Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:780218
MD5:6822f46b691d856777852b1342f294e1
SHA1:b4d772d60fc363234da23b6fa02175ff89561193
SHA256:912a8d4711001972a4d2234a5b34998afb3feebc9e1a76e4a36257c4980e4e5f
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 1416 cmdline: C:\Users\user\Desktop\file.exe MD5: 6822F46B691D856777852B1342F294E1)
    • file.exe (PID: 5124 cmdline: C:\Users\user\Desktop\file.exe MD5: 6822F46B691D856777852B1342F294E1)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • iihhevv (PID: 6080 cmdline: C:\Users\user\AppData\Roaming\iihhevv MD5: 6822F46B691D856777852B1342F294E1)
    • iihhevv (PID: 4664 cmdline: C:\Users\user\AppData\Roaming\iihhevv MD5: 6822F46B691D856777852B1342F294E1)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x4c63:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      1.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0.2.file.exe.2c415a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          1.0.file.exe.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            1.0.file.exe.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              12.2.iihhevv.2d215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 5 entries
                No Sigma rule has matched
                Timestamp:192.168.2.6185.246.221.15449701802851815 01/08/23-16:16:29.767212
                SID:2851815
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: file.exeReversingLabs: Detection: 43%
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 17%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 17%Perma Link
                Source: C:\Users\user\AppData\Roaming\iihhevvReversingLabs: Detection: 43%
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\iihhevvJoe Sandbox ML: detected
                Source: 1.0.file.exe.400000.2.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.2.unpackAvira: Label: TR/Patched.Gen
                Source: 1.0.file.exe.400000.3.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.1.unpackAvira: Label: TR/Patched.Gen
                Source: 1.0.file.exe.400000.1.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.0.unpackAvira: Label: TR/Patched.Gen
                Source: 1.0.file.exe.400000.0.unpackAvira: Label: TR/Patched.Gen
                Source: 13.0.iihhevv.400000.3.unpackAvira: Label: TR/Patched.Gen
                Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: VC:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr
                Source: Binary string: C:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.6:49701 -> 185.246.221.154:80
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
                Source: Joe Sandbox ViewIP Address: 185.246.221.154 185.246.221.154
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wavjaq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 280Host: host-file-host6.com
                Source: explorer.exe, 00000003.00000000.375571444.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.335063212.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.291326238.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.312089796.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.349980053.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.318245571.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.356672976.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wavjaq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 280Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c415a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.iihhevv.2d215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.iihhevv.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: iihhevv, 0000000C.00000002.440038517.0000000002D9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_0040180C Sleep,NtTerminateProcess,13_2_0040180C
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401818 Sleep,NtTerminateProcess,13_2_00401818
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401822 Sleep,NtTerminateProcess,13_2_00401822
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401826 Sleep,NtTerminateProcess,13_2_00401826
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_00401834 Sleep,NtTerminateProcess,13_2_00401834
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: file.exeReversingLabs: Detection: 43%
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevv
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevv
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevvJump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\iihhevvJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/2
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DAD349 CreateToolhelp32Snapshot,Module32First,12_2_02DAD349
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: VC:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr
                Source: Binary string: C:\jixehetumah75\yes36-nifagisukesuce51-hiriy\husa.pdb source: file.exe, iihhevv.3.dr
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DB30E8 pushad ; iretd 12_2_02DB30EE
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DAE25C push ebx; iretd 12_2_02DAE287
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DAE247 push ebx; iretd 12_2_02DAE287
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_004011D0 push ebx; iretd 13_2_00401217
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_004011D7 push ebx; iretd 13_2_00401217
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 13_2_004011EB push ebx; iretd 13_2_00401217
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\iihhevvJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\iihhevvJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\iihhevv:Zone.Identifier read attributes | deleteJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: iihhevv, 0000000D.00000002.453932968.00000000006DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Windows\explorer.exe TID: 5496Thread sleep count: 662 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5476Thread sleep count: 295 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5484Thread sleep count: 307 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5484Thread sleep time: -30700s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2980Thread sleep count: 486 > 30Jump to behavior
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 662Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 486Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                Source: explorer.exe, 00000003.00000000.336772992.00000000045B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000003.00000000.310501814.00000000081DD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000^
                Source: explorer.exe, 00000003.00000000.363530032.0000000006710000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                Source: explorer.exe, 00000003.00000000.344790577.0000000008304000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000003.00000000.344698254.00000000082B2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                Source: explorer.exe, 00000003.00000000.310942909.0000000008269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>&

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvCode function: 12_2_02DACC26 push dword ptr fs:[00000030h]12_2_02DACC26
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess queried: DebugPortJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: iihhevv.3.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 4E61930Jump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvThread created: unknown EIP: 4A41930Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\iihhevvProcess created: C:\Users\user\AppData\Roaming\iihhevv C:\Users\user\AppData\Roaming\iihhevvJump to behavior
                Source: explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.335391872.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.293910023.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
                Source: explorer.exe, 00000003.00000000.304764006.0000000005D90000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.374808503.000000000835D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000003.00000000.335063212.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.291326238.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000003.00000000.357266621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.335391872.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.293910023.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C0C7 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040C0C7

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c415a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.iihhevv.2d215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.iihhevv.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.2c415a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.iihhevv.2d215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.iihhevv.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.iihhevv.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                312
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium2
                Non-Application Layer Protocol
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory411
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth112
                Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)312
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Hidden Files and Directories
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Software Packing
                Cached Domain Credentials4
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 780218 Sample: file.exe Startdate: 08/01/2023 Architecture: WINDOWS Score: 100 32 Snort IDS alert for network traffic 2->32 34 Multi AV Scanner detection for domain / URL 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 6 other signatures 2->38 7 file.exe 2->7         started        9 iihhevv 2->9         started        process3 signatures4 12 file.exe 7->12         started        48 Multi AV Scanner detection for dropped file 9->48 50 Machine Learning detection for dropped file 9->50 15 iihhevv 9->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 185.246.221.154, 49701, 80 LVLT-10753US Germany 17->26 28 host-host-file8.com 17->28 30 192.168.2.1 unknown unknown 17->30 22 C:\Users\user\AppData\Roaming\iihhevv, PE32 17->22 dropped 24 C:\Users\user\...\iihhevv:Zone.Identifier, ASCII 17->24 dropped 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Benign windows process drops PE files 17->42 44 Deletes itself after installation 17->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->46 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe44%ReversingLabsWin32.Trojan.MintZard
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\iihhevv100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\iihhevv44%ReversingLabsWin32.Trojan.MintZard
                SourceDetectionScannerLabelLinkDownload
                12.2.iihhevv.2d215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.2.iihhevv.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.2.unpack100%AviraTR/Patched.GenDownload File
                13.0.iihhevv.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.2.unpack100%AviraTR/Patched.GenDownload File
                1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.3.unpack100%AviraTR/Patched.GenDownload File
                0.2.file.exe.2c415a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.1.unpack100%AviraTR/Patched.GenDownload File
                1.0.file.exe.400000.1.unpack100%AviraTR/Patched.GenDownload File
                1.0.file.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.iihhevv.400000.0.unpack100%AviraTR/Patched.GenDownload File
                1.0.file.exe.400000.0.unpack100%AviraTR/Patched.GenDownload File
                13.0.iihhevv.400000.3.unpack100%AviraTR/Patched.GenDownload File
                13.0.iihhevv.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com18%VirustotalBrowse
                host-host-file8.com18%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                185.246.221.154
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000000.375571444.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.335063212.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.291326238.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.312089796.0000000008442000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.349980053.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.318245571.000000000F5B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.356672976.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.246.221.154
                  host-file-host6.comGermany
                  10753LVLT-10753UStrue
                  IP
                  192.168.2.1
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:780218
                  Start date and time:2023-01-08 16:14:20 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 59s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:file.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:15
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@6/2@4/2
                  EGA Information:
                  • Successful, ratio: 75%
                  HDC Information:
                  • Successful, ratio: 64.2% (good quality ratio 54.5%)
                  • Quality average: 46.4%
                  • Quality standard deviation: 27.9%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                  • Execution Graph export aborted for target file.exe, PID 1416 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  16:16:29Task SchedulerRun new task: Firefox Default Browser Agent 922C23768694F6CB path: C:\Users\user\AppData\Roaming\iihhevv
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  185.246.221.154file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  host-file-host6.comfile.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  LVLT-10753USfile.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  B07BE8360DD11E81F6830AE467BEC71CB6058523B3594.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  file.exeGet hashmaliciousBrowse
                  • 185.246.221.154
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):270848
                  Entropy (8bit):6.5739942117768715
                  Encrypted:false
                  SSDEEP:3072:cXhXAmIhRLjEwlw57XEpyq5KqU8rZizWpb/Z/oKGIcJxIApxOE6idlUZNTKXWPrk:Yx2Lj27XuyGDZnRRHox36aaOuN
                  MD5:6822F46B691D856777852B1342F294E1
                  SHA1:B4D772D60FC363234DA23B6FA02175FF89561193
                  SHA-256:912A8D4711001972A4D2234A5B34998AFB3FEEBC9E1A76E4A36257C4980E4E5F
                  SHA-512:F101C484B300BD08966DD307CD6DE7C4156D7DD69F5F64E92AED189D8BDFD2A74836DE897F8A1B2B05A685287CDA0F1DFC2EEB0A3C979F8A6F51ADE78AD322F8
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 44%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u...............................x`.........1.....................Rich....................PE..L...0.Aa.................z...ry......_............@...........................z.....{........................................}..P.....y.`........................... ................................C..@............................................text...fx.......z.................. ..`.data....xw..........~..............@....rsrc...`.....y.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.5739942117768715
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:file.exe
                  File size:270848
                  MD5:6822f46b691d856777852b1342f294e1
                  SHA1:b4d772d60fc363234da23b6fa02175ff89561193
                  SHA256:912a8d4711001972a4d2234a5b34998afb3feebc9e1a76e4a36257c4980e4e5f
                  SHA512:f101c484b300bd08966dd307cd6de7c4156d7dd69f5f64e92aed189d8bdfd2a74836de897f8a1b2b05a685287cda0f1dfc2eeb0a3c979f8a6f51ade78ad322f8
                  SSDEEP:3072:cXhXAmIhRLjEwlw57XEpyq5KqU8rZizWpb/Z/oKGIcJxIApxOE6idlUZNTKXWPrk:Yx2Lj27XuyGDZnRRHox36aaOuN
                  TLSH:A1449C317692FC72C5D6053069549AF4EFBEBC639A20998327773A2F6E702D0523271B
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u......................................x`.........1...........................Rich....................PE..L...0.Aa...........
                  Icon Hash:9062e098c6e73144
                  Entrypoint:0x405fbf
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x6141B130 [Wed Sep 15 08:39:12 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:b49d1773872141620d6e88f1989600b7
                  Instruction
                  call 00007FE0E8E55A98h
                  jmp 00007FE0E8E4F80Eh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  push esi
                  mov esi, ecx
                  mov byte ptr [esi+0Ch], 00000000h
                  test eax, eax
                  jne 00007FE0E8E4F9F5h
                  call 00007FE0E8E55775h
                  mov dword ptr [esi+08h], eax
                  mov ecx, dword ptr [eax+6Ch]
                  mov dword ptr [esi], ecx
                  mov ecx, dword ptr [eax+68h]
                  mov dword ptr [esi+04h], ecx
                  mov ecx, dword ptr [esi]
                  cmp ecx, dword ptr [0042A358h]
                  je 00007FE0E8E4F9A4h
                  mov ecx, dword ptr [0042A274h]
                  test dword ptr [eax+70h], ecx
                  jne 00007FE0E8E4F999h
                  call 00007FE0E8E564ABh
                  mov dword ptr [esi], eax
                  mov eax, dword ptr [esi+04h]
                  cmp eax, dword ptr [0042A178h]
                  je 00007FE0E8E4F9A8h
                  mov eax, dword ptr [esi+08h]
                  mov ecx, dword ptr [0042A274h]
                  test dword ptr [eax+70h], ecx
                  jne 00007FE0E8E4F99Ah
                  call 00007FE0E8E55D1Fh
                  mov dword ptr [esi+04h], eax
                  mov eax, dword ptr [esi+08h]
                  test byte ptr [eax+70h], 00000002h
                  jne 00007FE0E8E4F9A6h
                  or dword ptr [eax+70h], 02h
                  mov byte ptr [esi+0Ch], 00000001h
                  jmp 00007FE0E8E4F99Ch
                  mov ecx, dword ptr [eax]
                  mov dword ptr [esi], ecx
                  mov eax, dword ptr [eax+04h]
                  mov dword ptr [esi+04h], eax
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  sub esp, 10h
                  push esi
                  push dword ptr [ebp+0Ch]
                  lea ecx, dword ptr [ebp-10h]
                  call 00007FE0E8E4F8FAh
                  mov esi, dword ptr [ebp+08h]
                  movsx eax, byte ptr [esi]
                  push eax
                  call 00007FE0E8E56753h
                  cmp eax, 65h
                  jmp 00007FE0E8E4F99Eh
                  inc esi
                  movzx eax, byte ptr [esi]
                  push eax
                  call 00007FE0E8E564FCh
                  test eax, eax
                  pop ecx
                  jne 00007FE0E8E4F983h
                  movsx eax, byte ptr [esi]
                  Programming Language:
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [C++] VS2008 build 21022
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x17dec0x50.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x27910000x18460.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43b80x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x178660x17a00False0.5363239914021164OpenPGP Public Key6.401558907932897IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x190000x27778f40x11e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x27910000x184600x18600False0.4745592948717949data5.255240516516851IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  AFX_DIALOG_LAYOUT0x27a6b580x2data
                  AFX_DIALOG_LAYOUT0x27a6b500x2data
                  AFX_DIALOG_LAYOUT0x27a6b600x2data
                  AFX_DIALOG_LAYOUT0x27a6b680x2data
                  AFX_DIALOG_LAYOUT0x27a6b700x2data
                  RT_CURSOR0x27a6b780x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
                  RT_CURSOR0x27a6cc00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
                  RT_CURSOR0x27a6df00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
                  RT_CURSOR0x27a6ee00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                  RT_CURSOR0x27a7fb80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                  RT_ICON0x27919e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishVenezuela
                  RT_ICON0x27920a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishVenezuela
                  RT_ICON0x27926100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishVenezuela
                  RT_ICON0x27936b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishVenezuela
                  RT_ICON0x2793b600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishVenezuela
                  RT_ICON0x2794a080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishVenezuela
                  RT_ICON0x27952b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishVenezuela
                  RT_ICON0x27959780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishVenezuela
                  RT_ICON0x2795ee00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SpanishVenezuela
                  RT_ICON0x27984880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SpanishVenezuela
                  RT_ICON0x27995300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SpanishVenezuela
                  RT_ICON0x2799eb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SpanishVenezuela
                  RT_ICON0x279a3980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishVenezuela
                  RT_ICON0x279b2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishVenezuela
                  RT_ICON0x279b9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishVenezuela
                  RT_ICON0x279be700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishVenezuela
                  RT_ICON0x279e4180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishVenezuela
                  RT_ICON0x279f4c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishVenezuela
                  RT_ICON0x279fe480x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishVenezuela
                  RT_ICON0x27a03180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a11c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a1a680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a21300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSpanishVenezuela
                  RT_ICON0x27a26980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SpanishVenezuela
                  RT_ICON0x27a4c400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SpanishVenezuela
                  RT_ICON0x27a5ce80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SpanishVenezuela
                  RT_ICON0x27a66700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SpanishVenezuela
                  RT_STRING0x27a89c80x38cdataSpanishVenezuela
                  RT_STRING0x27a8d580x53cdataSpanishVenezuela
                  RT_STRING0x27a92980x1c8dataSpanishVenezuela
                  RT_GROUP_CURSOR0x27a6ca80x14data
                  RT_GROUP_CURSOR0x27a88600x14data
                  RT_GROUP_CURSOR0x27a7f880x30data
                  RT_GROUP_ICON0x279a3200x76dataSpanishVenezuela
                  RT_GROUP_ICON0x2793b200x3edataSpanishVenezuela
                  RT_GROUP_ICON0x27a02b00x68dataSpanishVenezuela
                  RT_GROUP_ICON0x27a6ad80x76dataSpanishVenezuela
                  RT_VERSION0x27a88780x150data
                  DLLImport
                  KERNEL32.dllGetModuleHandleA, CreateDirectoryExA, ReadConsoleInputA, GetTempPathW, GetCurrentDirectoryW, RemoveDirectoryW, OutputDebugStringA, GetProcAddress, LocalAlloc, GetBinaryTypeW, SearchPathA, VerifyVersionInfoA, GetProcessPriorityBoost, EndUpdateResourceW, FindNextFileW, FindFirstVolumeW, LocalFree, GlobalFlags, UpdateResourceW, CreateActCtxA, CopyFileW, InterlockedExchangeAdd, GetConsoleAliasW, VerSetConditionMask, CreateMutexA, DeactivateActCtx, GetDiskFreeSpaceA, MoveFileW, GetLogicalDriveStringsA, ResetEvent, MoveFileExW, CreateMailslotA, WriteConsoleInputA, QueryDosDeviceW, InterlockedDecrement, EnumTimeFormatsW, lstrcatW, FindFirstFileA, FreeEnvironmentStringsA, SetErrorMode, GetTickCount, SetLastError, AllocateUserPhysicalPages, GetPrivateProfileStructA, CopyFileExA, MoveFileWithProgressA, LoadLibraryA, GetLastError, DeleteFileA, GetStartupInfoW, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, HeapCreate, VirtualFree, HeapFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException, VirtualAlloc, HeapReAlloc, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile, HeapSize, CloseHandle, CreateFileA
                  GDI32.dllGetTextFaceA
                  WINHTTP.dllWinHttpWriteData
                  Language of compilation systemCountry where language is spokenMap
                  SpanishVenezuela
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  192.168.2.6185.246.221.15449701802851815 01/08/23-16:16:29.767212TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184970180192.168.2.6185.246.221.154
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 8, 2023 16:16:29.739099026 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.766792059 CET8049701185.246.221.154192.168.2.6
                  Jan 8, 2023 16:16:29.766920090 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.767211914 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.767230988 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.794193029 CET8049701185.246.221.154192.168.2.6
                  Jan 8, 2023 16:16:29.883445024 CET8049701185.246.221.154192.168.2.6
                  Jan 8, 2023 16:16:29.883548975 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.887500048 CET4970180192.168.2.6185.246.221.154
                  Jan 8, 2023 16:16:29.914516926 CET8049701185.246.221.154192.168.2.6
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 8, 2023 16:16:29.712198019 CET5320353192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:29.732367992 CET53532038.8.8.8192.168.2.6
                  Jan 8, 2023 16:16:29.955971956 CET5310753192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:30.945806980 CET5310753192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:32.171495914 CET5310753192.168.2.68.8.8.8
                  Jan 8, 2023 16:16:33.983520031 CET53531078.8.8.8192.168.2.6
                  Jan 8, 2023 16:16:35.964303017 CET53531078.8.8.8192.168.2.6
                  Jan 8, 2023 16:16:36.202774048 CET53531078.8.8.8192.168.2.6
                  TimestampSource IPDest IPChecksumCodeType
                  Jan 8, 2023 16:16:35.964509010 CET192.168.2.68.8.8.8cff9(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jan 8, 2023 16:16:29.712198019 CET192.168.2.68.8.8.80x43e5Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:29.955971956 CET192.168.2.68.8.8.80x6b76Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:30.945806980 CET192.168.2.68.8.8.80x6b76Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:32.171495914 CET192.168.2.68.8.8.80x6b76Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 8, 2023 16:16:29.732367992 CET8.8.8.8192.168.2.60x43e5No error (0)host-file-host6.com185.246.221.154A (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:33.983520031 CET8.8.8.8192.168.2.60x6b76Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:35.964303017 CET8.8.8.8192.168.2.60x6b76Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Jan 8, 2023 16:16:36.202774048 CET8.8.8.8192.168.2.60x6b76Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  • wavjaq.org
                    • host-file-host6.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.649701185.246.221.15480C:\Windows\explorer.exe
                  TimestampkBytes transferredDirectionData
                  Jan 8, 2023 16:16:29.767211914 CET268OUTPOST / HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://wavjaq.org/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 280
                  Host: host-file-host6.com
                  Jan 8, 2023 16:16:29.767230988 CET268OUTData Raw: 10 87 8a 93 6a 83 d6 b1 cc 39 77 34 77 cf 93 fd 30 65 ac 43 d6 44 62 ec bd 99 ab f5 fa d4 94 86 11 ba 5a a7 1d 6f b9 95 e0 da f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd ce f0 d8 77 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 47 a9 9a 04
                  Data Ascii: j9w4w0eCDbZowmwu$f]dG[}vohM^^U"8O]3!o+uGf1}W*92rfw-%I(67\f'ilg|L$9y^S~HO"%4ZhzJK6H;`>V%pu<C
                  Jan 8, 2023 16:16:29.883445024 CET269INHTTP/1.1 200 OK
                  Server: nginx/1.20.2
                  Date: Sun, 08 Jan 2023 15:16:29 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: close
                  Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: fYour IP blocked0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:16:15:16
                  Start date:08/01/2023
                  Path:C:\Users\user\Desktop\file.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\file.exe
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.272820167.0000000002CB9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:16:15:24
                  Start date:08/01/2023
                  Path:C:\Users\user\Desktop\file.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\file.exe
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.379061898.00000000022D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.379122048.00000000022F1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:3
                  Start time:16:15:33
                  Start date:08/01/2023
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff647860000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000003.00000000.360700242.0000000004E61000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:high

                  Target ID:12
                  Start time:16:16:29
                  Start date:08/01/2023
                  Path:C:\Users\user\AppData\Roaming\iihhevv
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\iihhevv
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 44%, ReversingLabs
                  Reputation:low

                  Target ID:13
                  Start time:16:16:42
                  Start date:08/01/2023
                  Path:C:\Users\user\AppData\Roaming\iihhevv
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\iihhevv
                  Imagebase:0x400000
                  File size:270848 bytes
                  MD5 hash:6822F46B691D856777852B1342F294E1
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.453836489.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.453756487.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Reset < >

                    Execution Graph

                    Execution Coverage:6.1%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:63.2%
                    Total number of Nodes:19
                    Total number of Limit Nodes:0
                    execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                    Control-flow Graph

                    C-Code - Quality: 23%
                    			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				char _v8;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				void* __ebp;
                    				void* _t11;
                    				void* _t16;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t20;
                    				void* _t21;
                    
                    				_t22 = __eflags;
                    				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                    				_t17 = _a4;
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                    				if(_t11 != 0) {
                    					_push(_a16);
                    					_push(_v8);
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, _t20); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				return __eax;
                    			}














                    0x0040180c
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.378595176.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                    • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.378595176.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                    • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("out 0x95, eax");
                    				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}







                    0x00401822
                    0x00401822
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.378595176.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                    • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t8;
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("sbb ebx, ebp");
                    				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401826
                    0x00401826
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.378595176.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                    • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 20%
                    			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t10;
                    				void* _t13;
                    				intOrPtr* _t19;
                    				void* _t22;
                    				void* _t25;
                    
                    				_t26 = __eflags;
                    				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t19 =  *((intOrPtr*)(_t25 + 8));
                    				Sleep(0x1388);
                    				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                    				if(_t13 != 0) {
                    					_push( *((intOrPtr*)(_t25 + 0x14)));
                    					_push( *((intOrPtr*)(_t25 - 4)));
                    					_push(_t13);
                    					_push(_t19); // executed
                    					L00401455(0x60, _t22, __edi); // executed
                    				}
                    				 *_t19(0xffffffff, 0); // executed
                    				_t19 = _t19 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401834
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.378595176.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                    • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:9.9%
                    Dynamic/Decrypted Code Coverage:68.4%
                    Signature Coverage:31.6%
                    Total number of Nodes:19
                    Total number of Limit Nodes:0
                    execution_graph 349 2dacba3 352 2dacba9 349->352 353 2dacbb8 352->353 356 2dad349 353->356 357 2dad364 356->357 358 2dad36d CreateToolhelp32Snapshot 357->358 359 2dad389 Module32First 357->359 358->357 358->359 360 2dad398 359->360 361 2dacba8 359->361 363 2dad008 360->363 364 2dad033 363->364 365 2dad07c 364->365 366 2dad044 VirtualAlloc 364->366 365->365 366->365 367 405fbf 370 40c0c7 367->370 369 405fc4 369->369 371 40c0f9 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 370->371 372 40c0ec 370->372 373 40c0f0 371->373 372->371 372->373 373->369

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_02DAE0D8 1 Function_02DB2CD9 2 Function_02DAE8DE 3 Function_02DAE25C 4 Function_02DACBDD 91 Function_02DACC26 4->91 5 Function_0040C0C7 6 Function_02DB2AD2 7 Function_02DAED53 8 Function_02DAEA50 9 Function_02DAE654 10 Function_02DB2C4B 11 Function_02DAD448 12 Function_02DAD349 63 Function_02DAD008 12->63 13 Function_02DAE6CE 14 Function_02DAF5C3 15 Function_02DB2CC2 16 Function_02DAD343 21 Function_02DAD2FA 16->21 17 Function_02DAE6C7 18 Function_02DAE247 19 Function_02DAEB44 20 Function_02DACBC5 20->4 22 Function_02DADC7A 23 Function_02DB2C7B 24 Function_02DAEEFB 25 Function_02DAE1FB 26 Function_02DADD78 27 Function_02DAE578 28 Function_02DAE1F9 29 Function_02DAF179 30 Function_02DB2CFF 31 Function_02DAF47F 32 Function_02DAE37C 33 Function_02DB2F7D 34 Function_02DAF577 35 Function_02DB3076 36 Function_02DAF575 37 Function_02DAD7EA 38 Function_02DAD6EA 39 Function_02DAF66A 40 Function_02DB31E9 41 Function_02DB30E8 42 Function_02DB30EF 43 Function_02DAECEF 44 Function_02DAF5ED 45 Function_02DB2EE1 46 Function_02DAE2E1 47 Function_02DAF7E7 48 Function_02DAE2E4 49 Function_02DB329B 50 Function_02DAEA1A 51 Function_02DAD31B 52 Function_02DB2C1A 53 Function_02DB309E 54 Function_02DADD1F 55 Function_02DAE59C 56 Function_02DAD093 57 Function_02DAE993 58 Function_02DAD411 59 Function_02DAE216 60 Function_02DAF214 61 Function_02DAD095 62 Function_02DAF115 63->51 63->61 64 Function_02DAF708 65 Function_02DB3288 66 Function_02DAF10E 67 Function_02DADC86 68 Function_02DAE204 69 Function_02DB2C05 70 Function_02DB2FBB 71 Function_02DAEDB9 72 Function_02DAF1B9 73 Function_02DAF6BE 74 Function_02DAED3D 75 Function_02DAD732 76 Function_02DB2AB2 77 Function_02DAE2B6 78 Function_02DAE137 79 Function_02DAE6AB 80 Function_02DB2C2A 81 Function_02DAD3A8 82 Function_02DB2AA9 83 Function_02DACBA9 83->12 83->20 84 Function_02DB2F28 85 Function_02DAE12C 86 Function_02DAF72C 87 Function_02DADDAD 88 Function_02DADAA2 89 Function_02DACBA3 89->83 90 Function_02DB2F22 92 Function_02DACCA7 91->92 93 Function_02DB3126 94 Function_02DAE224 95 Function_00405FBF 95->5

                    Control-flow Graph

                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DAD371
                    • Module32First.KERNEL32(00000000,00000224), ref: 02DAD391
                    Memory Dump Source
                    • Source File: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DA9000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_12_2_2da9000_iihhevv.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: e38c2d6da242bae4ee528c304cf466cfc12a65d67f9a5f4623ec975553012131
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 22F062315007146BD7203BF5A89DF6F76E9BF49624F100528E686D29C0DB70EC458A61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 13 2dad008-2dad042 call 2dad31b 16 2dad090 13->16 17 2dad044-2dad077 VirtualAlloc call 2dad095 13->17 16->16 19 2dad07c-2dad08e 17->19 19->16
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02DAD059
                    Memory Dump Source
                    • Source File: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DA9000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_12_2_2da9000_iihhevv.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: db4a11f7fe247647b0185cd145c8bbe0ac4cc82ecc47505147bc59d55ddb4053
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 0C113979A00208EFDB01DF98C989E98BBF5EF08351F1580A4F9489B361D371EA90DF94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 121 2dacc26-2dacc38 122 2dacc3b-2dacc4e call 2dacca7 121->122 125 2dacc50-2dacc52 122->125 126 2dacc54-2dacc71 122->126 125->122 127 2dacc73-2dacc86 call 2dacca7 126->127 130 2dacc88-2dacc8e 127->130 131 2dacc90-2dacca4 127->131 130->127
                    Memory Dump Source
                    • Source File: 0000000C.00000002.440117627.0000000002DA9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DA9000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_12_2_2da9000_iihhevv.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: 1fe5079d2779d764785adbe2a8f0946a46a7e0168f63d28fff7b253df879ae4a
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: B3117C72350100AFDB44DE55DCD4EA673EAEB89330B198066E908CB326E675EC02CB60
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:6.1%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:19
                    Total number of Limit Nodes:0
                    execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                    Control-flow Graph

                    C-Code - Quality: 23%
                    			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				char _v8;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				void* __ebp;
                    				void* _t11;
                    				void* _t16;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t20;
                    				void* _t21;
                    
                    				_t22 = __eflags;
                    				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                    				_t17 = _a4;
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                    				if(_t11 != 0) {
                    					_push(_a16);
                    					_push(_v8);
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, _t20); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				return __eax;
                    			}














                    0x0040180c
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 0000000D.00000002.453691707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_13_2_400000_iihhevv.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                    • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 0000000D.00000002.453691707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_13_2_400000_iihhevv.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                    • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("out 0x95, eax");
                    				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}







                    0x00401822
                    0x00401822
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 0000000D.00000002.453691707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_13_2_400000_iihhevv.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                    • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t8;
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("sbb ebx, ebp");
                    				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401826
                    0x00401826
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 0000000D.00000002.453691707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_13_2_400000_iihhevv.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                    • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 20%
                    			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t10;
                    				void* _t13;
                    				intOrPtr* _t19;
                    				void* _t22;
                    				void* _t25;
                    
                    				_t26 = __eflags;
                    				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t19 =  *((intOrPtr*)(_t25 + 8));
                    				Sleep(0x1388);
                    				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                    				if(_t13 != 0) {
                    					_push( *((intOrPtr*)(_t25 + 0x14)));
                    					_push( *((intOrPtr*)(_t25 - 4)));
                    					_push(_t13);
                    					_push(_t19); // executed
                    					L00401455(0x60, _t22, __edi); // executed
                    				}
                    				 *_t19(0xffffffff, 0); // executed
                    				_t19 = _t19 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401834
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 0000000D.00000002.453691707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_13_2_400000_iihhevv.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                    • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                    Uniqueness

                    Uniqueness Score: -1.00%