Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
40fnGcLVnT.exe

Overview

General Information

Sample name:40fnGcLVnT.exe
renamed because original name is a hash value
Original sample name:a38d421aba3f763eb68fad250f2e2022.bin.exe
Analysis ID:1430641
MD5:a38d421aba3f763eb68fad250f2e2022
SHA1:14b2a9f476da48a189a715e43e3af2cfe423fe14
SHA256:510e6c54043714ed28397bb5998cb93bfaf2dee037eb93720475c5d37c04e768
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 40fnGcLVnT.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\40fnGcLVnT.exe" MD5: A38D421ABA3F763EB68FAD250F2E2022)
    • WerFault.exe (PID: 7556 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 332 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 40fnGcLVnT.exeAvira: detected
Source: 40fnGcLVnT.exeReversingLabs: Detection: 92%
Source: 40fnGcLVnT.exeJoe Sandbox ML: detected
Source: 40fnGcLVnT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\40fnGcLVnT.exeCode function: 0_2_0040917F0_2_0040917F
Source: C:\Users\user\Desktop\40fnGcLVnT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 332
Source: 40fnGcLVnT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7416
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3ee0f089-f46c-407e-abb5-85a294a082f6Jump to behavior
Source: C:\Users\user\Desktop\40fnGcLVnT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 40fnGcLVnT.exeReversingLabs: Detection: 92%
Source: unknownProcess created: C:\Users\user\Desktop\40fnGcLVnT.exe "C:\Users\user\Desktop\40fnGcLVnT.exe"
Source: C:\Users\user\Desktop\40fnGcLVnT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 332
Source: C:\Users\user\Desktop\40fnGcLVnT.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .jix
Source: 40fnGcLVnT.exeStatic PE information: section name: .ipiral
Source: 40fnGcLVnT.exeStatic PE information: section name: .udenwt
Source: 40fnGcLVnT.exeStatic PE information: section name: .zmzcv
Source: 40fnGcLVnT.exeStatic PE information: section name: .jix
Source: C:\Users\user\Desktop\40fnGcLVnT.exeCode function: 0_2_004131FE push cs; ret 0_2_00413204
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\40fnGcLVnT.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
40fnGcLVnT.exe92%ReversingLabsWin32.Trojan.Zeus
40fnGcLVnT.exe100%AviraTR/Crypt.XPACK.Gen
40fnGcLVnT.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430641
    Start date and time:2024-04-24 01:26:09 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 52s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:15
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:40fnGcLVnT.exe
    renamed because original name is a hash value
    Original Sample Name:a38d421aba3f763eb68fad250f2e2022.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.20
    • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 40fnGcLVnT.exe, PID 7416 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: 40fnGcLVnT.exe
    TimeTypeDescription
    01:27:00API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6895856768642237
    Encrypted:false
    SSDEEP:96:hUZFaDT9rWQ6s1hoH7NfZQXIDcQvc6QcEVcw3cE/3+HbHg/LZHLnxZOyWZAX/d5d:KADTkQ640BU/QjvqzuiF8Z24IO8u
    MD5:F918FCF5D21F09E1A2C8148C0C0BCE46
    SHA1:E53E6724B2A02B6E4FEE59F6324FB03F883938E9
    SHA-256:4A0F6338E3FFACAD164D0F4DD5E36F2CA2B164D2B4612B5BE8F3651CF7DE41A2
    SHA-512:07F0092A6B3C8C91F0978D4BFC1FFB8776CB9FA06A2482E3A72A064A7B451A952C6F78A008565B84CE62EFDD71845F86E6A41D32BEEE09235BFA99B6ECED466A
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.8.8.4.1.5.1.7.0.9.6.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.8.8.4.1.5.4.6.7.8.3.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.8.5.7.5.7.e.-.a.2.c.2.-.4.3.b.4.-.9.e.d.3.-.8.3.3.e.2.f.2.d.d.6.5.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.6.c.5.6.7.0.3.-.2.a.a.2.-.4.d.6.b.-.8.d.c.9.-.e.2.6.5.9.b.d.5.4.3.9.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.4.0.f.n.G.c.L.V.n.T...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.f.8.-.0.0.0.1.-.0.0.1.3.-.4.f.3.3.-.9.7.b.9.d.5.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.a.c.5.3.8.a.1.1.4.5.0.2.9.3.d.3.9.7.8.4.b.8.2.1.e.7.6.2.1.4.d.0.0.0.0.f.f.f.f.!.0.0.0.0.1.4.b.2.a.9.f.4.7.6.d.a.4.8.a.1.8.9.a.7.1.5.e.4.3.e.3.a.f.2.c.f.e.4.2.3.f.e.1.4.!.4.0.f.n.G.c.L.V.n.T...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Tue Apr 23 23:26:55 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):32510
    Entropy (8bit):1.8504685532200764
    Encrypted:false
    SSDEEP:192:OAcIiaMiUO28DPgAgXPrgkFgYZIjT/HdlprKtJr/G:DLigpr0P5ZcTEJ
    MD5:DD8B7EDFAA157019C1736158BCE101EB
    SHA1:D2ED8D1D9BA554BBF93FCF46C3233CA29CF7E140
    SHA-256:640BF74F75C689AFE69B6AE6955D278494C7E23129BB1E5DA41198CAEA3919D0
    SHA-512:42814F25C14DFAFF43DAF533EE624E2524C288A2DF744E1B52FA057B9D66D809CE21A5E7FAFEB2202CAE4337966DDC8F63B3C8104B50BB57E996314AA59CC2B3
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........C(f....................................................T.......8...........T...............~q......................t...............................................................................eJ..............GenuineIntel............T............C(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8302
    Entropy (8bit):3.6962065808054536
    Encrypted:false
    SSDEEP:192:R6l7wVeJ9c6jL6YWJSU9gJjgmfo8prs89bWZsfxzSm:R6lXJG6n6YYSU9QgmfogWyfx3
    MD5:36BA4B195DB3BCD71C4903542622FD81
    SHA1:F8987395D85582727C60861725A993F3558C9807
    SHA-256:A46F15AB9E6CC98A58B73BC81188DF251EC876A24D33A734F6CEAD94037857B6
    SHA-512:D57521AC8EEA273330F6FF2329FA33841DA97406855C17FC7B671EAAA5689242812B68128B191E24F96E4D6E054F5475A6F27E1BF86FD730E8490AED811F9605
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.1.6.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.4588751533219595
    Encrypted:false
    SSDEEP:48:cvIwWl8zstiJg77aI9DYWpW8VYPYm8M4JNRvAAeF6+q8kuWNnEISzEzhdd:uIjfqI79R7V/JJdRnzsChdd
    MD5:9BC6C78301B7F5DADAD314D093B86A15
    SHA1:833E3A5FC23478BB717660E9874338A1249A6ED0
    SHA-256:5428AFD668FB2561FD7C997560723BD0D73ABE2B40D86F38D4BF93F09F3BC19E
    SHA-512:0BA4782E690110014BBDB41BD154D7FA8A6FD5CD7543C0D14D71C174C97DE03B05900E413E3CAFFA2E523037AAB78C5FC662CEEDEA2E3CBE98940CE809C663C6
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293189" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.295962550222379
    Encrypted:false
    SSDEEP:6144:i41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+/bmBMZJh1Vji:L1/YCW2AoQ0NipbwMHrV2
    MD5:05079A0649E3A1DF6BFC3D29E58DFC76
    SHA1:32A3EF47A28D01AE69F8ED320971457A5BD3E0B0
    SHA-256:171CF0496E1D31693D71DCFD57833C332E08052589C3AA107B75078889944FDB
    SHA-512:B28119CC8E375119A535B8D0722FFCF9594013652183806580CF01B15F93F291743AF58019A269F785B6FF5B6103A870246F79ED2AFEA64119DF38F5547BD085
    Malicious:false
    Reputation:low
    Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr..................................................................................................................................................................................................................................................................................................................................................I..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.769281959927522
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.98%
    • DOS Executable Generic (2002/1) 0.02%
    File name:40fnGcLVnT.exe
    File size:41'984 bytes
    MD5:a38d421aba3f763eb68fad250f2e2022
    SHA1:14b2a9f476da48a189a715e43e3af2cfe423fe14
    SHA256:510e6c54043714ed28397bb5998cb93bfaf2dee037eb93720475c5d37c04e768
    SHA512:fc16f3d6b9fb4d34ea3917874869812e0b4a001e05fe67fe5109aef9be0f774949dd1afb5171702743ba61ac07f06e547b26a16c500452beb79a30604c8cd8c6
    SSDEEP:768:NY+MLvRwHqZZpqtA07r3eLvuFsPCkVqEdpfaSNaR7RNA+cnvob7y:NY5vRPPpqtp7rujuFZg3NidNA+sO+
    TLSH:E0138DD77B91C8F2DC91403022699BAB1BAFDD3310B4DD87C3684D94A4615E3A53BE2B
    File Content Preview:MZ......GOLD......6.@w..................."......................^}f}(@.M.G.R.R.Y.`.\1.8./...$.....^}f}(@..NzV.Q.S.FW5.;`.C..D..)H.....f......G...;...ova...ud...h."]...103*E......2-<.....:..7.i.+B.._..P.J....9.{R.PE..L......:.....................&......i0.
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x413069
    Entrypoint Section:.jix
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3A9211D1 [Tue Feb 20 06:42:25 2001 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:d0350768b13c4f100c12a35f80cc149b
    Instruction
    xor ebx, ebx
    mov eax, 00000000h
    mov ebx, edi
    mov ebx, 00413097h
    xor edi, ebx
    mov edi, 004132A5h
    inc byte ptr [ebx]
    inc ebx
    xor edx, edx
    cmp ebx, 004132A5h
    jne 00007F2A3545BBD5h
    inc eax
    xor ecx, ecx
    cmp eax, 000193D3h
    jne 00007F2A3545BBBDh
    xor ebx, edi
    nop
    nop
    nop
    mov eax, dword ptr [esp]
    xor ax, ax
    push 0000FFFFh
    push 5D7574B6h
    push 71E40722h
    push 15F8EF80h
    push D66358ECh
    mov edi, esp
    cmp word ptr [eax], 5A4Dh
    jne 00007F2A3545BBF5h
    mov edx, dword ptr [eax+3Ch]
    cmp edx, 00001000h
    jnbe 00007F2A3545BBEAh
    cmp word ptr [eax+edx], 4550h
    je 00007F2A3545BBE9h
    sub eax, 00010000h
    jmp 00007F2A3545BBC1h
    push eax
    mov esi, dword ptr [eax+edx+78h]
    add esi, eax
    add esi, 18h
    xchg eax, ebx
    lodsd
    push eax
    lodsd
    push eax
    lodsd
    push eax
    add eax, ebx
    push eax
    lodsd
    push eax
    mov ebp, esp
    mov ecx, dword ptr [ebp+10h]
    xor edx, edx
    mov esi, dword ptr [ebp+04h]
    mov esi, dword ptr [esi]
    add esi, ebx
    xor eax, eax
    push eax
    ror eax, 07h
    xor dword ptr [esp], eax
    lodsb
    test al, al
    jne 00007F2A3545BBD7h
    pop eax
    push edi
    cmp dword ptr [edi], 0000FFFFh
    je 00007F2A3545BBEBh
    cmp eax, dword ptr [edi]
    je 00007F2A3545BBF1h
    add edi, 04h
    jmp 00007F2A3545BBD1h
    pop edi
    add dword ptr [ebp+04h], 04h
    inc edx
    loop 00007F2A3545BBB2h
    jmp 00007F2A3545BC0Eh
    shl edx, 1
    mov ecx, dword ptr [ebp+00h]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x130100x59.jix
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1104.zmzcv
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .ipiral0x10000xd22f0x860012f87761c394d2d3baafde5b534f53e1False0.6440939832089553data6.717141254714956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .udenwt0xf0000x12f00x400afc1f0ed384b4d98a9d7f5a7703ea067False0.4130859375data3.130413227920548IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .zmzcv0x110000x11320x1200a6613f583383f3c846a5885ae5a7e761False0.7955729166666666data6.554561442928154IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .jix0x130000xf0000x400de0ef23470b0a9023ea9096c706f5737False0.814453125data6.257609651750199IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    DLLImport
    shell32.dllSHBrowseForFolderW
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:01:26:53
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\40fnGcLVnT.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\40fnGcLVnT.exe"
    Imagebase:0x400000
    File size:41'984 bytes
    MD5 hash:A38D421ABA3F763EB68FAD250F2E2022
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:01:26:55
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 332
    Imagebase:0xdc0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.1279931698.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1279909542.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1279961300.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1279982704.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1280004561.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_40fnGcLVnT.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: 6f5802e07bbc3c424da5e7aa6bc631302ca87ac7e6e68335853c457c30233c28
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: D2818232D0552ADBDF14CE98C5406ADB7B1EB85324F1646AAEC52BB3C2C338AD41DBC5
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1279931698.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1279909542.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1279961300.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1279982704.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1280004561.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_40fnGcLVnT.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 9b34270a664e851db661ae9b88e04d0fe1d9f3e3c591dec6b7f53e0b42e0f9d6
      • Instruction ID: ab5799ef121868712fc586a9d89f99419b160e9a89a5c5c017d1b61b2be64f6e
      • Opcode Fuzzy Hash: 9b34270a664e851db661ae9b88e04d0fe1d9f3e3c591dec6b7f53e0b42e0f9d6
      • Instruction Fuzzy Hash: 61D1F7B1D48305BAFF206B658D4AFAF3EA8AF10354F14403BF904B52D2EA7D6941875E
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1279931698.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1279909542.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1279961300.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1279982704.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1280004561.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_40fnGcLVnT.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: f13d0f4e88725a3b3216f51f8c81c91b2420667f25c16ab4efc4eb2710b1c6f7
      • Instruction ID: 1b41e17e4dbefe1f4d12e0c69825b1aadfe6d703c4a31380853e5ea9c622e72c
      • Opcode Fuzzy Hash: f13d0f4e88725a3b3216f51f8c81c91b2420667f25c16ab4efc4eb2710b1c6f7
      • Instruction Fuzzy Hash: 9E51CFB2500205AADB01ABA5DD46EFB37ACAF59314B04093FF991F31D2EA7895048B68
      Uniqueness

      Uniqueness Score: -1.00%