Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AqMgzgRakW.exe

Overview

General Information

Sample name:AqMgzgRakW.exe
renamed because original name is a hash value
Original sample name:09d14b5ce1e4611919cc11a36f7447b6.bin.exe
Analysis ID:1430675
MD5:09d14b5ce1e4611919cc11a36f7447b6
SHA1:741f7554e82aedc4e43cb01c51a01809e68c2270
SHA256:a40bff9dcaecf139c90bee8a02955012c6a12c596e353e33fc9c9a1875449131
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

  • System is w10x64
  • AqMgzgRakW.exe (PID: 2180 cmdline: "C:\Users\user\Desktop\AqMgzgRakW.exe" MD5: 09D14B5CE1E4611919CC11A36F7447B6)
    • WerFault.exe (PID: 3452 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AqMgzgRakW.exeAvira: detected
Source: AqMgzgRakW.exeReversingLabs: Detection: 84%
Source: AqMgzgRakW.exeVirustotal: Detection: 72%Perma Link
Source: AqMgzgRakW.exeJoe Sandbox ML: detected
Source: AqMgzgRakW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\AqMgzgRakW.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 232
Source: AqMgzgRakW.exeStatic PE information: No import functions for PE file found
Source: AqMgzgRakW.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2180
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\de25f3a6-76d4-4216-b4ea-1d1156f16587Jump to behavior
Source: C:\Users\user\Desktop\AqMgzgRakW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: AqMgzgRakW.exeReversingLabs: Detection: 84%
Source: AqMgzgRakW.exeVirustotal: Detection: 72%
Source: unknownProcess created: C:\Users\user\Desktop\AqMgzgRakW.exe "C:\Users\user\Desktop\AqMgzgRakW.exe"
Source: C:\Users\user\Desktop\AqMgzgRakW.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 232
Source: C:\Users\user\Desktop\AqMgzgRakW.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .gled
Source: AqMgzgRakW.exeStatic PE information: section name: .hod
Source: AqMgzgRakW.exeStatic PE information: section name: .gled
Source: AqMgzgRakW.exeStatic PE information: section name: .oxub
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\AqMgzgRakW.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AqMgzgRakW.exe84%ReversingLabsWin32.Trojan.Zeus
AqMgzgRakW.exe73%VirustotalBrowse
AqMgzgRakW.exe100%AviraTR/Crypt.XPACK.Gen
AqMgzgRakW.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430675
    Start date and time:2024-04-24 02:38:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:AqMgzgRakW.exe
    renamed because original name is a hash value
    Original Sample Name:09d14b5ce1e4611919cc11a36f7447b6.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.20
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target AqMgzgRakW.exe, PID 2180 because there are no executed function
    TimeTypeDescription
    02:39:09API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.634254469079764
    Encrypted:false
    SSDEEP:96:QrFa6Bkwini8LsBzhVBR7Y9/BQXIDcQvc6QcEVcw3cE/qAd+HbHg6ZAX/d5FMT2o:SgUkhLDm0BU/QjEzuiF7Z24IO8LAK
    MD5:29170D4B84190DBF4468767DBE89DA3D
    SHA1:96876D22081C772D67E3FFFC1765B8309E1048E8
    SHA-256:0F51748A1A9EC3AE6DF05AF08718AE499A96568AE9AB62223F20D8D1F0202EA0
    SHA-512:FA7DC228AAC0AA73126B51E4B1EFD77F11B88D5EA28315E4F217260A03F483CFD7BBA7124B5F96D81C93AC7586B65CEFB5EB9DC99CE82250A260FE4630752B39
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.2.7.3.2.0.3.1.1.4.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.2.7.3.2.3.4.3.6.3.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.c.7.0.d.9.5.-.9.6.4.f.-.4.b.c.c.-.8.0.6.9.-.a.6.6.3.2.9.b.5.7.d.b.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.4.1.d.c.e.9.9.-.4.e.8.c.-.4.7.3.8.-.8.e.f.0.-.a.1.9.1.1.9.0.3.5.7.e.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.q.M.g.z.g.R.a.k.W...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.8.4.-.0.0.0.1.-.0.0.1.4.-.6.5.6.4.-.6.9.c.7.d.f.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.f.8.3.2.1.5.c.4.9.a.8.d.5.5.c.d.4.6.8.d.b.3.8.e.e.2.3.6.0.b.5.0.0.0.0.f.f.f.f.!.0.0.0.0.7.4.1.f.7.5.5.4.e.8.2.a.e.d.c.4.e.4.3.c.b.0.1.c.5.1.a.0.1.8.0.9.e.6.8.c.2.2.7.0.!.A.q.M.g.z.g.R.a.k.W...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:38:52 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.9901183965753342
    Encrypted:false
    SSDEEP:96:518GE3wN5P8AN5vClbmi7nwiX44/zoaHk7glqBS2WIkWI/Wm498u1EO:ICN5vLODX4Y3lly980EO
    MD5:4B96D6C43FF51075237D3E7C005509C4
    SHA1:162B75DB07DD5BAAC28F011B931BF79789DE1CB6
    SHA-256:9AE58F7C0BB9C25061A681F934710642B4FADAECBD47F2ADD6D7D1244BEC3D12
    SHA-512:E9C6DA6948854E441CD506C66B5BB0CD947B784E522646426A679363FAFC6BB48D94074E0D1FCFEB5D08A2E883A3EA67BF9D9FE05654D0C50242A7679CF9B70D
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........T(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............T(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8284
    Entropy (8bit):3.696563126406361
    Encrypted:false
    SSDEEP:192:R6l7wVeJKh6tJ/6YEIH6SU9V5gmfOypr+89b8r/sfBuTm:R6lXJE6tJ/6YEVSU9V5gmfOA8rkfoK
    MD5:430E33347F67FEE0CBB60CFB907224BB
    SHA1:3A04116D45DD29DC6B6BCBB59D6972BE09EBDDE5
    SHA-256:26DC910F85396388F12E039F77B4EAA857BEA4BA5D173F2A2178E9086FDA6E6C
    SHA-512:571E0836D9B12539E8464F5297EBCE727878436CFE900BDC8B8A9BBAC844D10369BAB16C579FE70B144ECBDDB1927FFCD3D8FB048DACBD2C8271B9472BA3E00D
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.1.8.0.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.468828655570122
    Encrypted:false
    SSDEEP:48:cvIwWl8zsbJg77aI9HsWpW8VYg/Ym8M4J36+tiFJ+q8IpOgauFE0wMd:uIjf1I7NF7VFiJ3Xt+xpOfmE0wMd
    MD5:0F110B9CB936473A1760FE1C4B3A6906
    SHA1:6915D3C69BC5CB338E3CC87E1E11EC6D38B0D648
    SHA-256:484584EDDA4088171F54DE60FD94BF293AC74CDB74B9EBD2879F4C5D8DA44947
    SHA-512:A29274F560A84A38AF4BEB572007CF26DD7153B543BF1ED5E57112C3E3736ABF9377EED5FF4E0EA84AA27BBF5A97C1C9E99A5BE5008831BF9C7BD2D930706D0E
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.421591884321019
    Encrypted:false
    SSDEEP:6144:OSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN00uhiTw:tvloTMW+EZMM6DFym03w
    MD5:89642CB4C4D6A7089CAD8425876F98A4
    SHA1:0252F8A17BFF470A0B7AC703608E2A78A3496AFD
    SHA-256:05CA61DBE78F1F1C15E3499C50947FD8BC6EFBA7B6A598375CB533C24A2FBD6A
    SHA-512:D2451955619EA6363CBD9543675F419DF80C4A5450B10FFABFA6BA7F5777DE97FEB5436F0BED36589E78B6829DCFCC21572B26B7C543B69BC42526D3868CC7EA
    Malicious:false
    Reputation:low
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...................................................................................................................................................................................................................................................................................................................................................k..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.695315955810484
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Sybase iAnywhere database files (19/3) 0.00%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:AqMgzgRakW.exe
    File size:45'056 bytes
    MD5:09d14b5ce1e4611919cc11a36f7447b6
    SHA1:741f7554e82aedc4e43cb01c51a01809e68c2270
    SHA256:a40bff9dcaecf139c90bee8a02955012c6a12c596e353e33fc9c9a1875449131
    SHA512:3420f6bf151a7765ab1aebf817ff0dfc4e1979dfc217bb07320099ad5d2cfc37f2a5062acb9785313b16f78a8219b02bf83b690bf2903c808a199f68aecea4fd
    SSDEEP:768:hn+Avu65MoHFNdxTFHyvvkTLFdvkUTRe4GtZaVS4frcPuchUmioYT:hnNvu7ODdxGkTxdccpQZKINhUmj
    TLSH:42138D9773D2C8F3CD6140712379A72667AEDD234068A98BC7384D9529327D2923BF1B
    File Content Preview:MZ..........................................................d.......mix.F.....6..............O...'..'.......^}f}(@.vR.G...N.J...=...+.5l!.!.#.*{...^}f}(@.xS.K...I..C....&9......na..rU.....{:..........wF. K.M._.......G.)0.Z../.Q.."E..fy@........S......P.z=
    Icon Hash:00928e8e8686b000
    Entrypoint:0x40f2ff
    Entrypoint Section:.gled
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3E249EB7 [Tue Jan 14 23:35:19 2003 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    add ah, dh
    adc byte ptr [eax+00h], al
    sar dl, 1
    inc eax
    add byte ptr [eax], ah
    inc eax
    add byte ptr [eax-4Fh], al
    or eax, dword ptr [eax]
    in al, 10h
    inc eax
    add byte ptr [esp+edi*8+40h], dl
    add byte ptr [eax-27FFBF0Eh], bl
    mov cl, 0Bh
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    sbb eax, 43004070h
    add byte ptr [ecx], al
    add dword ptr [ecx], edi
    jo 00007F4B88B2E6D2h
    add byte ptr [eax+00h], al
    add dword ptr [ecx], eax
    pop ecx
    jo 00007F4B88B2E6D2h
    add byte ptr [ecx+00h], al
    add dword ptr [ecx], eax
    jne 00007F4B88B2E702h
    inc eax
    add byte ptr [ebx+00h], ah
    add byte ptr [eax], al
    xchg eax, ebp
    jo 00007F4B88B2E6D2h
    add byte ptr [eax+eax+00h], ah
    add byte ptr [ebp+62004070h], dl
    add byte ptr [ecx], al
    add ecx, eax
    jo 00007F4B88B2E6D2h
    add byte ptr [edi], bh
    add byte ptr [eax], al
    add byte ptr [edx+71h], bh
    inc eax
    add byte ptr [ebx], bh
    add byte ptr [eax], al
    add byte ptr [ebp+3C004071h], cl
    add byte ptr [eax], al
    add ebp, eax
    jno 00007F4B88B2E6D2h
    add byte ptr [00000000h], bh
    add byte ptr [eax], al
    add byte ptr [esi], bh
    add byte ptr [ecx], al
    add ebp, ebx
    jno 00007F4B88B2E6D2h
    add byte ptr [eax+eax+00h], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ecx], bh
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edx], bh
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ebp+00h], al
    add dword ptr [ecx], eax
    adc al, 72h
    inc eax
    add byte ptr [esi+00h], al
    add dword ptr [ecx], eax
    adc al, 72h
    inc eax
    add byte ptr [edi+00h], al
    add dword ptr [ecx], eax
    adc al, 72h
    inc eax
    add byte ptr [eax+00h], cl
    add dword ptr [ecx], eax
    adc al, 72h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x11b0.oxub
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .hod0x10000xdfcb0x9000dc256cbe354ad3daf593315f3613a8d5False0.641357421875data6.684705436073654IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .gled0xf0000x13400x8006ab95f85e796baad27ac846767ac8a5fFalse0.392578125data3.650483046862012IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .oxub0x110000x120000x1400c60dd2ae6558428a632ce23bdb55d7c9False0.7646484375data6.440245400510256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:38:51
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\AqMgzgRakW.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\AqMgzgRakW.exe"
    Imagebase:0x400000
    File size:45'056 bytes
    MD5 hash:09D14B5CE1E4611919CC11A36F7447B6
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:02:38:51
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 232
    Imagebase:0x5e0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2165750368.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2165768239.000000000040F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2165784740.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_AqMgzgRakW.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: e20ff75ed9c2f19b4b482a8b0a0dda243c1ad8c77b054686f16a6121575a5569
      • Instruction ID: 412dc81828b76532b1a724b24382706326f3888f22ae90a189988c42f9c3c4a7
      • Opcode Fuzzy Hash: e20ff75ed9c2f19b4b482a8b0a0dda243c1ad8c77b054686f16a6121575a5569
      • Instruction Fuzzy Hash: F9D10571904306BAEB206B658D4AFAF7EA8AF01314F10443FF584B62D2EF7D89458B5D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2165750368.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2165768239.000000000040F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2165784740.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_AqMgzgRakW.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 186d2bfbbc5984762194e9f1303ac22736c077c5b94da472765f9f7578a715c7
      • Instruction ID: 3a5b9734d278af689976604786e8d9ff9bb5bbcdda7204a16fb3e4f563151526
      • Opcode Fuzzy Hash: 186d2bfbbc5984762194e9f1303ac22736c077c5b94da472765f9f7578a715c7
      • Instruction Fuzzy Hash: 5D519DB26802457FDB01EBA5DC42FFB37ACAB55704F04443BB921F7192EA7999048B68
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2165750368.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2165768239.000000000040F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2165784740.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_AqMgzgRakW.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: 00df294db5ae1834efe00f3bca67cb04b6fa2e8b2fa2a46b69c606a7f541436d
      • Instruction ID: 5889646a11195f38e56dd3f2f566bd701cd36e8452073dc2e8a54158b2b003bc
      • Opcode Fuzzy Hash: 00df294db5ae1834efe00f3bca67cb04b6fa2e8b2fa2a46b69c606a7f541436d
      • Instruction Fuzzy Hash: C3C14BB1D00209AFDF11DFD4C884EAEBBB9EF89304F14846AE605B7291D7399E45CB64
      Uniqueness

      Uniqueness Score: -1.00%