Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aYtCc0B4Oz.exe

Overview

General Information

Sample name:aYtCc0B4Oz.exe
renamed because original name is a hash value
Original sample name:14330e5e7100b24e42005253626ac4ce.bin.exe
Analysis ID:1430670
MD5:14330e5e7100b24e42005253626ac4ce
SHA1:b65c248ce53fe39e95960e417a9d2e4619c929d2
SHA256:551efbb7852edf2043218058fb78e9c399e33236b73106bde315d361dd0566da
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • aYtCc0B4Oz.exe (PID: 2276 cmdline: "C:\Users\user\Desktop\aYtCc0B4Oz.exe" MD5: 14330E5E7100B24E42005253626AC4CE)
    • WerFault.exe (PID: 3084 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: aYtCc0B4Oz.exeAvira: detected
Source: aYtCc0B4Oz.exeReversingLabs: Detection: 86%
Source: aYtCc0B4Oz.exeVirustotal: Detection: 77%Perma Link
Source: aYtCc0B4Oz.exeJoe Sandbox ML: detected
Source: aYtCc0B4Oz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeCode function: 1_2_0040971D1_2_0040971D
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 232
Source: aYtCc0B4Oz.exeStatic PE information: No import functions for PE file found
Source: aYtCc0B4Oz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2276
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d4c156f1-abb2-423c-bd4e-5ad4e19d5bc5Jump to behavior
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: aYtCc0B4Oz.exeReversingLabs: Detection: 86%
Source: aYtCc0B4Oz.exeVirustotal: Detection: 77%
Source: unknownProcess created: C:\Users\user\Desktop\aYtCc0B4Oz.exe "C:\Users\user\Desktop\aYtCc0B4Oz.exe"
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 232
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .kzcb
Source: aYtCc0B4Oz.exeStatic PE information: section name: .rqr
Source: aYtCc0B4Oz.exeStatic PE information: section name: .kzcb
Source: aYtCc0B4Oz.exeStatic PE information: section name: .fmj
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeCode function: 1_2_004000D8 push 1CA97ADFh; ret 1_2_004000F4
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\aYtCc0B4Oz.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
aYtCc0B4Oz.exe87%ReversingLabsWin32.Trojan.Zeus
aYtCc0B4Oz.exe77%VirustotalBrowse
aYtCc0B4Oz.exe100%AviraTR/Crypt.XPACK.Gen
aYtCc0B4Oz.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430670
    Start date and time:2024-04-24 02:31:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 0s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:13
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:aYtCc0B4Oz.exe
    renamed because original name is a hash value
    Original Sample Name:14330e5e7100b24e42005253626ac4ce.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.21
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, tile-service.weather.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target aYtCc0B4Oz.exe, PID 2276 because there are no executed function
    TimeTypeDescription
    02:31:54API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6342037536630929
    Encrypted:false
    SSDEEP:96:kSFebqGPyoFRpsChoY7NfpXQXIDcQvc6QcEVcw3cE/n+HbHg6ZAX/d5FMT2SlPkn:n0WGPyQRpg0BU/gjEzuiFFZ24IO8by
    MD5:9B18B212EB6EF879C6582679F4659159
    SHA1:259DBC8AD919BE07DF03BB55D188C2E4A8304E9C
    SHA-256:DFDEE3F3BDA398D51AF0D07492B4F0CA72BFE6F71DB947F4C3E639395DBE613E
    SHA-512:8976F4322D93D20E6205B85DB91266236B073506577155374E24B0D766B48CB9CAC5E24B7DDC11C5B7174B7EB42082CE6505AB714B79A1A3A693F083E15A8BC8
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.2.3.1.2.4.9.8.0.3.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.2.3.1.2.7.7.9.2.8.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.5.f.3.6.7.f.-.8.3.8.8.-.4.6.5.6.-.9.6.5.e.-.0.5.e.8.a.9.5.c.2.c.3.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.f.3.b.f.8.1.-.9.5.9.7.-.4.7.5.4.-.b.9.8.c.-.d.4.f.0.f.6.c.f.3.c.8.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.a.Y.t.C.c.0.B.4.O.z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.e.4.-.0.0.0.1.-.0.0.1.5.-.d.7.a.7.-.5.9.c.d.d.e.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.2.1.c.d.7.4.c.0.9.d.c.3.0.b.3.4.9.a.1.9.0.c.5.4.3.2.4.5.1.c.f.0.0.0.0.f.f.f.f.!.0.0.0.0.b.6.5.c.2.4.8.c.e.5.3.f.e.3.9.e.9.5.9.6.0.e.4.1.7.a.9.d.2.e.4.6.1.9.c.9.2.9.d.2.!.a.Y.t.C.c.0.B.4.O.z...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:31:52 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):2.000053331988165
    Encrypted:false
    SSDEEP:96:538HE3525i6Fndgi7nBorlPcrKVkjS68LWx4Wq8rkKQKqWIkWI/MI4u78uO+y:SgunyOw+rn6K8n+y
    MD5:F486AF1FAB193CB60D469069524F0399
    SHA1:3DEFA8AB0C7398F61073743CACBE0245F77FABFB
    SHA-256:1C5EEED7F2CF01A3C06A6837976E919C2F2DF5FCCA327405BA11697CFBA05AEE
    SHA-512:41383342FF60D89A76CABD49E78D8A76E0D025156E3F49CB68E9007BEED5FE7C8685D9F779821EA2F5C7E9DF490F2F1A64371DEAE74287755EB8D2AC68322864
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........R(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............R(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8282
    Entropy (8bit):3.699246624717924
    Encrypted:false
    SSDEEP:192:R6l7wVeJfc6Oq6Y2DXjSU9d8cvT0gmfr8Epr+89b5XsfOTm:R6lXJU6Oq6YajSU9vvT0gmf4G5cfr
    MD5:CE554C8DA7F9F9CA9B9CF0475D52C57E
    SHA1:2F7BB3D032900DFAA1742C6E7240F72AAE3AB2C9
    SHA-256:F87E4E0DE7B2EF87FAC97962C09FDDCD17A10F5A446C54AE427588A1CE63B60D
    SHA-512:4FDD3AC6D046262BE76D2D5642723B3F86A848344313958E5CF3E907753464473596518559436C2B0CDA2F9C591AE84CDE364D867A66422FB4BA63E8D4310E7E
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.7.6.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.467008182773822
    Encrypted:false
    SSDEEP:48:cvIwWl8zsnJg77aI9DoWpW8VYvYm8M4JxXFYK+q8Ax6UfZqxydd:uIjfJI7pB7V7JBn6UfZqxydd
    MD5:2FAE4F2041A5F76CE6736A2DE087ED7B
    SHA1:806E127AC8F06265CA10C486457D1745F968DFE2
    SHA-256:F05CF8DBC207DEE1E012757274E2CF24FD2A099BD1437C602F27F80458F57D75
    SHA-512:41D50096A2A1E31EE131E00378481CFEC6B210788B5D51169627A2FEE100742F28FCF8896491326F933DAC6DDE1505BB3ACAB9F3EE9F6F683B90E775881FCA20
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293254" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.468596283956062
    Encrypted:false
    SSDEEP:6144:czZfpi6ceLPx9skLmb0f1ZWSP3aJG8nAgeiJRMMhA2zX4WABluuNPjDH5S:iZHt1ZWOKnMM6bFpdj4
    MD5:9A53C15F1F9DF8531EC9FD6EAAFDB559
    SHA1:EC22681A5801A5DB37F91D2084F649554973BA57
    SHA-256:8570020DB741AB51E07619BBD81C0E1A1F285A17F8C22797407A5F638C16EE4C
    SHA-512:E5520004F78BF56A64EB749E7EFDF884B15F201C8941F5969745D1279F5CAF6CF81ED8F2FCA039CFCCC89C24D09C59B264950A629BE2F155A66C26AC6CCAF62B
    Malicious:false
    Reputation:low
    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...................................................................................................................................................................................................................................................................................................................................................+..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.761708671204802
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Sybase iAnywhere database files (19/3) 0.00%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:aYtCc0B4Oz.exe
    File size:43'520 bytes
    MD5:14330e5e7100b24e42005253626ac4ce
    SHA1:b65c248ce53fe39e95960e417a9d2e4619c929d2
    SHA256:551efbb7852edf2043218058fb78e9c399e33236b73106bde315d361dd0566da
    SHA512:0b7b76bb7cd0351a5d0e1ea927f65affb1934a5b207de173c5787a50b2d0b0410e96b060e40d447e7a9772098f45b36001236a63c5557181e86cec2417e37eac
    SSDEEP:768:tY+OvuxErwsHcMSzNSwddLTA1zLQbUU8/EMl4Sl/C4NxwREkUPhZu9ovNh:tYnvuurpHchNS4A1zUwm6xiREkKOoVh
    TLSH:AE139E8777E1D8F3DE9100322779A72A5BBEDD230064998BC77849D124716E3922BE1F
    File Content Preview:MZ..........................................................t.................-................. ...#.......^}f}(@.xG.C.B.=...D...7.-.5l!.!s.. ^}f}(@.._.RKP.V...j..s....R!..&.(.:i...m.."....5x...,.^. ..AT.......|...p....+.U...........a.;f.h.z.......b.DK6u
    Icon Hash:00928e8e8686b000
    Entrypoint:0x40f2cc
    Entrypoint Section:.kzcb
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x44C8639C [Thu Jul 27 06:56:28 2006 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    mov al, byte ptr [7800126Eh]
    adc byte ptr [eax+00h], al
    mov eax, 580040FBh
    int1
    inc eax
    add byte ptr [eax], dh
    pushad
    adc eax, dword ptr [eax]
    insb
    adc byte ptr [eax+00h], al
    sar ah, 00000040h
    add byte ptr [eax-0FFFBF0Fh], ch
    je 00007FC729552EA0h
    add byte ptr [eax+edx+40h], bl
    add byte ptr [eax-05h], al
    inc eax
    add byte ptr [eax-10h], ch
    inc eax
    add byte ptr [eax+500013C3h], al
    adc byte ptr [eax+00h], al
    sar dl, 1
    inc eax
    add byte ptr [eax], ah
    inc eax
    add al, bl
    ret
    adc eax, dword ptr [eax]
    inc eax
    adc byte ptr [eax+00h], al
    dec esp
    cld
    inc eax
    add byte ptr [eax-1FFFBF0Eh], bl
    test eax, 00000012h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    inc edx
    add byte ptr [ecx], al
    add dword ptr [esi+4300406Fh], ecx
    add byte ptr [ecx], al
    add dword ptr [eax+4000406Fh], ebp
    add byte ptr [ecx], al
    add esi, eax
    outsd
    inc eax
    add byte ptr [ecx+00h], al
    add dword ptr [ecx], eax
    loopne 00007FC729552F01h
    inc eax
    add byte ptr [esi+00h], ah
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1188.fmj
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .rqr0x10000xdb7b0x8c002314f0597c5ff9b7c8d68b95954e8552False0.6435825892857143data6.706227232382309IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .kzcb0xf0000x13380x8006afc2550ea23841d603972b3f8a76017False0.4658203125data4.160288529720405IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .fmj0x110000x110000x1200f43fb34a9f22e86a7c8a551a3ac0f37aFalse0.8187934027777778data6.648196541777705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:1
    Start time:02:31:52
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\aYtCc0B4Oz.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\aYtCc0B4Oz.exe"
    Imagebase:0x400000
    File size:43'520 bytes
    MD5 hash:14330E5E7100B24E42005253626AC4CE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:02:31:52
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 232
    Imagebase:0xe90000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000001.00000002.2105428786.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.2105446391.000000000040F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2105465223.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_aYtCc0B4Oz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: 69f26d5aa5d96b5452832479d11c5d5c43512d3a1fb26e635d941fbf87bf064b
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: 95817F73D1552ADBDB14CE58C4406ADB7B1EB86324F2982AADC56BB3C2C334AD41CBC4
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2105428786.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.2105446391.000000000040F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2105465223.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_aYtCc0B4Oz.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: a2c33b88ea51d747a67952f097a5263c7a4a18ab3472b4f8b150621fe5b13796
      • Instruction ID: d7c7b81d61975fefc9426ab6fcdc183bb4a3dce0472bb2003908c6dc265fd958
      • Opcode Fuzzy Hash: a2c33b88ea51d747a67952f097a5263c7a4a18ab3472b4f8b150621fe5b13796
      • Instruction Fuzzy Hash: 47D1F571E083067AEF206B65CD46FAF7AA9AF01304F10407BF900B52D2EB7D9945876E
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2105428786.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.2105446391.000000000040F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2105465223.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_aYtCc0B4Oz.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 70bd1bd3378160f92b759344d4d12acce2a8098cf264ecb5c5b199c1ff2b17a1
      • Instruction ID: 7ce1df7b1f936209aefc2c94d77982cb1278951d628e8b24341a0d060cb80db0
      • Opcode Fuzzy Hash: 70bd1bd3378160f92b759344d4d12acce2a8098cf264ecb5c5b199c1ff2b17a1
      • Instruction Fuzzy Hash: 7C5173B2500205BADB11ABA59C46FFF37ACEB4D704F08443FB955F71D2EA7899048B64
      Uniqueness

      Uniqueness Score: -1.00%