Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8EuQJcy1hy.exe

Overview

General Information

Sample name:8EuQJcy1hy.exe
renamed because original name is a hash value
Original sample name:058c1919d7fed5ccc37835e2eb233669.bin.exe
Analysis ID:1430635
MD5:058c1919d7fed5ccc37835e2eb233669
SHA1:31beec62d53cd3e863d576530f8451c464b0c178
SHA256:3fe5bc0c1fc6b9ecef57829e18f8c8f0bcb9173a9ad8e167138389d4eced835c
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

  • System is w10x64
  • 8EuQJcy1hy.exe (PID: 5236 cmdline: "C:\Users\user\Desktop\8EuQJcy1hy.exe" MD5: 058C1919D7FED5CCC37835E2EB233669)
    • WerFault.exe (PID: 6500 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 8EuQJcy1hy.exeAvira: detected
Source: 8EuQJcy1hy.exeReversingLabs: Detection: 65%
Source: 8EuQJcy1hy.exeJoe Sandbox ML: detected
Source: 8EuQJcy1hy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\8EuQJcy1hy.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 224
Source: 8EuQJcy1hy.exeStatic PE information: No import functions for PE file found
Source: 8EuQJcy1hy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5236
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4da0e477-2d59-4692-a3ea-540b0d4ca010Jump to behavior
Source: C:\Users\user\Desktop\8EuQJcy1hy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 8EuQJcy1hy.exeReversingLabs: Detection: 65%
Source: unknownProcess created: C:\Users\user\Desktop\8EuQJcy1hy.exe "C:\Users\user\Desktop\8EuQJcy1hy.exe"
Source: C:\Users\user\Desktop\8EuQJcy1hy.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 224
Source: C:\Users\user\Desktop\8EuQJcy1hy.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .rsv
Source: 8EuQJcy1hy.exeStatic PE information: section name: .edalev
Source: 8EuQJcy1hy.exeStatic PE information: section name: .jgn
Source: 8EuQJcy1hy.exeStatic PE information: section name: .ivoj
Source: 8EuQJcy1hy.exeStatic PE information: section name: .rsv
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\8EuQJcy1hy.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\8EuQJcy1hy.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
8EuQJcy1hy.exe66%ReversingLabsWin32.Trojan.Zeus
8EuQJcy1hy.exe100%AviraTR/Patched.Ren.Gen
8EuQJcy1hy.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430635
    Start date and time:2024-04-24 01:21:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 56s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:8EuQJcy1hy.exe
    renamed because original name is a hash value
    Original Sample Name:058c1919d7fed5ccc37835e2eb233669.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.20
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 8EuQJcy1hy.exe, PID 5236 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: 8EuQJcy1hy.exe
    TimeTypeDescription
    01:22:03API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6332633064467185
    Encrypted:false
    SSDEEP:96:aXFBSMTjs8hdL1yDf0QXIDcQzc6CmcE1cw3Cv+HbHg6ZAX/d5FMT2SlPkpXmTATm:I+MTjLM0NXfvjEzuiFjZ24IO8f
    MD5:1D189DDC4DB8ACA0BF3EEE9708BECC45
    SHA1:84D2455DCEEDF2C0AB3FFD9BF4CEB71C822B1EC9
    SHA-256:AB64D7A4BFE300A8DBADF555698BEFBA0C1D65FAF34528F616909A2914E507FA
    SHA-512:435BA57964078A37316588FE387A38A6B2DD3184446EE3EA3C3EA4925B97C5A1A766BF37C60B9167C10CEC5C0E3A1ACBEBC4AA29DF2274118569F4F562B6EE01
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.8.8.1.1.2.9.0.6.7.5.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.8.8.1.1.3.1.8.7.9.9.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.1.3.a.f.5.c.0.-.1.5.4.8.-.4.b.8.8.-.b.a.6.f.-.2.0.e.e.b.e.5.b.0.7.a.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.a.f.5.f.0.7.-.9.4.f.4.-.4.c.d.f.-.9.5.d.d.-.a.1.3.b.c.0.b.8.1.c.8.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.8.E.u.Q.J.c.y.1.h.y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.7.4.-.0.0.0.1.-.0.0.1.4.-.6.8.a.9.-.2.b.0.6.d.5.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.c.4.6.d.3.0.9.9.8.b.1.7.1.b.a.a.f.0.f.6.0.a.b.8.1.4.2.9.6.a.a.0.0.0.0.f.f.f.f.!.0.0.0.0.3.1.b.e.e.c.6.2.d.5.3.c.d.3.e.8.6.3.d.5.7.6.5.3.0.f.8.4.5.1.c.4.6.4.b.0.c.1.7.8.!.8.E.u.Q.J.c.y.1.h.y...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Tue Apr 23 23:21:52 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):19460
    Entropy (8bit):2.0235850406308753
    Encrypted:false
    SSDEEP:96:5v8YJE3Epf6CQRtWQ0Wi7n48OsJVc1OcWI9YIW6PIZLSU:aYBy1WsO/OIuOPLS
    MD5:0B3D78D9F66587C0D4720A7A529233E8
    SHA1:E3233A283D98D0540AA00F05DBB68F22D77DB1DC
    SHA-256:9B891FCE0A6B8724733B79CD0CE3540C8995B553C1F1CD810C2444F43AFD9B1C
    SHA-512:B0D94E613908F1BF64C62AA2EBF59BD8E59D22AEE824C955D0441823077FB8DA4E6C62629051C0E06DBD105509BC37633D914F1B600197252B62CD25B38B58EF
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........B(f............4...............<.......d...............T.......8...........T...........H....B......................................................................................................eJ......L.......GenuineIntel............T.......t....B(f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8290
    Entropy (8bit):3.697521103424396
    Encrypted:false
    SSDEEP:192:R6l7wVeJPac6nfe16Y9KSU9HIpcgmf7KdJPWOjpxM89bHOsf5tm:R6lXJPJ6nfk6YwSU9mcgmf7KdJPWOlHU
    MD5:17824B8A0B4958507AC8BB1627327D42
    SHA1:71A68F7A545BD25AA83FB7E31030B1C6D9726295
    SHA-256:A179E306135AB77130399CC9D3D1B202A9302667D6B3983187BC7F6D51168A55
    SHA-512:895423F13530BC4B78C7EF7161F21C9DAA5929A4E8C279403E9573D1EC97E8DA53B7452C98DBD41AD109E09854E01B89661CC1013F1460FA5D6FE6BD6A86EA59
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.3.6.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4585
    Entropy (8bit):4.465871430618858
    Encrypted:false
    SSDEEP:48:cvIwWl8zs3Jg77aI9CCSWpW8VYxYm8M4J4KFL+q8Zs+Tkd:uIjfZI7MCz7VtJLP+Tkd
    MD5:DDA45B3092E78C9195AC3DDD0C24BFE6
    SHA1:331454F1BEDED3DAE82304C2D6B04D232B58ECC7
    SHA-256:BACE9EF0EC42EFAF461185E8DD085BF7E18172C990263707E9D45B56B731370A
    SHA-512:6F8074808B91529730CA2B0A04BE3813AA05B4DDF3620366E8036962752DDBF0165070F3CF13ED35F92521091A03EEC8911A702014E1577ACEBB6D34B6DDC54E
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293184" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.465448207298942
    Encrypted:false
    SSDEEP:6144:eIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN2dwBCswSbPr:zXD94+WlLZMM6YFHE+Pr
    MD5:0B014314C1227DD8A91D5D7FFF6DA847
    SHA1:67857D7E4E839EAF343659252F4C1F0B6A47DCA4
    SHA-256:60A55F83A42DD8F40AE3B9B68808E82F1B20B384CBC72FFDED9B2B9BFC31CD3E
    SHA-512:74C3E8BC818D81A5D4A1A0414BDC1397EF3B0A6AC429E698136ABE1F9209B1E6AC6F61512BE4593E7F267E4F95D9C86B02949B2F9008D5EC591E8C48941761CF
    Malicious:false
    Reputation:low
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..]................................................................................................................................................................................................................................................................................................................................................m.K2........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.004058507149713
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.98%
    • DOS Executable Generic (2002/1) 0.02%
    File name:8EuQJcy1hy.exe
    File size:135'168 bytes
    MD5:058c1919d7fed5ccc37835e2eb233669
    SHA1:31beec62d53cd3e863d576530f8451c464b0c178
    SHA256:3fe5bc0c1fc6b9ecef57829e18f8c8f0bcb9173a9ad8e167138389d4eced835c
    SHA512:6b602ce1d59f3a1d4b0cb185054df4e60cad2607ccc9a2e3775dcfea38d8bdb8146ff1597e0727eb6750bec3b16be1e83d35ae63639d05833a4a25b117f1ae5c
    SSDEEP:1536:7YVvnSKeS8rc/S6+YJ+e3aLs5ahMXsryupdBDUVwoEKeS8rc/S6+YJ+e3aLs5aho:VS+cKzNg56BryuS+cKzNg56Bry
    TLSH:CDD39F5A39E1C076D9910076272BBB2377FFD83211699C87CB340ED82D72957D62EA0B
    File Content Preview:MZ................6.`...`...`....O..`....#..................|...^}f}(@.G.L.O.T.V.\.^.h..'.#l!.!s.. ^}f}(@..NzV.Q.S.FW5.;`...PE..L....c.<.....................&......d ... ........@.......................................................................... .
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x412064
    Entrypoint Section:.rsv
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3C8D630D [Tue Mar 12 02:08:13 2002 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    fist dword ptr [ebx-73h]
    inc ebp
    hlt
    push eax
    mov eax, dword ptr [0040EBB4h]
    push ebx
    push 00000001h
    push ebx
    push ebx
    push ebx
    push dword ptr [eax+40h]
    push esi
    call dword ptr [0040EC68h]
    test eax, eax
    jne 00007F493500A31Ch
    lea eax, dword ptr [ebp-08h]
    push eax
    lea eax, dword ptr [ebp-0000027Ch]
    push eax
    lea eax, dword ptr [ebp-10h]
    push eax
    mov eax, dword ptr [0040EBB4h]
    push ebx
    push dword ptr [eax+44h]
    push dword ptr [ebp-0Ch]
    call dword ptr [0040EC64h]
    test eax, eax
    jne 00007F493500A2E2h
    cmp dword ptr [ebp-10h], 01h
    jne 00007F493500A2DCh
    cmp dword ptr [ebp-08h], 04h
    mov byte ptr [ebp-01h], 00000001h
    jnbe 00007F493500A2D5h
    mov byte ptr [ebp-01h], bl
    push dword ptr [ebp-0Ch]
    call dword ptr [0040EC6Ch]
    cmp byte ptr [ebp-01h], bl
    jne 00007F493500A37Eh
    lea eax, dword ptr [ebp-08h]
    push eax
    lea eax, dword ptr [ebp-74h]
    push eax
    mov dword ptr [ebp-08h], 00000031h
    call dword ptr [0040EF10h]
    test eax, eax
    jne 00007F493500A2E4h
    mov eax, dword ptr [0040EBB4h]
    push dword ptr [eax+64h]
    lea eax, dword ptr [ebp-74h]
    push eax
    call dword ptr [0040EE10h]
    call dword ptr [0040EE58h]
    push eax
    lea eax, dword ptr [ebp-74h]
    push eax
    mov eax, dword ptr [0040EBB4h]
    push dword ptr [eax+68h]
    lea eax, dword ptr [ebp-0000027Ch]
    push 00000103h
    push eax
    call dword ptr [0040ED10h]
    add esp, 14h
    push ebx
    lea eax, dword ptr [ebp-0Ch]
    push eax
    mov eax, dword ptr [0040EBB4h]
    push ebx
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x120100x5e.rsv
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .edalev0x10000xcf150x84009614957fc53cfad80da65cd77cb675f2False0.5916489109848485data6.37298705393981IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .jgn0xe0000x13d80x400574d08233749aae61e051592386126e0False0.662109375data5.8342093709183835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .ivoj0x100000x10f80x12003e63960f76126339a9cf2e3d46666542False0.6584201388888888data6.351982317729404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsv0x120000xf0000x200726a801d301c13f87c44bb0d26b439a4False0.748046875data5.577902114362882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:01:21:52
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\8EuQJcy1hy.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\8EuQJcy1hy.exe"
    Imagebase:0x400000
    File size:135'168 bytes
    MD5 hash:058C1919D7FED5CCC37835E2EB233669
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:3
    Start time:01:21:52
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 224
    Imagebase:0xf90000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly