Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8qM4hI4CL6.exe

Overview

General Information

Sample name:8qM4hI4CL6.exe
renamed because original name is a hash value
Original sample name:da54b8b040bfa5ea43fb84c2d914495e.bin.exe
Analysis ID:1430643
MD5:da54b8b040bfa5ea43fb84c2d914495e
SHA1:945772b1f9604bdf998979ec97a43480694a0dc7
SHA256:b6c2b60ae59ecefbfb43747a05d48a58fbd75dee7b094f9e61c694a6f7c864db
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 8qM4hI4CL6.exe (PID: 7108 cmdline: "C:\Users\user\Desktop\8qM4hI4CL6.exe" MD5: DA54B8B040BFA5EA43FB84C2D914495E)
    • WerFault.exe (PID: 5936 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 332 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 8qM4hI4CL6.exeAvira: detected
Source: 8qM4hI4CL6.exeReversingLabs: Detection: 92%
Source: 8qM4hI4CL6.exeJoe Sandbox ML: detected
Source: 8qM4hI4CL6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeCode function: 0_2_004092590_2_00409259
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 332
Source: 8qM4hI4CL6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7108
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\9150cea4-cedb-4a0c-b1f8-cd357932e4fdJump to behavior
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 8qM4hI4CL6.exeReversingLabs: Detection: 92%
Source: unknownProcess created: C:\Users\user\Desktop\8qM4hI4CL6.exe "C:\Users\user\Desktop\8qM4hI4CL6.exe"
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 332
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .hap
Source: 8qM4hI4CL6.exeStatic PE information: section name: .vqr
Source: 8qM4hI4CL6.exeStatic PE information: section name: .lsp
Source: 8qM4hI4CL6.exeStatic PE information: section name: .hen
Source: 8qM4hI4CL6.exeStatic PE information: section name: .hap
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeCode function: 0_2_0041327C push ebx; iretd 0_2_0041327D
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\8qM4hI4CL6.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
8qM4hI4CL6.exe92%ReversingLabsWin32.Trojan.Zeus
8qM4hI4CL6.exe100%AviraTR/Crypt.XPACK.Gen
8qM4hI4CL6.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430643
    Start date and time:2024-04-24 01:28:11 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 2s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:8qM4hI4CL6.exe
    renamed because original name is a hash value
    Original Sample Name:da54b8b040bfa5ea43fb84c2d914495e.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.182.143.212
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 8qM4hI4CL6.exe, PID 7108 because there are no executed function
    • VT rate limit hit for: 8qM4hI4CL6.exe
    TimeTypeDescription
    01:29:04API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6926614684809881
    Encrypted:false
    SSDEEP:96:JvwF96yyausBhhz7Mf3BQXIDcQvc6QcEVcw3cE/X+HbHg/LZHLnxZOyWZAX/d5Fi:i3//upm0BU/wjvqzuiF3Z24IO8L
    MD5:0CF4D681E2EAC81780C534C830FB49D4
    SHA1:7B63F08F0274E36BB793A95894228371F79CE30D
    SHA-256:D804BB7C425A3D8B26809AA091ED3BF26975AFF9A7C8781C6AEA0F151782F1CD
    SHA-512:24E51D38D3C5ECBB1B9967D4B10EED0F97A1993AA91FF1042BE78F1DF213EDB70AA2E2B4D00273DFC696B1C62F2FF6B17CDA3A348F8F0E5B783245CB5DDF08D7
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.8.8.5.4.2.1.2.7.6.4.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.8.8.5.4.2.5.1.8.2.7.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.5.d.b.9.b.8.2.-.1.f.7.6.-.4.f.f.e.-.9.b.a.3.-.d.b.a.7.c.f.1.c.e.5.0.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.b.3.7.7.0.b.b.-.5.6.0.7.-.4.4.8.2.-.8.1.9.c.-.0.2.4.6.e.f.a.1.6.d.c.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.8.q.M.4.h.I.4.C.L.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.c.4.-.0.0.0.1.-.0.0.1.5.-.9.9.b.2.-.f.c.0.5.d.6.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.0.6.4.4.0.2.0.c.9.a.5.8.4.c.1.2.4.e.d.3.6.6.8.e.4.3.a.9.c.6.3.0.0.0.0.f.f.f.f.!.0.0.0.0.9.4.5.7.7.2.b.1.f.9.6.0.4.b.d.f.9.9.8.9.7.9.e.c.9.7.a.4.3.4.8.0.6.9.4.a.0.d.c.7.!.8.q.M.4.h.I.4.C.L.6...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Tue Apr 23 23:29:02 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):32522
    Entropy (8bit):1.8703854314950554
    Encrypted:false
    SSDEEP:96:5jn8jE3bwWlq9W6de2v6NFLFWi7WDuz7GzXyeMQNW732YrKVkjS68LWx4Wqx9avn:W4wWlUC8OPGTAQNiG2t5JXznG9IhZK9
    MD5:028A3DE06E9B2CF30D091C02C61FF6D6
    SHA1:C1E22E25BA55B5872163F0306C30996DE6E439EC
    SHA-256:7ADF7A8BA45F80E49AD5B5508167F76D90607EB0C14E82ADF026B17B80E91671
    SHA-512:AD6AA5EAEE241208EBE91BB31419B7ABAC90EA7FC0343E261B1F24B174E7C709DEE90145C603CC10EF6F4EA11DE1F1B84D91A3B6F751BBAD20F22BB3026F928F
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......>D(f....................................................T.......8...........T................q......................t...............................................................................eJ..............GenuineIntel............T...........=D(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8290
    Entropy (8bit):3.698653439373486
    Encrypted:false
    SSDEEP:192:R6l7wVeJr66GB6Y2DMSUzSgmfwfpr089bzqsfOyRm:R6lXJm6+6YBSUzSgmfwDzJfO9
    MD5:19C5A7C5F04B6047DE74166A9F21E1FD
    SHA1:EE9A31F29172F9EF6B1FEA3DA4A6A09125BDD3E4
    SHA-256:83127CDEBE6B9146187CCD0857D205FC25F42A86F3B4DA21449F349F093CD4C2
    SHA-512:35AFF1BB0DD1DCF09770673A71FC32636F21B43E6C02C9CC23FFC32AD097A010074F37C99B9BF4709458E917FEE0FB4028B78CF390827B11D98EC146EFAB5EFF
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.0.8.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.475458002122468
    Encrypted:false
    SSDEEP:48:cvIwWl8zspJg77aI9DIWpW8VYbWYm8M4JGyqFH+q8gNvlGrApEd:uIjf7I7Jh7VsfJvU/vlGspEd
    MD5:0BA02D382161C6E6F517A54E33C5EB84
    SHA1:CE830BF693290A5B825093C114940B102ABD91E6
    SHA-256:B3217FE238EE77F5D74225F57A2D17624B2CAB3EF91542ED459B4B0C6C32A217
    SHA-512:10F60CC71DAB94C4F8FF1169980CF90E17245C291337208FB48B0D428DAA3520CF819648474F028BA0DEFAB30D834A5C62039977B279AC66C15938C3D62A3B9F
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293191" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.468603878371963
    Encrypted:false
    SSDEEP:6144:6zZfpi6ceLPx9skLmb0fhZWSP3aJG8nAgeiJRMMhA2zX4WABluuNwjDH5S:cZHthZWOKnMM6bFpWj4
    MD5:47F6439E5FB0629122756F02A5230027
    SHA1:BE4470D992F9B17515FE793308185BEDC6C0D7BB
    SHA-256:7AF08C832D4CCA8A6324BE8B350BA94C6EE2ECC80677D0828D185CAEFACDF9F9
    SHA-512:3B81A3BC8810EFC6A2573EC0B931B8A39F6E9823A22688779DD1FEE646C03C7B5487D9D11F5E0AD293CE73379A8F216FD99134576E9629106FADCC26EB596DE1
    Malicious:false
    Reputation:low
    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.&5.................................................................................................................................................................................................................................................................................................................................................."2........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.747127639436871
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.98%
    • DOS Executable Generic (2002/1) 0.02%
    File name:8qM4hI4CL6.exe
    File size:42'496 bytes
    MD5:da54b8b040bfa5ea43fb84c2d914495e
    SHA1:945772b1f9604bdf998979ec97a43480694a0dc7
    SHA256:b6c2b60ae59ecefbfb43747a05d48a58fbd75dee7b094f9e61c694a6f7c864db
    SHA512:083d45c207cba1e5770b6953285dc878a38bac75e7194406d172d4b9e8699792a4811aee9e3ece15da84c15cf53e3d29780f6e358b6afd14ad798caa1f7afadc
    SSDEEP:768:7Y+jvRwHqTHPGq3PeVuLeBZfqM3hDNGa6+Us8RBwbds4ZYp7kvLWF:7YWvRPLPGQCuSBQ0a+4DwbdgIDQ
    TLSH:AB139ED76BE1C8F3DCD100303669A76627AFDE3280658D83C36C49902531AD3962FE6B
    File Content Preview:MZ......sp_t.........'...'...........'......................|...^}f}(@.L.G.O.O.X.Z.e._-d).)k .(^}f}(@..NzV.Q.S.FW5.;`..:..7.PE..L....77?.....................&.......0...0........@.......................... ...............................................0.
    Icon Hash:00928e8e8686b000
    Entrypoint:0x413088
    Entrypoint Section:.hap
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3F3737A9 [Mon Aug 11 06:28:57 2003 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:1286385b579bc499db79191c63f69d22
    Instruction
    mov edi, 00000000h
    xor ebx, ebx
    mov eax, 00000000h
    mov edi, 00000000h
    mov ebx, edi
    mov ebx, 00000000h
    mov ebx, 004130CAh
    xor edi, ebx
    mov edi, 004132D8h
    inc byte ptr [ebx]
    inc ebx
    xor edx, edx
    cmp ebx, 004132D8h
    jne 00007F09D4E7EBF5h
    inc eax
    mov ecx, 00000000h
    xor ecx, ecx
    cmp eax, 000198C9h
    jne 00007F09D4E7EBCEh
    xor ebx, edi
    nop
    nop
    nop
    mov eax, dword ptr [esp]
    xor ax, ax
    push 0000FFFFh
    push 5D7574B6h
    push 71E40722h
    push 15F8EF80h
    push D66358ECh
    mov edi, esp
    cmp word ptr [eax], 5A4Dh
    jne 00007F09D4E7EC15h
    mov edx, dword ptr [eax+3Ch]
    cmp edx, 00001000h
    jnbe 00007F09D4E7EC0Ah
    cmp word ptr [eax+edx], 4550h
    je 00007F09D4E7EC09h
    sub eax, 00010000h
    jmp 00007F09D4E7EBE1h
    push eax
    mov esi, dword ptr [eax+edx+78h]
    add esi, eax
    add esi, 18h
    xchg eax, ebx
    lodsd
    push eax
    lodsd
    push eax
    lodsd
    push eax
    add eax, ebx
    push eax
    lodsd
    push eax
    mov ebp, esp
    mov ecx, dword ptr [ebp+10h]
    xor edx, edx
    mov esi, dword ptr [ebp+04h]
    mov esi, dword ptr [esi]
    add esi, ebx
    xor eax, eax
    push eax
    ror eax, 07h
    xor dword ptr [esp], eax
    lodsb
    test al, al
    jne 00007F09D4E7EBF7h
    pop eax
    push edi
    cmp dword ptr [edi], 0000FFFFh
    je 00007F09D4E7EC0Bh
    cmp eax, dword ptr [edi]
    je 00007F09D4E7EC11h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x130180x74.hap
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1120.hen
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .vqr0x10000xd4060x8800f2ddc9c2c59c0d92d715d1c1b0f4a5a6False0.6434110753676471data6.707811481711903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .lsp0xf0000x13000x40054abd40c4fc04f6f6375d344b7ffe02dFalse0.421875data3.101659200234442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .hen0x110000x11500x1200eba0a66dedda169ca5de63667eb53f08False0.7994791666666666data6.550717202569502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .hap0x130000xf0000x400ed602cecc60ba3a64943391dd14a4cddFalse0.806640625data6.209133978860185IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    DLLImport
    shell32.dllSHBrowseForFolderW, SHFileOperationW
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:01:29:01
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\8qM4hI4CL6.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\8qM4hI4CL6.exe"
    Imagebase:0x400000
    File size:42'496 bytes
    MD5 hash:DA54B8B040BFA5EA43FB84C2D914495E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:01:29:02
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 332
    Imagebase:0x260000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.2152620079.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2152600259.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152640842.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152657167.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152671903.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_8qM4hI4CL6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: a27b81c3c973c3ab2fc13175cdfa6a580873f1c140edbbc88485b45d6776d9b7
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: 1781A672D0552ADBDF14CE68C5406ADB7B1EB85324F1542AADC56BB3C2C338AD42CBC5
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2152620079.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2152600259.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152640842.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152657167.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152671903.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_8qM4hI4CL6.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: f8e968f331d019ffe4309dbe7e60fe2b18de4373e83afef3d01f5d982da68cd0
      • Instruction ID: 2340d908603eef8f3025f8e7f443e7d1b5398c4300ef28fc94a3e923d818be13
      • Opcode Fuzzy Hash: f8e968f331d019ffe4309dbe7e60fe2b18de4373e83afef3d01f5d982da68cd0
      • Instruction Fuzzy Hash: 9CD1E471E0C305BAFB206B658D4AF6F3FA8AF01304F14443BF544B52D2EA7DA9418B5A
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2152620079.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2152600259.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152640842.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152657167.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2152671903.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_8qM4hI4CL6.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 088afcfed5fc1dbe4f17afd226ab5fc3f97d9bf1a661a27fa7f27897b77fbee9
      • Instruction ID: 98774508b8a035cde5116ebc5689c9d0629f10a91bbe3444886611f51d9cca31
      • Opcode Fuzzy Hash: 088afcfed5fc1dbe4f17afd226ab5fc3f97d9bf1a661a27fa7f27897b77fbee9
      • Instruction Fuzzy Hash: 6851B1B25002057EDB12EFA5DD46EFB37ACAB05704F04443FBA94F7191EA7895048BB8
      Uniqueness

      Uniqueness Score: -1.00%