Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JVi84k2SSG.exe

Overview

General Information

Sample name:JVi84k2SSG.exe
renamed because original name is a hash value
Original sample name:a6c151ab4a6fc059dea03d13e02784b6.bin.exe
Analysis ID:1430671
MD5:a6c151ab4a6fc059dea03d13e02784b6
SHA1:30e76ad7da3c50d7c2d9e69885bb9668fa7a4b32
SHA256:8e6e43df08951916adca26672320ee3100c0605b9355eb74bf529c66546ffbb5
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • JVi84k2SSG.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\JVi84k2SSG.exe" MD5: A6C151AB4A6FC059DEA03D13E02784B6)
    • WerFault.exe (PID: 7388 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7324 -s 236 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: JVi84k2SSG.exeAvira: detected
Source: JVi84k2SSG.exeReversingLabs: Detection: 86%
Source: JVi84k2SSG.exeVirustotal: Detection: 84%Perma Link
Source: JVi84k2SSG.exeJoe Sandbox ML: detected
Source: JVi84k2SSG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\JVi84k2SSG.exeCode function: 0_2_004097250_2_00409725
Source: C:\Users\user\Desktop\JVi84k2SSG.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7324 -s 236
Source: JVi84k2SSG.exeStatic PE information: No import functions for PE file found
Source: JVi84k2SSG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7324
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\087ec64e-1a0e-4b14-b1a5-687fa9605429Jump to behavior
Source: C:\Users\user\Desktop\JVi84k2SSG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: JVi84k2SSG.exeReversingLabs: Detection: 86%
Source: JVi84k2SSG.exeVirustotal: Detection: 84%
Source: unknownProcess created: C:\Users\user\Desktop\JVi84k2SSG.exe "C:\Users\user\Desktop\JVi84k2SSG.exe"
Source: C:\Users\user\Desktop\JVi84k2SSG.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7324 -s 236
Source: C:\Users\user\Desktop\JVi84k2SSG.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .tep
Source: JVi84k2SSG.exeStatic PE information: section name: .papin
Source: JVi84k2SSG.exeStatic PE information: section name: .tep
Source: JVi84k2SSG.exeStatic PE information: section name: .dubmn
Source: C:\Users\user\Desktop\JVi84k2SSG.exeCode function: 0_2_0040F773 push ds; retf 5582h0_2_0040F79E
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\JVi84k2SSG.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
JVi84k2SSG.exe87%ReversingLabsWin32.Trojan.Zeus
JVi84k2SSG.exe85%VirustotalBrowse
JVi84k2SSG.exe100%AviraTR/Crypt.XPACK.Gen
JVi84k2SSG.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430671
    Start date and time:2024-04-24 02:34:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 0s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:JVi84k2SSG.exe
    renamed because original name is a hash value
    Original Sample Name:a6c151ab4a6fc059dea03d13e02784b6.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 4
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target JVi84k2SSG.exe, PID 7324 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:35:04API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6328542525863985
    Encrypted:false
    SSDEEP:192:lqiYFFPDF3a8li0BU/sDvjEzuiF0Z24IO8gqp:9YFjaaBU/AjEzuiF0Y4IO8v
    MD5:7F9843E542BFEABAAB8E03B8229CD57B
    SHA1:FC497B0ECBDD47709C208542A9809BC90CD598A6
    SHA-256:2FDBD688318B3CC49B46013A5175A518115CEE10BF6D82A983306A2A7C9E7D07
    SHA-512:FC5C4B1B2C23F78B5349EE90CD0F1239230E17AA64028E4C5DCA2A0761F6EC7DF97DE6DB13F913AF2718A7C194EA859F45B74D2CE0BD4BDFBBF9B0AE84E381A8
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.2.4.9.3.3.8.5.9.5.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.2.4.9.3.6.9.8.4.5.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.6.d.3.2.4.4.-.1.4.0.2.-.4.3.6.2.-.b.5.e.5.-.c.f.b.8.e.9.2.7.3.6.b.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.7.2.6.9.3.5.8.-.9.a.c.1.-.4.7.c.5.-.8.0.0.9.-.b.5.9.6.3.6.e.d.d.5.f.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.J.V.i.8.4.k.2.S.S.G...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.9.c.-.0.0.0.1.-.0.0.1.4.-.c.d.d.9.-.2.f.3.9.d.f.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.b.5.8.5.5.6.7.3.e.5.4.a.f.b.3.a.d.1.e.0.2.3.c.d.e.2.0.a.e.9.b.0.0.0.0.f.f.f.f.!.0.0.0.0.3.0.e.7.6.a.d.7.d.a.3.c.5.0.d.7.c.2.d.9.e.6.9.8.8.5.b.b.9.6.6.8.f.a.7.a.4.b.3.2.!.J.V.i.8.4.k.2.S.S.G...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:34:53 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):2.045898753845593
    Encrypted:false
    SSDEEP:96:598VE383D6CQRWL++ZH1i7naahlFAfrFLZbktdgzwIkWIkWI/oI4y8uWgy:Ecer1OTFAfrFLOsIy8zgy
    MD5:185128AF3BB3205B84D9C423CAF0E282
    SHA1:C77C66DB757BCC6DA5212A848E7217117D01074C
    SHA-256:148EC842E8449C771D1A10713F3E68A41BC2D4709C9C95CB4270C300222841CA
    SHA-512:492B458202D1E7458875E7FD690B83E89F9B358F2667BDB776785B0F6EA5F7C31A8F3DEA768EA1A72AC7084D62740FA0B8DADBD8D5EEE1C8B79DFDC1CD9CCC8D
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........S(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............S(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8284
    Entropy (8bit):3.6992986591235297
    Encrypted:false
    SSDEEP:192:R6l7wVeJVrq86O86Y9VSU3XxGgmfuZIdprt89bVhqsflYEHm:R6lXJVN6O86Y/SU3ggmfTqVhJflY5
    MD5:38C20628D64AB430E53114DFCDE8C92B
    SHA1:82ADF22D87A90B9075398668EF0ADA7CCA826ACF
    SHA-256:47506F4825E022699BD64FD29A33319A88E408FF724D1543981E3204B55CCB37
    SHA-512:9EDFABBBCE9679F52AD07A9FD82D94DB3C1A8BE030EDEC24672F5C64D2ACED0DF289579543C9BC3A8714D43B39A88C3E5514FCC8949AB204716940865B9E70F1
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.2.4.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.48157964990345
    Encrypted:false
    SSDEEP:48:cvIwWl8zsSJg77aI9TQWpW8VYXYm8M4JPNdUFSa+q89rS80frPId:uIjfgI71p7VDJPfhaCrT0frPId
    MD5:67C915BCCFF0BAD341C9839B8965A42F
    SHA1:88760077EDCA8EDC5BF5BF9AAF534FE8A3F19F45
    SHA-256:1E88CB4FAF77ECAA0E0FE01CB30CE0041CB1828770CFD4479AE5DF61076DCC26
    SHA-512:4F92E1C485347DC4639FD30C26C20F202B2168C8EC45A531FBEE122149413E50B82D4B9B6C0457FD0CF727E19B07F8F0156149080A7C8EE879CC78B697CEFF86
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293257" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.465429242771814
    Encrypted:false
    SSDEEP:6144:3IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNkdwBCswSbv:4XD94+WlLZMM6YFHS+v
    MD5:5D5DA4C4DE2809911F6A4E8A175F860C
    SHA1:9AFAD4368E668E1653C9B2EB3B77AA3F33C79FB3
    SHA-256:3720C1A47E88E93FFB45DDCB191BE66228B17B4577F5A42FA04F78F27604D601
    SHA-512:2FCF88D2BC1912A4D20CC9BEA790DBF0589529F67392D4AB9FC0DD30D747977D8F74812F0D14DB1EF50194B900863C9276A1391040AB94E828FAAC123570F37E
    Malicious:false
    Reputation:low
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.9\9................................................................................................................................................................................................................................................................................................................................................6J.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.753349518504468
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Sybase iAnywhere database files (19/3) 0.00%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:JVi84k2SSG.exe
    File size:45'056 bytes
    MD5:a6c151ab4a6fc059dea03d13e02784b6
    SHA1:30e76ad7da3c50d7c2d9e69885bb9668fa7a4b32
    SHA256:8e6e43df08951916adca26672320ee3100c0605b9355eb74bf529c66546ffbb5
    SHA512:70e33ed4fd26b67742783a36078af5b39052f71ea343ba17b9cd8345363ec7c489baae389a193c261f7f21b23ccf4dfb91c1b7601dad610c9b7823d8579b5ca5
    SSDEEP:768:hY+OvuxErRsPc6SzNSwddLLAlzLQbUU8/E0l4ql/649+wREkUnZoWOFVc8D:hYnvuurCPczNSQAlzUwmCBpREk3Vl
    TLSH:53138C97B7E1D8F3DD8100312779A72A5BBFDD230064998BC73849C624716E3952BE2B
    File Content Preview:MZ............................................................................6.`...`...`.....$.....(.'.....^}f}(@..G.C.Q.?.M.D...8d.{7..s....*.....^}f}(@..G.C.Q.?.M.D...8d.{7..s...."{...L..i..Z.T...8C".\.f....-d...H...l....{z}t.>1XPE..L...0PuB...........
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x40f773
    Entrypoint Section:.tep
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x42755030 [Sun May 1 21:54:56 2005 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    mov ebx, 0040F79Dh
    xor ecx, ecx
    mov edx, DE0EC672h
    sub byte ptr [ebx], dl
    inc ebx
    shr edx, 08h
    inc ecx
    cmp ecx, 04h
    jne 00007F57D0F56AFCh
    mov edx, DE0EC672h
    mov ecx, 00000000h
    cmp ebx, 0040FA9Fh
    jc 00007F57D0F56AD4h
    nop
    nop
    nop
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    xor ecx, ecx
    mov ecx, DE0EC672h
    cmp ecx, dword ptr [esp]
    je 00007F57D0F56C82h
    mov ecx, 00000000h
    mov ebx, 0040F79Dh
    add ebx, 32h
    mov edx, dword ptr [esp]
    inc ebx
    cmp ebx, 0040FA9Fh
    jne 00007F57D0F56AE6h
    inc ecx
    cmp ecx, 00015F90h
    jne 00007F57D0F56AD5h
    xor eax, eax
    mov eax, dword ptr [esp]
    xor ax, ax
    push 0000FFFFh
    push 5D7574B6h
    push 71E40722h
    push 15F8EF80h
    push D66358ECh
    mov edi, esp
    cmp word ptr [eax], 5A4Dh
    jne 00007F57D0F56B05h
    mov edx, dword ptr [eax+3Ch]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x119c.dubmn
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .papin0x10000xdd020x8e0002b97eee0690ef5c275270d9d124bcaaFalse0.6426881602112676data6.701912165113598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tep0xf0000x133c0xc00cd37d02f8e7a63d88e980b0699362cf7False0.5384114583333334data5.198992303699803IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .dubmn0x110000x110000x1200888a6c239cefd673e6be081be0fb9773False0.8246527777777778data6.669246533427736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:34:53
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\JVi84k2SSG.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\JVi84k2SSG.exe"
    Imagebase:0x400000
    File size:45'056 bytes
    MD5 hash:A6C151AB4A6FC059DEA03D13E02784B6
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:02:34:53
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7324 -s 236
    Imagebase:0xea0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.1745589219.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1745605691.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1745617986.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_JVi84k2SSG.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: e1d96d72a0b557909897ba5db48372803fccbb7f52f524a36d4da9fd9524c71e
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: 5D816F73D1552ADBDF14CE68C5406ADB7B1EB85324F2982AADC52BB3C2C234AD41DBC4
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1745589219.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1745605691.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1745617986.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_JVi84k2SSG.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: a2c33b88ea51d747a67952f097a5263c7a4a18ab3472b4f8b150621fe5b13796
      • Instruction ID: c94d4ee9c4b76ff5e22f1f0d943cd323c518ce63c5d0f5666debdc2a4d862c44
      • Opcode Fuzzy Hash: a2c33b88ea51d747a67952f097a5263c7a4a18ab3472b4f8b150621fe5b13796
      • Instruction Fuzzy Hash: 08D10671D083057AFB206B75CD0AFAF7AA9EF11304F14407BF900B52D2EB799945879A
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1745589219.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1745605691.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1745617986.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_JVi84k2SSG.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 70bd1bd3378160f92b759344d4d12acce2a8098cf264ecb5c5b199c1ff2b17a1
      • Instruction ID: ab5c409e46917d3d06411c10268cb5eb35fd27e8efd445c584ef3ecb109a5de5
      • Opcode Fuzzy Hash: 70bd1bd3378160f92b759344d4d12acce2a8098cf264ecb5c5b199c1ff2b17a1
      • Instruction Fuzzy Hash: DF5192B25042057ADB01ABB69C42EFF37ACBB49708F04443FB951F31D2EA7999048B68
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1745589219.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1745605691.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1745617986.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_JVi84k2SSG.jbxd
      Similarity
      • API ID:
      • String ID: 1$K$O$x(
      • API String ID: 0-640814622
      • Opcode ID: d2812dc9456ceecc0ab1997ed26d0610e6291b736cc30df3be2897a0138c6f42
      • Instruction ID: 4aa91086eeef1f860617d52a321b8b78f0c29f46e0b1aad0e27d688824c59945
      • Opcode Fuzzy Hash: d2812dc9456ceecc0ab1997ed26d0610e6291b736cc30df3be2897a0138c6f42
      • Instruction Fuzzy Hash: 47F03070900109BBDF209B90E945ADE7FB89B01344F000072F901F65A1D6B89969EB98
      Uniqueness

      Uniqueness Score: -1.00%