT", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "true"}
            Source: Stub.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Stub.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2035595 ET TROJAN Generic AsyncRAT Style SSL Cert 142.202.240.108:5505 -> 192.168.2.3:49689
            Source: TrafficSnort IDS: 2030673 ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server) 142.202.240.108:5505 -> 192.168.2.3:49689
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Malware configuration extractorURLs: egrh.linkpc.net
            Source: global trafficTCP traffic: 192.168.2.3:49689 -> 142.202.240.108:5505
            Source: Stub.exe, 00000000.00000002.510490105.00000000049AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: Stub.exe, 00000000.00000003.256955733.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
            Source: Stub.exe, 00000000.00000003.256955733.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, Stub.exe, 00000000.00000003.257540314.00000000006A9000.00000004.00000020.00020000.00000000.sdmp, Stub.exe, 00000000.00000003.257743735.00000000006A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/G
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: Stub.exe, 00000000.00000003.257368805.00000000049B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab33
            Source: Stub.exe, 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: unknownDNS traffic detected: queries for: egrh.linkpc.net

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Stub.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            System Summary

            barindex
            Source: Stub.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Stub.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000003.384798750.000000000061D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000003.432092160.0000000000631000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Stub.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Stub.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Stub.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000003.384798750.000000000061D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000003.432092160.0000000000631000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Stub.exe, 00000000.00000002.510626345.0000000004BE9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Stub.exe
            Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_0098C51C0_2_0098C51C
            Source: Stub.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Stub.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Stub.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Stub.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Stub.exe, eGlSQbxmQMrQhm/plUQqHPHKqQ.csBase64 encoded string: 'laukwBCTjYRoqHFCmAt9kjzyfCkFf18LOnFD55PbbIYaigees0liP+EQECnHEGgsV/dSMIxuUxZJha8SsnKbpA==', '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', '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
            Source: 0.0.Stub.exe.50000.0.unpack, eGlSQbxmQMrQhm/plUQqHPHKqQ.csBase64 encoded string: 'laukwBCTjYRoqHFCmAt9kjzyfCkFf18LOnFD55PbbIYaigees0liP+EQECnHEGgsV/dSMIxuUxZJha8SsnKbpA==', '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', 'p42Rw9P9+Tk8A5wcgXvTTvLmyAaoAN9cwYuyTeF3HPgl7vCxVjSJKXIt63zXfXhl9JssOJPQy7miVY7V8uOipM80rTbK5ilj4ixSc875RPH+pXyFp+PLCVVzyt0KQAxPOJTbgDYH+4HpWxN/LlnO6daLV8zcQWBNSmBUJzri9rY4xgIh37Ovi2W1j3WSfmj0QZ3sfsG9lZqjUWY2OHMPGV8PEObiX5eQINLpeFAcPUoSdWQQnUfc/V8zZAba9kJ6pWAuVIuwqkFxIlUE4YaLkAi62vkR954q93jp23xodqQbGhmkQo1CisP7Q6Q+nvSBa9sAMMS2PgATRuVu8os/LsvyILDqUXTUoY/aUwY4Od8CxATfVKc2D68e8vDJ7psRM6f9ldEOuCHMo+SJfm2fsRlGr0bISfCWLsxGRR1cXiNhxQHOAJBFYmd7Ul/kI2KHFODPNtMZT6M9kYXrn3OvW9zweDuQvzbG5R0QnuRhDvJoMGm5sm6Tqhh7g1x1Imf2lMgHV6ILOTijaQA8gDtuQFrytccaw9U66lNAyWf3TDC
            Source: C:\Users\user\Desktop\Stub.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
            Source: classification engineClassification label: mal92.troj.evad.winEXE@1/2@1/1
            Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Stub.exe, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: Stub.exe, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.Stub.exe.50000.0.unpack, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.Stub.exe.50000.0.unpack, fPDRbydmMY/ZawhPWlnTeTuyN.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: Stub.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Stub.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Stub.exe, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: fbPMNBgcthZje System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: Stub.exe, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: QCOFEyuSJQQB System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: Stub.exe, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: CeqMJMrYMRORV System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.Stub.exe.50000.0.unpack, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: fbPMNBgcthZje System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.Stub.exe.50000.0.unpack, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: QCOFEyuSJQQB System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.Stub.exe.50000.0.unpack, ZpwfMOVejXXJG/lzYzeBBbDjkdfho.cs.Net Code: CeqMJMrYMRORV System.Reflection.Assembly System.AppDomain::Load(System.Byte[])

            Boot Survival

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Stub.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: Stub.exeBinary or memory string: SBIEDLL.DLLM\B(BC1|[13])[A-ZA-HJ-NP-Z0-9]{26,45}\B
            Source: C:\Users\user\Desktop\Stub.exeWindow / User API: threadDelayed 9730Jump to behavior
            Source: C:\Users\user\Desktop\Stub.exe TID: 5740Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Stub.exe TID: 6036Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Stub.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Stub.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: Stub.exeBinary or memory string: vmware
            Source: Stub.exe, 00000000.00000002.511377724.0000000005DD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWM
            Source: Stub.exe, 00000000.00000002.511377724.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.510401327.000000000497F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Stub.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeMemory allocated: page read and write | page guardJump to behavior
            Source: Stub.exe, 00000000.00000002.508379142.000000000257D000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.508407256.0000000002588000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000002.508461952.00000000025AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Users\user\Desktop\Stub.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: Stub.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.Stub.exe.50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Stub.exe PID: 5484, type: MEMORYSTR
            Source: Stub.exe, 00000000.00000002.510401327.000000000497F000.00000004.00000800.00020000.00000000.sdmp, Stub.exe, 00000000.00000003.259928413.0000000005EC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\Stub.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            1
            Process Injection
            1
            Disable or Modify Tools
            OS Credential Dumping1
            Query Registry
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts1
            Scheduled Task/Job
            Boot or Logon Initialization Scripts1
            Scheduled Task/Job
            21
            Virtualization/Sandbox Evasion
            LSASS Memory121
            Security Software Discovery
            Remote Desktop Protocol1
            Clipboard Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Process Injection
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Obfuscated Files or Information
            NTDS21
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureScheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
            Software Packing
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
            Remote System Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Stub.exe100%AviraTR/Dropper.Gen
            Stub.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            0.0.Stub.exe.50000.0.unpack100%AviraTR/Dropper.GenDownload File
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            egrh.linkpc.net
            142.202.240.108
            truefalse
              high
              windowsupdatebg.s.llnwi.net
              41.63.96.128
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                egrh.linkpc.netfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameStub.exe, 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    142.202.240.108
                    egrh.linkpc.netReserved
                    143151GSERVERSUSfalse
                    Joe Sandbox Version:36.0.0 Rainbow Opal
                    Analysis ID:778238
                    Start date and time:2023-01-05 09:15:14 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 4m 55s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:Stub.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal92.troj.evad.winEXE@1/2@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 18
                    • Number of non-executed functions: 1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 8.238.88.254, 8.238.85.126, 8.253.207.121, 8.248.113.254, 8.238.85.254, 209.197.3.8, 93.184.221.240
                    • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: Stub.exe
                    TimeTypeDescription
                    09:16:12API Interceptor2x Sleep call for process: Stub.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    142.202.240.108333.png.ps1Get hashmaliciousBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      egrh.linkpc.net333.png.ps1Get hashmaliciousBrowse
                      • 142.202.240.108
                      windowsupdatebg.s.llnwi.netfile.exeGet hashmaliciousBrowse
                      • 95.140.236.128
                      B498478906628FECB57CCD1D01AC7F85D21E6335B63B8.exeGet hashmaliciousBrowse
                      • 95.140.236.128
                      file.exeGet hashmaliciousBrowse
                      • 95.140.236.0
                      file.exeGet hashmaliciousBrowse
                      • 41.63.96.0
                      file.exeGet hashmaliciousBrowse
                      • 41.63.96.0
                      file.exeGet hashmaliciousBrowse
                      • 178.79.242.0
                      file.exeGet hashmaliciousBrowse
                      • 95.140.236.0
                      file.exeGet hashmaliciousBrowse
                      • 95.140.236.128
                      file.exeGet hashmaliciousBrowse
                      • 41.63.96.0
                      rtf.exeGet hashmaliciousBrowse
                      • 178.79.242.0
                      file.exeGet hashmaliciousBrowse
                      • 178.79.242.0
                      #U5b89#U8d5b#U4e50#U7c73#U5854#U5c14#U89c4#U8303#U6307#U5357 .exeGet hashmaliciousBrowse
                      • 41.63.96.0
                      dkzchHHFnI.exeGet hashmaliciousBrowse
                      • 95.140.236.0
                      file.exeGet hashmaliciousBrowse
                      • 41.63.96.128
                      file.exeGet hashmaliciousBrowse
                      • 41.63.96.128
                      file.exeGet hashmaliciousBrowse
                      • 41.63.96.128
                      payload.dll.exeGet hashmaliciousBrowse
                      • 95.140.236.128
                      file.exeGet hashmaliciousBrowse
                      • 95.140.236.128
                      hrc7tywY1s.exeGet hashmaliciousBrowse
                      • 95.140.236.128
                      3B15486651F5E552FE3A354485AA2751DD730B8C3DD4E.dllGet hashmaliciousBrowse
                      • 178.79.242.128
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      1GSERVERSUS333.png.ps1Get hashmaliciousBrowse
                      • 142.202.240.108
                      333.png.ps1Get hashmaliciousBrowse
                      • 142.202.240.116
                      jj -Backup.png.ps1Get hashmaliciousBrowse
                      • 207.32.217.247
                      ig.png.ps1Get hashmaliciousBrowse
                      • 207.32.216.212
                      file.exeGet hashmaliciousBrowse
                      • 207.32.216.118
                      file.exeGet hashmaliciousBrowse
                      • 207.32.216.104
                      file.exeGet hashmaliciousBrowse
                      • 207.32.216.118
                      BILL.batGet hashmaliciousBrowse
                      • 207.32.218.123
                      sEpt5mKGOJGet hashmaliciousBrowse
                      • 207.32.216.16
                      SBjFykC8IW.exeGet hashmaliciousBrowse
                      • 207.32.218.12
                      order-82148214124.VBSGet hashmaliciousBrowse
                      • 142.202.242.210
                      dhl.exeGet hashmaliciousBrowse
                      • 207.32.218.137
                      parcel.exeGet hashmaliciousBrowse
                      • 207.32.217.125
                      XybgXm6MPUGet hashmaliciousBrowse
                      • 207.32.216.48
                      UzMsCecbFGGet hashmaliciousBrowse
                      • 207.32.216.19
                      SBNGwWC7WbGet hashmaliciousBrowse
                      • 207.32.216.34
                      KTjctZTmDQ.VBSGet hashmaliciousBrowse
                      • 207.32.218.67
                      arm7Get hashmaliciousBrowse
                      • 207.32.216.22
                      ASyncRATpayload2.exeGet hashmaliciousBrowse
                      • 207.32.218.11
                      Bill-05102020-9S4N7A8B7X3L0A2H4J9D3T6C5M8B2.v.vbsGet hashmaliciousBrowse
                      • 207.32.217.81
                      No context
                      No context
                      Process:C:\Users\user\Desktop\Stub.exe
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62932 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                      Category:dropped
                      Size (bytes):62932
                      Entropy (8bit):7.9958071285043335
                      Encrypted:true
                      SSDEEP:1536:pvl2gmukMiArbge/oKIxf+Q9yNJLaRCfIElhUuDz:pvl2gmZhpehIxfJsJLawfIElhUu3
                      MD5:FC4666CBCA561E864E7FDF883A9E6661
                      SHA1:2F8D6094C7A34BF12EA0BBF0D51EE9C5BB7939A5
                      SHA-256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B
                      SHA-512:C71F54B571E01F247F072BE4BBEBDF5D8410B67EB79A61E7E0D9853FE857AB9BD12F53E6AF3394B935560178107291FC4BE351B27DEB388EBA90BA949633D57D
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:MSCF............,...................I.................oU.s .authroot.stl......5..CK..8U[...q.yL;sf!d.D..."2."C...2....RRRHnT...\...!2.)QQ*2..nN.\7.....lgYk;.^.....}..h4.....Kc.cG.q.tY..Drg<..G.D....c.qnx..G.......r.8.....w...;.Q6..o.xf:f..:NL[.`..]I.@ ,W..J..Qf.z9.<.../.D.p:0R...#..I,.%.+."...B.n)...[Y=.,0...R.#..G5..2..]........$p..3.M.O...._L.......g.....?=.J..!...G~.#.J:.Wj.........9(:..g.8,.o.b...3..C..t.7L=..+~%pc...%..b(.q.......F.'...@~P .6CA.(d.Z~..6....=.).9......A........p...Gy....7U.L....S...^.R.T.p...R..:.hr./..8...a&p.l(....g.3a)...[.M..v.......g,.U..l.F..._kJv.4.rG.{.K.6.X.rz.8.r..&..G.j..p".z...L...EUX.......;...Y.................j}..FrT.,J3.d?T.T}Q..hn.?.4F...~K...........'...c...X,.v..yk..0._.j|.(.q4k1....^b..6...z..\9'}.%.*...S.[..D.k....J.../D$.#..O.o~%S.9u....|61.........~....Q+.w.e....7}..:.....^.p.mKm._9v......'.3T..bY3..9a..p.'1..Lx.O.g..J5w+.r..K.R.P.....E0bf*r...c..;...`.j...i.;y.C..#|L.e.(.....w.X'...z../.-...c.......
                      Process:C:\Users\user\Desktop\Stub.exe
                      File Type:data
                      Category:modified
                      Size (bytes):328
                      Entropy (8bit):3.1786749463541457
                      Encrypted:false
                      SSDEEP:6:kK3dh+qz7ksN+SkQlPlEGYRMY9z+4KlDA3RUe+OGNglcy:fTUkPlE99SNxAhUefblcy
                      MD5:2E0F10B259BAF2EE99431DF49C886A0B
                      SHA1:0708B9E03DE5A9A7637F4461D840EDC9E4414A6A
                      SHA-256:1333401AA1A0F6D497C63B5B1D1E01F2595FD0380CB2A984102A65E6B26B6023
                      SHA-512:76C6D7BDF682AEAB9104A81F0BE7E92EA452A68F4AC13741380DF10BCF878DC35895E16FAADD62C7437B41647A457E7E56C4FBDBF0E3EA6F1505D11BAAE0CD59
                      Malicious:false
                      Reputation:low
                      Preview:p...... ...........i)!..(....................................................... .........g.%.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.a.1.6.7.1.3.2.5.4.d.9.1.:.0."...
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):5.627060592579058
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:Stub.exe
                      File size:62464
                      MD5:da5c4dbbc80ca5da70237ef8bc281476
                      SHA1:c6689884e4bf3360fceacbdaff09d211cef3a49d
                      SHA256:4981bda443713f5cecb9df4d163cd62f1bd038cb897895bb2f81015796676371
                      SHA512:40210ddddaae84fa45d758831491cc3b609c3194862f8fad8938e713fa5033eaf473c44bb0bc345ea46fc302264f5628b6793339bf0cb5f2aea2c316a0c115f4
                      SSDEEP:1536:+/KCnABwEttYQuT68QKzWbVSDRDZLbxx:+/KrBwEttYm8BabVSjLVx
                      TLSH:EE532B043BE9C129F1BE8F709DF376444AB9F1677906DA0E1CD451DA0622BC68A427EF
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c............................^.... ... ....@.. .......................`............@................................
                      Icon Hash:00828e8e8686b000
                      Entrypoint:0x41075e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x633700E3 [Fri Sep 30 14:44:51 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1070c0x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x7ff.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xe7640xe800False0.5357623922413793data5.673338999412451IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x120000x7ff0x800False0.41650390625data4.884866150337139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x140000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0x120a00x2ccdata
                      RT_MANIFEST0x1236c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      142.202.240.108192.168.2.35505496892030673 01/05/23-09:16:11.192042TCP2030673ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)550549689142.202.240.108192.168.2.3
                      142.202.240.108192.168.2.35505496892035595 01/05/23-09:16:11.192042TCP2035595ET TROJAN Generic AsyncRAT Style SSL Cert550549689142.202.240.108192.168.2.3
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 5, 2023 09:16:10.446110964 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:10.608800888 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:10.609150887 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:11.019267082 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:11.192042112 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:11.192109108 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:11.192358017 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:11.211710930 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:11.376323938 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:11.420284033 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:14.210656881 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:14.413397074 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:14.413630962 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:14.616478920 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:24.083786011 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:24.287956953 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:24.288218021 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:24.450222969 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:24.499444008 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:24.660866022 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:24.702743053 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:25.105531931 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:25.319370985 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:25.319547892 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:25.522351980 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:33.945424080 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:34.147113085 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:34.147206068 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:34.309361935 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:34.359613895 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:34.520828962 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:34.556056976 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:34.771938086 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:34.774681091 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:34.990674973 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:37.736253977 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:37.781907082 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:37.943053961 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:37.985011101 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:43.769193888 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:43.974895954 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:43.975084066 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:44.137037039 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:44.188657999 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:44.349960089 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:44.367060900 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:44.568764925 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:44.568924904 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:44.771676064 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:53.594084978 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:53.802622080 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:53.802706003 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:53.964433908 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:54.017430067 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:54.178270102 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:54.220592976 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:54.596527100 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:54.802869081 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:16:54.803147078 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:16:55.005819082 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:03.475423098 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:03.677582026 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:03.677704096 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:03.840008974 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:03.893325090 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:04.054852962 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:04.086241007 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:04.302668095 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:04.305140018 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:04.521357059 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:07.741579056 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:07.784228086 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:07.945435047 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:08.003063917 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:13.312128067 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:13.521106005 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:13.521403074 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:13.684165955 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:13.737871885 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:13.899128914 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:13.941026926 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:14.171483040 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:14.380517960 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:14.382247925 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:14.599172115 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:23.155992031 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:23.380219936 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:23.380513906 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:23.543056965 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:23.598146915 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:23.759288073 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:23.776537895 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:23.989550114 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:23.989643097 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:24.192562103 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:33.781151056 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:33.989244938 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:33.989427090 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:34.164716005 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:34.208254099 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:34.369518042 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:34.418164015 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:34.524050951 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:34.739309072 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:34.739726067 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:34.942406893 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:37.756108046 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:37.802325964 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:37.963964939 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:38.021111012 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:43.572293043 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:43.785675049 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:43.788532019 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:43.950648069 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:44.006088018 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:44.167718887 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:44.190207005 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:44.394984007 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:44.395049095 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:44.598850012 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:53.401660919 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:53.613775015 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:53.617584944 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:53.780563116 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:53.834898949 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:53.996267080 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:54.036730051 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:54.254332066 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:17:54.254760027 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:17:54.460171938 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:03.267129898 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:03.472671986 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:03.472870111 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:03.634902954 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:03.679408073 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:03.840549946 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:03.865824938 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:04.082201958 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:04.086323977 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:04.300879002 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:07.764161110 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:07.804701090 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:07.966073990 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:08.008096933 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:13.055610895 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:13.269534111 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:13.269623041 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:13.431951046 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:13.477091074 CET496895505192.168.2.3142.202.240.108
                      Jan 5, 2023 09:18:13.638489008 CET550549689142.202.240.108192.168.2.3
                      Jan 5, 2023 09:18:13.680341959 CET496895505192.168.2.3142.202.240.108
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 5, 2023 09:16:10.250736952 CET5986953192.168.2.38.8.8.8
                      Jan 5, 2023 09:16:10.373781919 CET53598698.8.8.8192.168.2.3
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jan 5, 2023 09:16:10.250736952 CET192.168.2.38.8.8.80xd24cStandard query (0)egrh.linkpc.netA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jan 5, 2023 09:16:10.373781919 CET8.8.8.8192.168.2.30xd24cNo error (0)egrh.linkpc.net142.202.240.108A (IP address)IN (0x0001)false
                      Jan 5, 2023 09:16:23.498951912 CET8.8.8.8192.168.2.30x2082No error (0)windowsupdatebg.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)false
                      Jan 5, 2023 09:16:23.973170042 CET8.8.8.8192.168.2.30x96f9No error (0)windowsupdatebg.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:09:16:03
                      Start date:05/01/2023
                      Path:C:\Users\user\Desktop\Stub.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\Stub.exe
                      Imagebase:0x50000
                      File size:62464 bytes
                      MD5 hash:DA5C4DBBC80CA5DA70237EF8BC281476
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.510364745.0000000004966000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.474031615.0000000000633000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.505594690.0000000000633000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.237566508.0000000000052000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.384798750.000000000061D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.432092160.0000000000631000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.508243418.0000000002511000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low

                      Reset < >

                        Execution Graph

                        Execution Coverage:15.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:116
                        Total number of Limit Nodes:5
                        execution_graph 14307 98f508 14308 98f54a 14307->14308 14309 98f550 GetModuleHandleW 14307->14309 14308->14309 14310 98f57d 14309->14310 14311 989448 14312 989476 14311->14312 14315 989034 14312->14315 14314 989496 14314->14314 14316 98903f 14315->14316 14317 989e74 14316->14317 14318 989fa6 14316->14318 14322 98a4c2 14316->14322 14317->14318 14327 98b5e0 14317->14327 14332 98b5d1 14317->14332 14318->14314 14323 98a454 14322->14323 14324 98a4b4 14323->14324 14325 98b5e0 5 API calls 14323->14325 14326 98b5d1 5 API calls 14323->14326 14324->14317 14325->14324 14326->14324 14328 98b601 14327->14328 14329 98b625 14328->14329 14337 98b790 14328->14337 14341 98b780 14328->14341 14329->14318 14333 98b5e0 14332->14333 14334 98b625 14333->14334 14335 98b790 5 API calls 14333->14335 14336 98b780 5 API calls 14333->14336 14334->14318 14335->14334 14336->14334 14338 98b79d 14337->14338 14339 98b7d6 14338->14339 14345 989b4c 14338->14345 14339->14329 14342 98b790 14341->14342 14343 98b7d6 14342->14343 14344 989b4c 5 API calls 14342->14344 14343->14329 14344->14343 14346 989b57 14345->14346 14347 98b848 14346->14347 14349 989b80 14346->14349 14350 989b8b 14349->14350 14351 98b8b7 14350->14351 14359 9873bc 14350->14359 14353 98b8c5 14351->14353 14366 98cd79 14351->14366 14370 98cd88 14351->14370 14374 98f250 14353->14374 14380 98f238 14353->14380 14354 98b8f0 14354->14347 14360 9873c7 14359->14360 14385 989a84 14360->14385 14362 98a4b4 14362->14351 14363 98a28b 14363->14362 14364 98b5e0 5 API calls 14363->14364 14365 98b5d1 5 API calls 14363->14365 14364->14362 14365->14362 14367 98cdb6 14366->14367 14368 98ce82 KiUserCallbackDispatcher 14367->14368 14369 98ce87 14367->14369 14368->14369 14371 98cdb6 14370->14371 14372 98ce82 KiUserCallbackDispatcher 14371->14372 14373 98ce87 14371->14373 14372->14373 14376 98f281 14374->14376 14377 98f2cd 14374->14377 14375 98f28d 14375->14354 14376->14375 14398 98f4b8 14376->14398 14401 98f4a8 14376->14401 14377->14354 14382 98f250 14380->14382 14381 98f28d 14381->14354 14382->14381 14383 98f4b8 LoadLibraryExW 14382->14383 14384 98f4a8 LoadLibraryExW 14382->14384 14383->14381 14384->14381 14386 989a8f 14385->14386 14387 98bc0a 14386->14387 14390 98bc58 14386->14390 14394 98bc68 14386->14394 14387->14363 14391 98bcab 14390->14391 14392 98bcb6 KiUserCallbackDispatcher 14391->14392 14393 98bce0 14391->14393 14392->14393 14393->14387 14395 98bcab 14394->14395 14396 98bcb6 KiUserCallbackDispatcher 14395->14396 14397 98bce0 14395->14397 14396->14397 14397->14387 14405 98eee8 14398->14405 14399 98f4c2 14399->14377 14402 98f4b8 14401->14402 14404 98eee8 LoadLibraryExW 14402->14404 14403 98f4c2 14403->14377 14404->14403 14406 98ef0b 14405->14406 14407 98ef1b 14406->14407 14410 98f5b0 14406->14410 14414 98f5a1 14406->14414 14407->14399 14411 98f5c4 14410->14411 14413 98f5e9 14411->14413 14418 98e6f0 14411->14418 14413->14407 14415 98f5c4 14414->14415 14416 98f5e9 14415->14416 14417 98e6f0 LoadLibraryExW 14415->14417 14416->14407 14417->14416 14419 98f790 LoadLibraryExW 14418->14419 14421 98f809 14419->14421 14421->14413 14425 986de8 14426 986df6 14425->14426 14429 986c64 14426->14429 14428 986dff 14430 986c6f 14429->14430 14433 987328 14430->14433 14432 987895 14432->14428 14434 987333 14433->14434 14437 98735c 14434->14437 14436 987b55 14436->14432 14438 987367 14437->14438 14441 98738c 14438->14441 14440 987d72 14440->14436 14442 987397 14441->14442 14443 9873bc 5 API calls 14442->14443 14444 987e79 14443->14444 14444->14440 14445 983c68 14447 983cac SetWindowsHookExW 14445->14447 14448 983cf2 14447->14448 14305 9878d0 DuplicateHandle 14306 987966 14305->14306 14422 98ed80 14424 98eee8 LoadLibraryExW 14422->14424 14423 98ed8f 14424->14423

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 395 9878c9-9878cd 396 9878d3-987964 DuplicateHandle 395->396 397 98796d-98798a 396->397 398 987966-98796c 396->398 398->397
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00987957
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: ab5dd0ace08b4ed227a0f00fcc9115a2d3a9d1fc4aed4a51004e3a18b793d9bb
                        • Instruction ID: 0967679c4bdc1d67f686d81bee13718cb879512f4162653899cea5f5c9cceac9
                        • Opcode Fuzzy Hash: ab5dd0ace08b4ed227a0f00fcc9115a2d3a9d1fc4aed4a51004e3a18b793d9bb
                        • Instruction Fuzzy Hash: ED2105B5900209DFDB10CF99D884AEEBBF4EF48320F14851AE924B3350D378A944CF61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 401 9878d0-987964 DuplicateHandle 402 98796d-98798a 401->402 403 987966-98796c 401->403 403->402
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00987957
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 35adf8abf3e999686971b943b9bf30f489967e1d4ff17efa909e3b790a77efe9
                        • Instruction ID: b73b577f189ee4ce5c31ba0f8fcf0c061e0f6abc82123edac3ac7f7030fd5d2a
                        • Opcode Fuzzy Hash: 35adf8abf3e999686971b943b9bf30f489967e1d4ff17efa909e3b790a77efe9
                        • Instruction Fuzzy Hash: 7521C4B5905259AFDB10CF9AD984ADEFBF8EB48324F14841AE914A7310D374A944CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 406 983c60-983cb2 408 983cbe-983cf0 SetWindowsHookExW 406->408 409 983cb4 406->409 410 983cf9-983d1e 408->410 411 983cf2-983cf8 408->411 412 983cbc 409->412 411->410 412->408
                        APIs
                        • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00983CE3
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: d40abc2fe8ec28c4217d0ad5fdc033b2d5370511c338903eafd2540ef2b860f6
                        • Instruction ID: 68f082fb90795875c4013f511956c6b670d6346f1a703b1969e4a15507bc9abf
                        • Opcode Fuzzy Hash: d40abc2fe8ec28c4217d0ad5fdc033b2d5370511c338903eafd2540ef2b860f6
                        • Instruction Fuzzy Hash: A12134B1D002599FCB14CFA9D884BEEBBF5FF88314F14842AD455A7250CB78A945CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 416 983c68-983cb2 418 983cbe-983cf0 SetWindowsHookExW 416->418 419 983cb4 416->419 420 983cf9-983d1e 418->420 421 983cf2-983cf8 418->421 422 983cbc 419->422 421->420 422->418
                        APIs
                        • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00983CE3
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 7514e5abfc7e528154339a44ab77e578b228b20054ebb049ecb4cc9ded29f317
                        • Instruction ID: 091580695130dfaff4c9311474321ac01520698a09a07db961823973817595e2
                        • Opcode Fuzzy Hash: 7514e5abfc7e528154339a44ab77e578b228b20054ebb049ecb4cc9ded29f317
                        • Instruction Fuzzy Hash: 742127B1D002099FCB14DFAAD844BEEBBF5FB88314F108429D455A7350CB78A944CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 426 98e6f0-98f7d0 428 98f7d8-98f807 LoadLibraryExW 426->428 429 98f7d2-98f7d5 426->429 430 98f809-98f80f 428->430 431 98f810-98f82d 428->431 429->428 430->431
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0098F5E9,00000800,00000000,00000000), ref: 0098F7FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: e4915faf88e57d3a957762b04691f653b1b81f46633da7f731c3496a8a8a52b4
                        • Instruction ID: b4ac27eab49446db63529aaa73a40c852cff4bb1f6c9a6774f3733d1f4b41fdd
                        • Opcode Fuzzy Hash: e4915faf88e57d3a957762b04691f653b1b81f46633da7f731c3496a8a8a52b4
                        • Instruction Fuzzy Hash: EE1114B69003099FDB10DF9AD844BDEFBF8EB48320F10842AE419A7700C378A945CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 434 98f788-98f7d0 436 98f7d8-98f807 LoadLibraryExW 434->436 437 98f7d2-98f7d5 434->437 438 98f809-98f80f 436->438 439 98f810-98f82d 436->439 437->436 438->439
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0098F5E9,00000800,00000000,00000000), ref: 0098F7FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: a42ed4b48c53a0c7e6e1a7ae451b40969ea5e5e4f41cd4cd9e746510fdf8e2e5
                        • Instruction ID: fe5723364d9eee1a84be746ab7e4ad2e674e9db60fbb8e37f394dc69f1954529
                        • Opcode Fuzzy Hash: a42ed4b48c53a0c7e6e1a7ae451b40969ea5e5e4f41cd4cd9e746510fdf8e2e5
                        • Instruction Fuzzy Hash: 261144B6C003499FDB10DFAAC844BDEBBF4EB88320F10852AD425A7650C378A545CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 442 98bc58-98bcb4 444 98bd02-98bd1b 442->444 445 98bcb6-98bcde KiUserCallbackDispatcher 442->445 446 98bce0-98bce6 445->446 447 98bce7-98bcfb 445->447 446->447 447->444
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0098BCCD
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 1e4056908332a9940823b0446a10ee3d3f323581adb45cb7e4b6b456113cf76a
                        • Instruction ID: 8f46470385c298eb31992cae90ee89f165125e1afba40724b867e849950762f9
                        • Opcode Fuzzy Hash: 1e4056908332a9940823b0446a10ee3d3f323581adb45cb7e4b6b456113cf76a
                        • Instruction Fuzzy Hash: BE21AF71805394CFDB10DF99D4047EEBFF4AB19314F14885ED485E7282C7389A04CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 456 98f501-98f548 458 98f54a-98f54d 456->458 459 98f550-98f57b GetModuleHandleW 456->459 458->459 460 98f57d-98f583 459->460 461 98f584-98f598 459->461 460->461
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0098F56E
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: b4cfe0f12ff056408ea1a0ce15ea006fc25531d7ca18c58728554fbfd407329d
                        • Instruction ID: 86d6f5c254b0fa7b13ae4e1adb615aed5e4b384391bc050ddb9d4fae85776383
                        • Opcode Fuzzy Hash: b4cfe0f12ff056408ea1a0ce15ea006fc25531d7ca18c58728554fbfd407329d
                        • Instruction Fuzzy Hash: EA1102B2C012498FDB10DF9AC444BDEBBF4AB88324F14856AD429A7650D378A545CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 449 98bc68-98bcb4 451 98bd02-98bd1b 449->451 452 98bcb6-98bcde KiUserCallbackDispatcher 449->452 453 98bce0-98bce6 452->453 454 98bce7-98bcfb 452->454 453->454 454->451
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0098BCCD
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 895a04bf34fed2659f6a6877f4989071a6743fd7ff9d3a442538caeef670deb3
                        • Instruction ID: c353d5778c143e851d8c58662d206f4d3530793a2eed73679152cdb54c7e0eff
                        • Opcode Fuzzy Hash: 895a04bf34fed2659f6a6877f4989071a6743fd7ff9d3a442538caeef670deb3
                        • Instruction Fuzzy Hash: BC119AB1C05398CFDB10DF99D4043EEBFF8EB09714F14885AD485A7281CB78AA04CBA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 463 98f508-98f548 464 98f54a-98f54d 463->464 465 98f550-98f57b GetModuleHandleW 463->465 464->465 466 98f57d-98f583 465->466 467 98f584-98f598 465->467 466->467
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0098F56E
                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 032ae627ec427e7245595fc8c35cb40f02338e05734806bf92ed9eac8b34f620
                        • Instruction ID: b331899f3a10ad406d700433cb6658423dd2f7d861ba57e980e410fba7c5aaee
                        • Opcode Fuzzy Hash: 032ae627ec427e7245595fc8c35cb40f02338e05734806bf92ed9eac8b34f620
                        • Instruction Fuzzy Hash: C611E3B5C003499FDB10DF9AD444BDEFBF4AB88324F14852AD419A7710D374A545CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.506144706.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7dd000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bd54a2c972ebbef2371c297937e47de7826f15407833a58405e43caf2a1e235d
                        • Instruction ID: dec2fec67f40325035ae35dcc69d324dc8d2b594d8c1a364b19594e6b828e3be
                        • Opcode Fuzzy Hash: bd54a2c972ebbef2371c297937e47de7826f15407833a58405e43caf2a1e235d
                        • Instruction Fuzzy Hash: 0321F1B1504280EFCB25CF14D8C0B66BB75FB98324F24C56AEC094A346C33AEC46D6A2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.506144706.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7dd000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 578d44fecfbdf4e618ca97f3cadaf81afb779f0b9b4ef0aff546bea4430a41b7
                        • Instruction ID: 6623197effef2bd9619c2fcad02789e65ab4f6fa06b74586505fad8c10f8bf8e
                        • Opcode Fuzzy Hash: 578d44fecfbdf4e618ca97f3cadaf81afb779f0b9b4ef0aff546bea4430a41b7
                        • Instruction Fuzzy Hash: 852128B1504240EFDB25CF54E9C0B66BF75FB98328F24856AE9064B346C33ADC56C7A2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.507789577.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_93d000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5b31b235e8b3ed2f9a2488333835cf6961dd2bf1666103846587197b852c80cc
                        • Instruction ID: fa4c7fda0eddb914a1eccb4aff33acbd3dcc3bb083dd761af6e8cc94132c8d36
                        • Opcode Fuzzy Hash: 5b31b235e8b3ed2f9a2488333835cf6961dd2bf1666103846587197b852c80cc
                        • Instruction Fuzzy Hash: 05210775508244EFCB04CF10E5D0B26BB65FB88318F24C969D8494B246C73ADC4ACEA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.507789577.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_93d000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f8375491ac1baeed2202547f27d538e084138ce98ab5e8afc1143b785e36719b
                        • Instruction ID: f92547cb5e3a5b64d93352015570fec719d0ad6a6db4c80933a2ab839cc0055c
                        • Opcode Fuzzy Hash: f8375491ac1baeed2202547f27d538e084138ce98ab5e8afc1143b785e36719b
                        • Instruction Fuzzy Hash: 792107B5508244EFDB09CF50E9D0B26BBA5FB88314F24C969D8094B246C77AD846CE61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.506144706.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7dd000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                        • Instruction ID: 6cf163f74a15e28d0bd33e56ba38ed1a9f067207499b4c1c19f1df77eda9407d
                        • Opcode Fuzzy Hash: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                        • Instruction Fuzzy Hash: 651181B6504280DFCB15CF10D5C4B56BF71FB94324F24C6AADC454B656C33AE856CBA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.506144706.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7dd000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                        • Instruction ID: bd2ea366a1593959c8a4a63f5037f84331244f2e16e60903bdbb8675048b38c9
                        • Opcode Fuzzy Hash: 15e00ab0180662b097a36b170ee5e0122ef9b813bbc53ef17b167e6fd8fb8d96
                        • Instruction Fuzzy Hash: D411B176804280DFCF12CF14D9C4B56BF71FB94324F2486AAD8464B616C33AD966CBA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.507789577.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_93d000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7d36124553d90c539148c45a8a93ecca56ad8a74831c1bc612bfc5b4ddcdf7be
                        • Instruction ID: c5ad953490f633e1a6ac2fb7797db65638fe5324ca8f7472ddd68d93165028e5
                        • Opcode Fuzzy Hash: 7d36124553d90c539148c45a8a93ecca56ad8a74831c1bc612bfc5b4ddcdf7be
                        • Instruction Fuzzy Hash: E9119075508280DFDB05CF50D9D4B15BBB1FB44324F24C6A9D8494B656C33AD85ACF52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.507789577.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_93d000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7d36124553d90c539148c45a8a93ecca56ad8a74831c1bc612bfc5b4ddcdf7be
                        • Instruction ID: 96b7e9aac946351ffd8f919eeb62f6578d0ab2b3ed866fda4c5b75829dc2915b
                        • Opcode Fuzzy Hash: 7d36124553d90c539148c45a8a93ecca56ad8a74831c1bc612bfc5b4ddcdf7be
                        • Instruction Fuzzy Hash: 5B119D75508680DFCB05CF10E5D4B15BBB1FB84328F28C6AAD8494B656C33AD84ACFA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.508007823.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_980000_Stub.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fc3750a84e634bcab2fd99e6ee134de62b0a67eb9f1c12855d0d8a7b8ee8d4b7
                        • Instruction ID: aa3f83e2866cc8322015677cb53b907b8f643a9134935ca1dbba1ff8b3a68dfc
                        • Opcode Fuzzy Hash: fc3750a84e634bcab2fd99e6ee134de62b0a67eb9f1c12855d0d8a7b8ee8d4b7
                        • Instruction Fuzzy Hash: 47A15D32E006198FCF15EFA5C8545DEBBF6FF85300B15856AE805BB321EB71A955CB80
                        Uniqueness

                        Uniqueness Score: -1.00%