Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL Receipt 004673321.pdf.exe

Overview

General Information

Sample name:DHL Receipt 004673321.pdf.exe
Analysis ID:1428356
MD5:902c91012912a8aaee6a3d1e43af13af
SHA1:9fe644a8d52f153fe568f0390e8568b16a0e57c5
SHA256:46ff258b05454a780553a2bde8d1847aa2b9c804c6ee432ed5180a4bdbb5a4d7
Tags:DHLexe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Uses an obfuscated file name to hide its real file extension (double extension)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected potential crypto function
Enables debug privileges
One or more processes crash
PE file contains an invalid checksum
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • DHL Receipt 004673321.pdf.exe (PID: 2964 cmdline: "C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe" MD5: 902C91012912A8AAEE6A3D1E43AF13AF)
    • WerFault.exe (PID: 6552 cmdline: C:\Windows\system32\WerFault.exe -u -p 2964 -s 1000 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe", CommandLine: "C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe", CommandLine|base64offset|contains: E, Image: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe, NewProcessName: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe, OriginalFileName: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6412, ProcessCommandLine: "C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe", ProcessId: 2964, ProcessName: DHL Receipt 004673321.pdf.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: DHL Receipt 004673321.pdf.exeReversingLabs: Detection: 26%
Source: DHL Receipt 004673321.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\System.Core.pdbl source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERC932.tmp.dmp.4.dr
Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbM3b source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: re.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FC5D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: Microsoft.VisualBasic.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\System.Core.pdb{#S source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\DHL Receipt 004673321.pdf.PDB source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FC5D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: pC:\Users\user\Desktop\DHL Receipt 004673321.pdf.PDB ` source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2094773845.00000020D40F4000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.pdb}! source: WERC932.tmp.dmp.4.dr
Source: Binary string: DHL Receipt 004673321.pdf.PDB source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2094773845.00000020D40F4000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdbH source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\dll\System.Core.pdbU, source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdbRSDS source: WERC932.tmp.dmp.4.dr
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: initial sampleStatic PE information: Filename: DHL Receipt 004673321.pdf.exe
Source: initial sampleStatic PE information: Filename: DHL Receipt 004673321.pdf.exe
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeCode function: 0_2_00007FF848F10F380_2_00007FF848F10F38
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2964 -s 1000
Source: DHL Receipt 004673321.pdf.exeStatic PE information: No import functions for PE file found
Source: DHL Receipt 004673321.pdf.exe, 00000000.00000000.1988821665.0000017F6FA60000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnewawaqakipurifL vs DHL Receipt 004673321.pdf.exe
Source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096168121.0000017F100A7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUnewawaqakipurifL vs DHL Receipt 004673321.pdf.exe
Source: DHL Receipt 004673321.pdf.exeBinary or memory string: OriginalFilenameUnewawaqakipurifL vs DHL Receipt 004673321.pdf.exe
Source: DHL Receipt 004673321.pdf.exe, getKindLongTimePattern.csTask registration methods: 'CreateReferenceTrackingHandleTaskWaitContinuationStarted'
Source: DHL Receipt 004673321.pdf.exe, GetMainh-----kHandleEventWrittenEventArgs.csSuspicious method names: .GetMainh_FFFD_FFFD_005B_FFFD_001DkHandleEventWrittenEventArgs.getRemainingMillisecondsEventPipePayloadDecoder
Source: DHL Receipt 004673321.pdf.exe, Low64RuntimeTypeCache.csSuspicious method names: .Low64RuntimeTypeCache.GetMonthJoin4Payload
Source: DHL Receipt 004673321.pdf.exe, BrfalseHtmlDecode.csSuspicious method names: .PayloadGetConsoleFallbackUICulture.ResetAbortSEPHourSuff
Source: DHL Receipt 004673321.pdf.exe, BrfalseHtmlDecode.csSuspicious method names: .PayloadGetConsoleFallbackUICulture.VTDATELIBFLAGFCONTROL
Source: classification engineClassification label: mal68.evad.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2964
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\44ace070-f29e-4278-b446-95c466f4f3abJump to behavior
Source: DHL Receipt 004673321.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: DHL Receipt 004673321.pdf.exeReversingLabs: Detection: 26%
Source: DHL Receipt 004673321.pdf.exeString found in binary or memory: /AddInServer
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeFile read: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe "C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe"
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2964 -s 1000
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: DHL Receipt 004673321.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: DHL Receipt 004673321.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: DHL Receipt 004673321.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\System.Core.pdbl source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERC932.tmp.dmp.4.dr
Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbM3b source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: re.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FC5D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: Microsoft.VisualBasic.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\System.Core.pdb{#S source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\DHL Receipt 004673321.pdf.PDB source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FC5D000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: pC:\Users\user\Desktop\DHL Receipt 004673321.pdf.PDB ` source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2094773845.00000020D40F4000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.pdb}! source: WERC932.tmp.dmp.4.dr
Source: Binary string: DHL Receipt 004673321.pdf.PDB source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2094773845.00000020D40F4000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WERC932.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdbH source: WERC932.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\dll\System.Core.pdbU, source: DHL Receipt 004673321.pdf.exe, 00000000.00000002.2096486114.0000017F6FCBE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdbRSDS source: WERC932.tmp.dmp.4.dr

Data Obfuscation

barindex
Source: DHL Receipt 004673321.pdf.exe, IsReferenceOrContainsReferencesDebuggerBrowsableAttribute.cs.Net Code: PrependDoubleView
Source: DHL Receipt 004673321.pdf.exeStatic PE information: real checksum: 0x12cdabf9 should be: 0x43f9a
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeCode function: 0_2_00007FF848F100BD pushad ; iretd 0_2_00007FF848F100C1

Hooking and other Techniques for Hiding and Protection

barindex
Source: Possible double extension: pdf.exeStatic PE information: DHL Receipt 004673321.pdf.exe
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeMemory allocated: 17F6FDB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeMemory allocated: 17F71830000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeQueries volume information: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Scheduled Task/Job
1
Process Injection
1
Masquerading
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Scheduled Task/Job
2
Virtualization/Sandbox Evasion
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Disable or Modify Tools
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DHL Receipt 004673321.pdf.exe26%ReversingLabsByteCode-MSIL.Trojan.Zilla
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1428356
    Start date and time:2024-04-18 21:18:46 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 16s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:DHL Receipt 004673321.pdf.exe
    Detection:MAL
    Classification:mal68.evad.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 89%
    • Number of executed functions: 12
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target DHL Receipt 004673321.pdf.exe, PID 2964 because it is empty
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: DHL Receipt 004673321.pdf.exe
    TimeTypeDescription
    21:19:41API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):1.0295875964021453
    Encrypted:false
    SSDEEP:192:Gar66Buz3+V0BRZ/3daWB2cSMzuiF2Z24lO8d:b26Yz3/BRZ/3dam2cHzuiF2Y4lO8d
    MD5:F5BBF88231D7407CEC0FF506AF3E5698
    SHA1:3228D63E73A6F92C00C9899FD5D5360065F27238
    SHA-256:6D074BB94418EDF17AA31D71464DAE1EE4318CF40394331C839ED154551643BD
    SHA-512:41EAD827ABB7906F81DD946AFF8C28896A3479EB08544EA70EEA4A8635AB26D97C95A3AA3E2BE36C6AEE547910B8E9BFC77A29692E0F315FA1045692993900F8
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.7.9.4.1.5.7.1.8.9.3.6.9.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.7.9.4.1.5.7.2.4.0.9.3.1.4.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.a.4.8.8.2.7.-.f.7.7.3.-.4.b.b.6.-.b.9.3.5.-.f.8.1.c.6.f.1.4.a.8.e.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.3.2.e.e.f.b.-.1.0.e.7.-.4.1.1.5.-.b.f.c.4.-.8.3.1.f.1.2.4.5.2.0.8.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.D.H.L. .R.e.c.e.i.p.t. .0.0.4.6.7.3.3.2.1...p.d.f...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.n.e.w.a.w.a.q.a.k.i.p.u.r.i.f.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.9.4.-.0.0.0.1.-.0.0.1.4.-.0.b.2.a.-.b.0.5.6.c.5.9.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.9.9.a.d.7.3.1.f.b.3.6.b.4.4.5.2.f.7.3.0.d.a.c.7.9.0.3.1.0.c.5.0.0.0.0.0.0.0.0.!.0.0.0.0.9.f.e.6.4.4.a.8.d.5.2.f.1.5.3.f.e.5.6.8.f.0.3.9.0.e.8.5.6.8.b.1.6.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 16 streams, Thu Apr 18 19:19:32 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):313515
    Entropy (8bit):3.228263323813212
    Encrypted:false
    SSDEEP:1536:AQ/keKY8xgZKe7WIuFlibuXfoyyJ5S2j4Y+Z9jCC8jH/IUt9DFfmXh5+vMBMlkjT:AGdZ7W4McSEk1CCqwUt9+3+vyBoMt+f
    MD5:8EF67AFB887E9BCB37BDD1FC582CB99F
    SHA1:7FCF55C0F1113CE196E863F8E30AB2C8F11A71B1
    SHA-256:1CE3D15248419D385967481237CAA5A1BB37A3B9A3F69A5C59B39E69ED54DC85
    SHA-512:AC3C0F720DAFFE0A5582984EA428A8B97B5A9DA3674468401005FC1B0A15945334EF11FEBCF751A5CFA7817644A39B70EA851CE4147CD1C1D206C610CF8F1F57
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......Dr!f........................l...........$...@...........d............Y..........l.......8...........T...........p'..;............ ..........."..............................................................................eJ.......#......Lw......................T...........Br!f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8668
    Entropy (8bit):3.7000889660134715
    Encrypted:false
    SSDEEP:192:R6l7wVeJO2k6YEIE3s5gmfZSK1LdprT89bywqfVEGm:R6lXJHk6YEb3s5gmfIILkylfVc
    MD5:B7A427038DFE9EC5A134E2766A5D7F91
    SHA1:96F5E55018B7B1B8F66D59C311DCBA451E9943D8
    SHA-256:AB49B919CB13850F9F9E680421608E29B41D4C421FBAE4616E243A50C1409B4B
    SHA-512:5337D4C4DEB01E64CD303350979FA9255D25ED9D2E923323CC46E31D997EA42C86004451EA69F5611E85EB8D58DCAD613C0A4EA862FD0E635386295F7EE64704
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.6.4.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4893
    Entropy (8bit):4.49984558208146
    Encrypted:false
    SSDEEP:48:cvIwWl8zsSJg771I93/sWpW8VY9EYm8M4Jx0PJ2FPMyq8vj0PJ/2amQ+1id:uIjfgI7cF7VGxJcqMWaB2aD0id
    MD5:B825E95B24EA873118A5A6A47B9CFA88
    SHA1:F5C349F6E34E19171DE729ACDED396F5E009BC0C
    SHA-256:8B39A5253F950C2D6C730584CA30ACF3CAAA317C323FDC6226CD28FAAFFAFCF1
    SHA-512:FC79BCF98BC50953CC55C2ADD781B4F864069B706B76795165885FE0B407C07E5FC7114C99BEDD53DD07B4BAD69618CD668AD6BCD711D0CB1F627F614000DAED
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="285742" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.422068370099028
    Encrypted:false
    SSDEEP:6144:JSvfpi6ceLP/9skLmb0OTHWSPHaJG8nAgeMZMMhA2fX4WABlEnNO0uhiTw:AvloTHW+EZMM6DFyU03w
    MD5:26B77F23005D63424C0A76C6A06669DE
    SHA1:F48205C2CF50EEEC3DA1DA73BEE4F6DA7308EDA0
    SHA-256:119FB3E4E20B9E6274DEEBE51D59F7CA901B12C8919C696D8C76BFB08DDEF1AE
    SHA-512:784B39504B32881BE16B0271A836D1864683A36936920C339CAE433F2A1A0F18B79577328F8DFAF65B4A05B709CBDF8C954E35A465C86A3F88A1D20F5A886060
    Malicious:false
    Reputation:low
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.-W.................................................................................................................................................................................................................................................................................................................................................;c........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
    Entropy (8bit):5.288652944742538
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:DHL Receipt 004673321.pdf.exe
    File size:265'728 bytes
    MD5:902c91012912a8aaee6a3d1e43af13af
    SHA1:9fe644a8d52f153fe568f0390e8568b16a0e57c5
    SHA256:46ff258b05454a780553a2bde8d1847aa2b9c804c6ee432ed5180a4bdbb5a4d7
    SHA512:55fdec23c4696a07b3eeda0fb4499d80d1faf4bfea02146f20d45502a04f27fa652e3adef2fb8d49a20c6d2d0b42d9667c8d1c3c0f8c83bfd39d7691035eb8fe
    SSDEEP:3072:gAD1PdfN6FFYYtEWbolKItHrz9jwG1J+U3GmS4skEE9gqaHN6:r1VcA/FrtskcpH
    TLSH:4B447C31B38C4A6BC7AF4379A4B814200BB0E266550BD75F6E9498DDDC87B835E23793
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f.........."...0.8................ ....@...... .......................@............`................................
    Icon Hash:4d925212d9ccb449
    Entrypoint:0x400000
    Entrypoint Section:
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x661FA6AD [Wed Apr 17 10:38:37 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    dec ebp
    pop edx
    nop
    add byte ptr [ebx], al
    add byte ptr [eax], al
    add byte ptr [eax+eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x10a1a.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x31d920x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x2fe380x30000893f216c5fef714a53c35b8f052d35c8False0.4231821695963542data5.995527419537471IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x320000x10a1a0x10c00082d6437fd626e9a421ec880c2e3e25aFalse0.04965893190298507data1.476696808521412IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x3215c0xfcc8Device independent bitmap graphic, 240 x 468 x 8, image size 56160, 256 important colors0.03458400296699221
    RT_GROUP_ICON0x41e240x14data1.15
    RT_VERSION0x41e380x4fcdata0.4717868338557994
    RT_VERSION0x423340x4fcdataEnglishUnited States0.47335423197492166
    RT_MANIFEST0x428300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:21:19:30
    Start date:18/04/2024
    Path:C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\DHL Receipt 004673321.pdf.exe"
    Imagebase:0x17f6fa20000
    File size:265'728 bytes
    MD5 hash:902C91012912A8AAEE6A3D1E43AF13AF
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:21:19:31
    Start date:18/04/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 2964 -s 1000
    Imagebase:0x7ff6fa0c0000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2fa07ff824d6c8786cb2c5d57508042fc113b628e61315cc21ead4405f409a6b
      • Instruction ID: 2de1640053c211d38819f2ca6eb3d4769a511ff33ae4454123bfcab60f022306
      • Opcode Fuzzy Hash: 2fa07ff824d6c8786cb2c5d57508042fc113b628e61315cc21ead4405f409a6b
      • Instruction Fuzzy Hash: 88F15531E1CA894FE759BB2C58562B97BE1FF96350F0801BED48AC71C7DE18AC428395
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID: HAH$HAH$HAH
      • API String ID: 0-2719557456
      • Opcode ID: 028e1c22dab5e2f30e3950c89d17fa5b6ce32bf5b18b1094810d8a99c2d0323c
      • Instruction ID: d6d497fa0c840e28eae299b7a6924df047c8083f658c8a71655df9dce1b0b352
      • Opcode Fuzzy Hash: 028e1c22dab5e2f30e3950c89d17fa5b6ce32bf5b18b1094810d8a99c2d0323c
      • Instruction Fuzzy Hash: 42810431E1CA4A8FE789BB7894552B977D1EF99391F4405BAD40EC32C3DF28AC428345
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID: `H
      • API String ID: 0-3220918559
      • Opcode ID: 28e15554a3b805b5a98b5cd646fb8e12850795767d421ce4a14bf712a6fa1463
      • Instruction ID: e462c3beae2c3165a085579d8a52e5167029ffe5a3cbad17ef42fa968244593a
      • Opcode Fuzzy Hash: 28e15554a3b805b5a98b5cd646fb8e12850795767d421ce4a14bf712a6fa1463
      • Instruction Fuzzy Hash: 2051C623E0E9E24FE3567B6C68112B47BA0EFD2760F1941FBC5888B1D7DA185C498399
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID: `H
      • API String ID: 0-3220918559
      • Opcode ID: 441b748dbca9967289a189de86a210e3ccb6683f0918f3bdc466fa877c90ce01
      • Instruction ID: 37de22ab629417850f13c88aa13bb7ef8b14782ee15b543b7968ff06a2bf0303
      • Opcode Fuzzy Hash: 441b748dbca9967289a189de86a210e3ccb6683f0918f3bdc466fa877c90ce01
      • Instruction Fuzzy Hash: D331A22F71A82A55D2147A6FF8456EA7354EFD13BBB041A37D388CD043991868CF86F4
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID: `H
      • API String ID: 0-3220918559
      • Opcode ID: 45562f42042cde21fefe750859610a7803f8aec420cddf8ee22e291036ce8246
      • Instruction ID: 523f70220a1e545f680a0acf8968bdce233d5b0b0cd9db86ab731e57bd274dda
      • Opcode Fuzzy Hash: 45562f42042cde21fefe750859610a7803f8aec420cddf8ee22e291036ce8246
      • Instruction Fuzzy Hash: 4031D272E0E9965FF25A7B2C64112746AD1EFD27A1F1846BAC5488B0C7DE1C5C098389
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c9f5ef7c269219f1491dd44378301b6b3c3439de85f781a6e44b001161b9b1e7
      • Instruction ID: 9f707c93156fa225670811f1c72ea07ef027e9fd00faef9f275161c705949f36
      • Opcode Fuzzy Hash: c9f5ef7c269219f1491dd44378301b6b3c3439de85f781a6e44b001161b9b1e7
      • Instruction Fuzzy Hash: 0A31A161F1E9965FE785B37C042927A6AD1EF86380F4400B6D44CC72DBDE1D6C458369
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1c774373a0329b9e508980e17985320d8ce06da07cae8694dad18276a1ae6199
      • Instruction ID: 2e913fb4c17d52f5c897bcbc664cf859f01d48a267a69d7ee49b22e0b88d21de
      • Opcode Fuzzy Hash: 1c774373a0329b9e508980e17985320d8ce06da07cae8694dad18276a1ae6199
      • Instruction Fuzzy Hash: 50218E21E1EA9A1FF785B37C08293792AE2EF8A380F4500B6D44CC72E7DE1CAC454365
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f890c04ea1936b1794b762cdfdd2448181ed668419dd79495070d6f5a8e69d5a
      • Instruction ID: 076cd3d589a61e1b883e437f66753737dd663342b9c190896d9a10a66e371dca
      • Opcode Fuzzy Hash: f890c04ea1936b1794b762cdfdd2448181ed668419dd79495070d6f5a8e69d5a
      • Instruction Fuzzy Hash: 6851F031A0DA8D4FEB99EBAC88556A87BE1FF59340F4401BAE00DC72D6DF28AC458745
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68d8f16ce94a4a40bf97c5d215f3c98c1a5e341c70f733a70fc9da664fe4e954
      • Instruction ID: 64c8a68976933056ca3348433281a5c7214184fdda3b6d4563eaa1d76a393b86
      • Opcode Fuzzy Hash: 68d8f16ce94a4a40bf97c5d215f3c98c1a5e341c70f733a70fc9da664fe4e954
      • Instruction Fuzzy Hash: 2D41F532A1D84A0FD788FB3C849557AB791EF99350B0446B9C40ECB2DBDF28AC46C780
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d90e608cdffd70735c16f0c5d8b58b4484ba1ba7fc0d8ed10272764f734ce27f
      • Instruction ID: ad03ba348755e490588e637c87d4f4951d80e85ba0ad3b3583088c3e5129a56d
      • Opcode Fuzzy Hash: d90e608cdffd70735c16f0c5d8b58b4484ba1ba7fc0d8ed10272764f734ce27f
      • Instruction Fuzzy Hash: 8941A231A1D94A4FD788FB38C495A79B792EF95350B0482B9D40DCB2DBDF28AC468784
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 884251ff4588288efc87c9849d1747fb2be7d62cdb1a4df5933b4a7b23bd6ba2
      • Instruction ID: 10fe8ac0a480fb75e0a379fc0a0a06d3af848342ffda0814c07d77c65858a05a
      • Opcode Fuzzy Hash: 884251ff4588288efc87c9849d1747fb2be7d62cdb1a4df5933b4a7b23bd6ba2
      • Instruction Fuzzy Hash: E721D53184E7CA1FDB53ABB488152EA3FE1DF46760F0501EBD448CA093DA6D5D4AC362
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2097381100.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_DHL Receipt 004673321.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8b9e9293be75a970f855eb0bd3ef102352be59a61d8a8ad7820c26303c5fec9d
      • Instruction ID: 5146114130d1d58e57175e6d0eb14f1f11a19d034893a541e126c72b76300866
      • Opcode Fuzzy Hash: 8b9e9293be75a970f855eb0bd3ef102352be59a61d8a8ad7820c26303c5fec9d
      • Instruction Fuzzy Hash: 6C01A43148E2D94FC702AB648C645D97FE4EF8B204B0902EAE4C9CB1A3C65D991BC761
      Uniqueness

      Uniqueness Score: -1.00%