Windows Analysis Report
E3XzKxHCCb.exe

Overview

General Information

Sample name: E3XzKxHCCb.exe
renamed because original name is a hash value
Original sample name: 7f77b237f660c6ef5aa674dbe4d3b38f.exe
Analysis ID: 1429287
MD5: 7f77b237f660c6ef5aa674dbe4d3b38f
SHA1: 5ab81981753086557187a7ae3fd4a3fb4e86b2a1
SHA256: b86c86fa3321ed97a4e5b0346dd482fcb910cbe8e996e46b125db3b5a58f790c
Tags: 32exetrojanXWorm
Infos:

Detection

XWorm
Score: 84
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
AV process strings found (often used to terminate AV products)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: E3XzKxHCCb.exe Avira: detected
Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack Malware Configuration Extractor: Xworm {"C2 url": ["67.213.221.11"], "Port": "2554", "Aes key": "2554", "Install file": "USB.exe", "Version": "XWorm V2.1"}
Source: E3XzKxHCCb.exe ReversingLabs: Detection: 23%
Source: E3XzKxHCCb.exe Virustotal: Detection: 34% Perma Link
Source: E3XzKxHCCb.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.4:49730 version: TLS 1.2

Networking

barindex
Source: Malware configuration extractor URLs: 67.213.221.11
Source: unknown DNS query: name: paste.ee
Source: Joe Sandbox View IP Address: 172.67.187.200 172.67.187.200
Source: Joe Sandbox View IP Address: 172.67.187.200 172.67.187.200
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /r/tC4AK HTTP/1.1User-Agent: HimanenHost: paste.ee
Source: unknown DNS traffic detected: queries for: paste.ee
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://exmple.com/Uploader.php
Source: Amcache.hve.3.dr String found in binary or memory: http://upx.sf.net
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://analytics.paste.ee
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://analytics.paste.ee;
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdnjs.cloudflare.com
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdnjs.cloudflare.com;
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://fonts.googleapis.com
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://fonts.gstatic.com;
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://paste.ee/
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://paste.ee/r/tC4AK
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://paste.ee/r/tC4AKD_
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://paste.ee/r/tC4AKp
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.gravatar.com
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://themes.googleusercontent.com
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com;
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown HTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196
Source: E3XzKxHCCb.exe, 00000000.00000000.1708874802.0000000000709000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs E3XzKxHCCb.exe
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameServicePack.exe4 vs E3XzKxHCCb.exe
Source: E3XzKxHCCb.exe Binary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs E3XzKxHCCb.exe
Source: E3XzKxHCCb.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, Helper.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, Helper.cs Cryptographic APIs: 'TransformFinalBlock'
Source: classification engine Classification label: mal84.troj.evad.winEXE@2/6@1/1
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Mutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6756
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe File created: C:\Users\user\AppData\Local\Temp\~DF119D786586100221.TMP Jump to behavior
Source: E3XzKxHCCb.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: E3XzKxHCCb.exe ReversingLabs: Detection: 23%
Source: E3XzKxHCCb.exe Virustotal: Detection: 34%
Source: unknown Process created: C:\Users\user\Desktop\E3XzKxHCCb.exe "C:\Users\user\Desktop\E3XzKxHCCb.exe"
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: msvbvm60.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: vb6zz.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: asycfilt.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: E3XzKxHCCb.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: E3XzKxHCCb.exe Static file information: File size 3162112 > 1048576
Source: E3XzKxHCCb.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x26a000

Data Obfuscation

barindex
Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, Helper.cs .Net Code: Plugin System.Reflection.Assembly.Load(byte[])
Source: E3XzKxHCCb.exe Static PE information: real checksum: 0x3095ab should be: 0x313a04
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_004058FA push ds; ret 0_2_00405902
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_004038AC push ds; iretd 0_2_00403902
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_00403DD1 push ds; iretd 0_2_00403DD2
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_004079EA push ds; retf 0_2_00407A46
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_00409A1E push ds; iretd 0_2_00409A2F
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_00406F17 push dword ptr [ebp+7Ch]; ret 0_2_00406F1A
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Code function: 0_2_00407B20 push ds; ret 0_2_00407B2A
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\E3XzKxHCCb.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: Amcache.hve.3.dr Binary or memory string: VMware
Source: Amcache.hve.3.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.3.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.3.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000992000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: Amcache.hve.3.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.dr Binary or memory string: vmci.sys
Source: Amcache.hve.3.dr Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.3.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.dr Binary or memory string: VMware20,1
Source: Amcache.hve.3.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWH
Source: Amcache.hve.3.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.dr Binary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.3.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.dr Binary or memory string: MsMpEng.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: 0.2.E3XzKxHCCb.exe.94d318.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: E3XzKxHCCb.exe PID: 6756, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 0.2.E3XzKxHCCb.exe.94d318.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: E3XzKxHCCb.exe PID: 6756, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs