Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0fRA2tfOob.exe

Overview

General Information

Sample name:0fRA2tfOob.exe
renamed because original name is a hash value
Original sample name:d37bf2a178ef7cb45051252303a82c5d.bin.exe
Analysis ID:1430645
MD5:d37bf2a178ef7cb45051252303a82c5d
SHA1:4e6431cad05b3cf1a042b6929c4833c3da694582
SHA256:06af507fabf065b179f1f682b662ef333ece031d9fc081fcd70c2a9103571a26
Tags:exeprg
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

  • System is w10x64
  • 0fRA2tfOob.exe (PID: 6632 cmdline: "C:\Users\user\Desktop\0fRA2tfOob.exe" MD5: D37BF2A178EF7CB45051252303A82C5D)
    • WerFault.exe (PID: 6744 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 272 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 0fRA2tfOob.exeAvira: detected
Source: 0fRA2tfOob.exeReversingLabs: Detection: 94%
Source: 0fRA2tfOob.exeJoe Sandbox ML: detected
Source: 0fRA2tfOob.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 0fRA2tfOob.exeStatic PE information: section name: .data?
Source: 0fRA2tfOob.exeStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\0fRA2tfOob.exeCode function: 1_2_004093311_2_00409331
Source: C:\Users\user\Desktop\0fRA2tfOob.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 272
Source: 0fRA2tfOob.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal72.evad.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6632
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e28557d1-8329-4365-b61c-b0737160a2faJump to behavior
Source: C:\Users\user\Desktop\0fRA2tfOob.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 0fRA2tfOob.exeReversingLabs: Detection: 94%
Source: unknownProcess created: C:\Users\user\Desktop\0fRA2tfOob.exe "C:\Users\user\Desktop\0fRA2tfOob.exe"
Source: C:\Users\user\Desktop\0fRA2tfOob.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 272
Source: C:\Users\user\Desktop\0fRA2tfOob.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .data?
Source: 0fRA2tfOob.exeStatic PE information: section name: .code
Source: 0fRA2tfOob.exeStatic PE information: section name: .fasm
Source: 0fRA2tfOob.exeStatic PE information: section name: .data?
Source: 0fRA2tfOob.exeStatic PE information: section name: .res
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\0fRA2tfOob.exeCode function: 1_2_00422000 rdtsc 1_2_00422000
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 6e d0 59 6b 97 52-b4 9a 7f 42 1f 0e 66 9c
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563

Anti Debugging

barindex
Source: C:\Users\user\Desktop\0fRA2tfOob.exeCode function: 1_2_00422000 Start: 00422069 End: 004220741_2_00422000
Source: C:\Users\user\Desktop\0fRA2tfOob.exeCode function: 1_2_00422042 Start: 00422069 End: 004220741_2_00422042
Source: C:\Users\user\Desktop\0fRA2tfOob.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\0fRA2tfOob.exeCode function: 1_2_00422000 rdtsc 1_2_00422000
Source: C:\Users\user\Desktop\0fRA2tfOob.exeCode function: 1_2_00422000 EntryPoint,LdrInitializeThunk,1_2_00422000
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping31
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
0fRA2tfOob.exe95%ReversingLabsWin32.Trojan.Zeus
0fRA2tfOob.exe100%AviraTR/Vundo.Gen
0fRA2tfOob.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430645
    Start date and time:2024-04-24 01:29:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 3s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:0fRA2tfOob.exe
    renamed because original name is a hash value
    Original Sample Name:d37bf2a178ef7cb45051252303a82c5d.bin.exe
    Detection:MAL
    Classification:mal72.evad.winEXE@2/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 1
    • Number of non-executed functions: 2
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • VT rate limit hit for: 0fRA2tfOob.exe
    TimeTypeDescription
    01:30:01API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6823000088181013
    Encrypted:false
    SSDEEP:96:eKFgTKGqdFasKh0Q7Bf/QXIDcQvc6QcEVcw3cE/n+HbHg/8BRTf3OyWZAX/d5FM8:NP1dQW0BU/gjuqzuiFSZ24IO8TT
    MD5:C441DD3105EEA9BC1424657205190381
    SHA1:994200957AFFE4DFF022245451106E8823BD4A75
    SHA-256:CA08283AA1331A090599A039C977679DC233ADD860607A117A995F52D7DEBD30
    SHA-512:958AA33C7121A044F1E6A101DA63AC3F7D273B9649E11406C057FDCE536CC0AE2A9BBE0CD6E96B591606A49289E95A9D514CCC66760436BB4C412D4507051A9D
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.8.8.5.9.5.6.9.1.7.1.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.8.8.5.9.6.0.9.7.9.6.4.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.b.e.b.6.d.3.f.-.1.9.7.2.-.4.6.d.e.-.8.4.4.7.-.0.2.c.9.1.0.3.5.2.b.d.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.2.a.7.d.4.b.c.-.c.0.8.8.-.4.2.0.2.-.8.0.9.d.-.6.4.a.8.7.a.c.2.1.d.3.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.0.f.R.A.2.t.f.O.o.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.e.8.-.0.0.0.1.-.0.0.1.4.-.f.4.4.4.-.e.5.2.5.d.6.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.6.0.5.d.f.3.5.1.6.6.8.c.7.2.b.c.8.7.3.3.4.b.e.b.f.f.c.2.d.2.b.0.0.0.0.f.f.f.f.!.0.0.0.0.4.e.6.4.3.1.c.a.d.0.5.b.3.c.f.1.a.0.4.2.b.6.9.2.9.c.4.8.3.3.c.3.d.a.6.9.4.5.8.2.!.0.f.R.A.2.t.f.O.o.b...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Tue Apr 23 23:29:55 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):31604
    Entropy (8bit):1.8363735135969437
    Encrypted:false
    SSDEEP:96:5G8SE37Aoqnh45sG1wVpoTi7r0JwsolNaa6WfiKpqOTaNIBkE8+WIkWIdGIXKQgU:blsQopoTOrlc86G3QgkEyKdpJo
    MD5:0AB3E1AE6215151DCFE47ABCC55104F8
    SHA1:1CE2DEE43A0D9A3E372B335358056AB61250837F
    SHA-256:B252927018AF543FFCEA848842AC9F1A4C7C0EB235A2AA867D601BEE198D94D4
    SHA-512:FE4C2EEE1B8347FD333506577AE70BF8912885FF025303112EFAD0F20F2117705B52AEA7D48F76D1F76A105E8CCAE6E5F5A3EB8148DB7F59CC15832F5DC10032
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......sD(f........................................L...........T.......8...........T...........(...Lp......................................................................................................eJ..............GenuineIntel............T...........sD(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8296
    Entropy (8bit):3.694649766167856
    Encrypted:false
    SSDEEP:192:R6l7wVeJHS6TJrO6Y+vSU9VgmfqGlRprB89b5gsfpTm:R6lXJy6TJrO6YGSU9VgmfqB5zfg
    MD5:8F1AF671C1ED7E99FBA5807933580C4B
    SHA1:32849FD177832F3199DBEA2E750D50F214AEDCDE
    SHA-256:F0BBB573D066CF6A408488FE3F0D5908D899652394D3D0D125EA7711C1A9591B
    SHA-512:BFCC89E1E43079C508FD32A1EF4C189EBE5F99F7590026DCCD6B6DBA66EF6FDCA7D7F9A5DC7D2DC88B258059C3CCB98B104115A0EAEF52BE64B7FDD5086C5845
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.3.2.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.457580619757068
    Encrypted:false
    SSDEEP:48:cvIwWl8zsYJg77aI9adWpW8VYnYm8M4JNNFCr+q8Yoa6SqMRxd:uIjfeI7Es7VrJweLSHRxd
    MD5:D119204ED22D29764C3168F5E2A022DC
    SHA1:5F2021D67222622A6AC68B844DDDEC0EFE7A62D4
    SHA-256:CB51EEB4CA04EAF9CD2FC638A83AE5EE959B933EE7FD69C3EDDEA7D678E045CB
    SHA-512:4BACC4C3778C5FF7829699AFD842707382016C3C05A0E1796EF54CA6789BA8514F85BD8B0A303C5D4BE89680D26C666DB9864F4318E2C8219DE01087F03F497D
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293192" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.568413569276992
    Encrypted:false
    SSDEEP:6144:/oPefZnQMa3tfL9bn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGAzBsL6:wPZAooVJHnsg/d1TxqG
    MD5:2F75F676E61AFBECD88D882A149C1F0B
    SHA1:319201CD15B2E39E406DB67E052C91F99584025D
    SHA-256:512189C1268130F6DC6283BB256B178A6CD14E96B5FD8887E0FF1109FAEF1AB1
    SHA-512:134EE8857FB9A053852A817B4AFEACB7F4E2E439CB1BDE4F325C2F6297D0E65135FAD190DE3C4972150BF65805A0571ADC20FAA4CD4C66BA6A6DF4C3ADA93881
    Malicious:false
    Reputation:low
    Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmJ7$&...............................................................................................................................................................................................................................................................................................................................................:h3.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.730451767278738
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.98%
    • DOS Executable Generic (2002/1) 0.02%
    File name:0fRA2tfOob.exe
    File size:43'520 bytes
    MD5:d37bf2a178ef7cb45051252303a82c5d
    SHA1:4e6431cad05b3cf1a042b6929c4833c3da694582
    SHA256:06af507fabf065b179f1f682b662ef333ece031d9fc081fcd70c2a9103571a26
    SHA512:802999f8552678e6df3e22ff542081a5a268e08e3f3edd27a8349837e1868db6b64acec9c378962425bd443613e5f2728366fac8d678269821b0e92d8affa855
    SSDEEP:768:7Y+jvRwHqTH4uFU74LuVuLeBZfqM8hDNGa6+lTVBwbdsepyQ:7YWvRPL4uFnSuSBQVa+9/wbd1y
    TLSH:F9138EDA77A1C8F3DCD10070366A976A27FEDE3280658D47C36849902971AD3913FE6B
    File Content Preview:MZ................6.`...`...`....O..`....$..................0...^}f}(@.{U.I.M.F.E.>...8d5.'... .....^}f}(@..NzV.Q.S.FW5.;`..;...ova...ud...h."]...103*E......2-<.....:..7.i.+B.._..P.J....9.{R.\....#Z...>...b....qpsj.4'N.8.rm|O.A..zU.w^..k.=.......%T.nyX...
    Icon Hash:00928e8e8686b000
    Entrypoint:0x422000
    Entrypoint Section:.data?
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x39C0A6E3 [Thu Sep 14 10:22:27 2000 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:a19666f47b2aa7e3be11353ebc390855
    Instruction
    sub eax, eax
    push eax
    call dword ptr [00422126h]
    add eax, 000003E8h
    mov esi, 00002411h
    mov edi, 00422029h
    mov ecx, 00000097h
    dec byte ptr [edi]
    add edi, 01h
    loop 00007FE2A8DF87ABh
    sub esi, 01h
    jne 00007FE2A8DF879Ch
    mov esi, dword ptr fs:[00000030h]
    mov esi, dword ptr [esi+10h]
    cmp esi, 00020000h
    jne 00007FE2B8408A7Ch
    mov eax, dword ptr [0042208Fh]
    mov ecx, dword ptr [00422093h]
    sub byte ptr [eax], 00000033h
    inc eax
    loop 00007FE2A8DF87ACh
    mov eax, dword ptr [00422097h]
    mov ecx, dword ptr [0042209Bh]
    sub byte ptr [eax], 00000033h
    inc eax
    loop 00007FE2A8DF87ACh
    mov eax, dword ptr [0042209Fh]
    mov ecx, dword ptr [004220A3h]
    sub byte ptr [eax], 00000033h
    inc eax
    loop 00007FE2A8DF87ACh
    mov eax, dword ptr [004220A7h]
    mov ecx, dword ptr [004220ABh]
    sub byte ptr [eax], 00000033h
    inc eax
    loop 00007FE2A8DF87ACh
    mov ecx, dword ptr [0042208Bh]
    push ecx
    ret
    jle 00007FE2A8DF87E2h
    inc ecx
    add byte ptr [eax], al
    adc byte ptr [eax+00h], al
    imul eax, dword ptr [edi-10000000h], 02A00040h
    add byte ptr [eax], al
    add byte ptr [eax], dl
    inc ecx
    add byte ptr [eax+11h], dl
    add byte ptr [eax], al
    add byte ptr [eax], dh
    inc ecx
    add byte ptr [eax], al
    add al, 00h
    add byte ptr [ecx+00422122h], ah
    mov eax, dword ptr [00422158h]
    nop
    nop
    nop
    nop
    nop
    nop
    jnle 00007FE2A8DF87C8h
    and dword ptr [edx], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x220c00xae.data?
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1120.text
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .code0x10000xd4de0x88006cb4b4aa6c06ba270e800f615714f753False0.6440142463235294data6.709000337249343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .data0xf0000x13000x40088ed21114da6ef867f5c7845ae498b33False0.513671875data3.8907377435773993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .text0x110000x11500x12007d8d8690f46af27deb24406ed494fa8eFalse0.8020833333333334data6.5743808063928855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .fasm0x130000xf0000x4009eaf661aa3baab29086464fcdd12bbaaFalse0.806640625data6.230777813758928IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .data?0x220000x1fa0x200e51fafb2ad08441b86c1a41d2ec38f09False0.521484375data3.8955920566203317IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .res0x230000x400x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
    DLLImport
    kernel32.dllExitProcess, GetModuleHandleA
    user32.dllMessageBoxA
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:1
    Start time:01:29:55
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\0fRA2tfOob.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\0fRA2tfOob.exe"
    Imagebase:0x400000
    File size:43'520 bytes
    MD5 hash:D37BF2A178EF7CB45051252303A82C5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:01:29:55
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 272
    Imagebase:0xc10000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.1%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:100%
      Total number of Nodes:2
      Total number of Limit Nodes:0
      execution_graph 3067 422000 LdrInitializeThunk 3068 422013 3067->3068

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 422000-42200e LdrInitializeThunk 1 422013-422018 0->1 2 42201d-422022 1->2 2->2 3 422024-422027 2->3 3->1 4 422029-42202a 3->4 5 422050-422051 4->5 6 42202c-422030 4->6 9 422053-422055 5->9 7 422032-422038 6->7 8 422097-42209a 6->8 7->5 9->9 10 422057-422062 9->10 11 422064-422066 10->11 11->11 12 422068-422080 11->12 15 422081-422083 12->15 15->15 16 422085 15->16 17 422096 16->17 18 422087-42208f 16->18 17->8
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2327355151.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.2327280091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327293844.0000000000401000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327310268.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327324345.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327339499.0000000000413000.00000080.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_0fRA2tfOob.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: 693d6c0bde0c581bb8496fcc54f71a5c1cd081d8c1717cbd679e0613e642c822
      • Instruction ID: 7ab0af28d19b3c241ea9c844dd51c9626526aa6ff6f3e976902f18b142a3ce10
      • Opcode Fuzzy Hash: 693d6c0bde0c581bb8496fcc54f71a5c1cd081d8c1717cbd679e0613e642c822
      • Instruction Fuzzy Hash: 1C014963F2C0B326F7122A7776212D66B935B933C07F520724385D318AEE5B8613C349
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.2327293844.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.2327280091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327310268.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327324345.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327339499.0000000000413000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327355151.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_0fRA2tfOob.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: ae42489584d8f454c4d26df400c6142c902132189950ac7d3556678ec97d8bd3
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: B0817032D0952ADBDF15CE58C9406ADB7B1EB85324F1542AAEC56BB3C2C334AD42DBC4
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.2327355151.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.2327280091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327293844.0000000000401000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327310268.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327324345.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2327339499.0000000000413000.00000080.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_0fRA2tfOob.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 46539d040e5171c912249f4d80579da02fb8cdb724dee20aa73d42277bbc5ee7
      • Instruction ID: 31ed607211590abacd58057c58529f4b3e9c6cf8a5d6bf3d6c04f24a92c41841
      • Opcode Fuzzy Hash: 46539d040e5171c912249f4d80579da02fb8cdb724dee20aa73d42277bbc5ee7
      • Instruction Fuzzy Hash: 5DF0BB1331D4E315F317197637722C7BBA15B976903F5106543D243587CA9A4313C34A
      Uniqueness

      Uniqueness Score: -1.00%