Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cncUVRcGoI.exe

Overview

General Information

Sample name:cncUVRcGoI.exe
renamed because original name is a hash value
Original sample name:02d4e96072e72dcbe5f9039ec7f2a4e6.bin.exe
Analysis ID:1430676
MD5:02d4e96072e72dcbe5f9039ec7f2a4e6
SHA1:b12bbd637110aa367797972c69108f52383d341e
SHA256:aaf93f6187f18b40300a9135bd49a9b8dafab53c2ef5ccdae122e8ccb552b9b4
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cncUVRcGoI.exe (PID: 5900 cmdline: "C:\Users\user\Desktop\cncUVRcGoI.exe" MD5: 02D4E96072E72DCBE5F9039EC7F2A4E6)
    • WerFault.exe (PID: 7376 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: cncUVRcGoI.exeAvira: detected
Source: cncUVRcGoI.exeReversingLabs: Detection: 89%
Source: cncUVRcGoI.exeVirustotal: Detection: 67%Perma Link
Source: cncUVRcGoI.exeJoe Sandbox ML: detected
Source: cncUVRcGoI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\cncUVRcGoI.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 232
Source: cncUVRcGoI.exeStatic PE information: No import functions for PE file found
Source: cncUVRcGoI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5900
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3bcdc20b-9f49-4c53-b5d4-ce348aec38fdJump to behavior
Source: C:\Users\user\Desktop\cncUVRcGoI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: cncUVRcGoI.exeReversingLabs: Detection: 89%
Source: cncUVRcGoI.exeVirustotal: Detection: 67%
Source: unknownProcess created: C:\Users\user\Desktop\cncUVRcGoI.exe "C:\Users\user\Desktop\cncUVRcGoI.exe"
Source: C:\Users\user\Desktop\cncUVRcGoI.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 232
Source: C:\Users\user\Desktop\cncUVRcGoI.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .ifmlcp
Source: cncUVRcGoI.exeStatic PE information: section name: .dcjsn
Source: cncUVRcGoI.exeStatic PE information: section name: .ifmlcp
Source: cncUVRcGoI.exeStatic PE information: section name: .zepwl
Source: C:\Users\user\Desktop\cncUVRcGoI.exeCode function: 4_2_004000CD push eax; retf 4_2_004000D8
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\cncUVRcGoI.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
cncUVRcGoI.exe89%ReversingLabsWin32.Trojan.Zeus
cncUVRcGoI.exe68%VirustotalBrowse
cncUVRcGoI.exe100%AviraTR/Crypt.XPACK.Gen
cncUVRcGoI.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.10.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430676
    Start date and time:2024-04-24 02:39:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 0s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:cncUVRcGoI.exe
    renamed because original name is a hash value
    Original Sample Name:02d4e96072e72dcbe5f9039ec7f2a4e6.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target cncUVRcGoI.exe, PID 5900 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:39:58API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    bg.microsoft.map.fastly.nethttps://www.admin-longin.co.jp.mc3lva.cn/Get hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://www.longin-eki.co.jp.zurxyjp.cn/Get hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://xxnewmac5xx.z13.web.core.windows.net/Get hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://windowdefalerts-error0x21916-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
    • 199.232.210.172
    https://windowdefalerts-error0x21915-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
    • 199.232.210.172
    https://netorg442802-my.sharepoint.com/:b:/g/personal/darek_daronto_com/EeXtnEaZ3XJBqGk13it6odUB-K9vuYAC7zp7SfyciZ3BpQ?e=nkKu2wGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://lithiuimvalley.com/ssdGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
    • 199.232.214.172
    https://proofpoint.onelogin.sso-signon.com/Get hashmaliciousUnknownBrowse
    • 199.232.214.172
    file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
    • 199.232.210.172
    https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DlLb9_7VBE-2BPKrWdDFE8TeQU0FNoYmRNt3BbsAfHCQfpyMVcUv91cWM1GbR6tMnpfVZqwoeCii1Z-2FHB6Wp4CGi-2FJ4Nq2flvhbRyRKwbWUqyssDslf87wBQZbBQ0EZsTXlvzjuj1ZnarL4QCJJlvUup-2FiM-2F9GPG6X3nhhKKp6sQ0v-2BBs5Jrrpzc3e5B2aUKKEJUx1Hjrx3xc16wmpK1HmM2sLiNIweMaJlJ9frDis7-2BK565mLw-3DGet hashmaliciousHTMLPhisherBrowse
    • 199.232.214.172
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6318916727952989
    Encrypted:false
    SSDEEP:96:ibF/WYL2ujsYh3y7qnOOQXIDcQvc6QcEVcw3cE/j2S+HbHg6ZAX/d5FMT2SlPkpK:ct3LHjI0BU/H2bjEzuiFWZ24IO8aV
    MD5:04133BE62761F93BD6D88003FD97918D
    SHA1:C21E251C5A903764C3429B52F00F86EC35606D1F
    SHA-256:D626A0409E454338440A30195EDBA18922376BE635F27F526C8E82308463A516
    SHA-512:C371A5B9402D45534305890D7EE7656959932BF1EC245F6C01E94DC7D3ED1C5FE0A8BEE59D8D4EED0597100115E43CF6335A65EF00C7877112A151478E2A9CAD
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.2.7.9.3.2.6.7.7.4.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.2.7.9.3.6.7.3.9.8.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.5.e.d.1.a.3.9.-.3.6.5.e.-.4.3.2.4.-.8.9.e.9.-.b.f.9.9.0.f.c.9.f.7.0.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.a.5.9.9.2.6.-.5.e.a.9.-.4.b.d.e.-.8.2.c.1.-.7.a.e.c.8.3.0.a.8.a.d.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.c.n.c.U.V.R.c.G.o.I...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.0.c.-.0.0.0.1.-.0.0.1.4.-.5.8.1.6.-.a.9.e.b.d.f.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.d.4.b.6.f.f.0.2.5.f.5.e.9.b.2.2.1.8.e.7.e.5.4.c.1.1.9.d.b.5.c.0.0.0.0.f.f.f.f.!.0.0.0.0.b.1.2.b.b.d.6.3.7.1.1.0.a.a.3.6.7.7.9.7.9.7.2.c.6.9.1.0.8.f.5.2.3.8.3.d.3.4.1.e.!.c.n.c.U.V.R.c.G.o.I...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:39:53 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.991435538483149
    Encrypted:false
    SSDEEP:96:5I8gE3DlbHjvH9BZoi7n+SZ6lk7GJ1UilPlk+lv/lYm5bxlFWI0WI/4I4TNy:l3leO+SklyGJ1UilPlvlv/lhbxljTNy
    MD5:A0CF3EE4130BD3BDE4BCBCC4A90DC28D
    SHA1:93975494BF74B4D0546F9D97EA1B4EB466C0F91B
    SHA-256:B9BAAAD595CCA6D43A1ABB3A709580B713D2E0ADC1D29CB8775699D9A5293323
    SHA-512:D89BA57724744A9FD1416BAE82F111AE78D83D19439EF9E86E04F49D8CB379CCD8F080570EB822BB5597B659881E4177309F1B2DAB1A742EEC8A463C945D413A
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........T(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............T(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8282
    Entropy (8bit):3.6957408617413896
    Encrypted:false
    SSDEEP:192:R6l7wVeJpOs6/s6YcDBSU9oF7qagmfmNXprx89b4xsf0nNom:R6lXJpN6/s6YGSU9sqagmf4k4qfSH
    MD5:858331CC933319ECD001C768CDDC8E9E
    SHA1:A43E4879992F44AF4AB563A57019A55C5A25FF13
    SHA-256:3DB376E5C337225BE88A2CBA65C5BCB8D9F5B857D244C80C5DA213D6CBF94D0E
    SHA-512:B6DCF2287F2E2EE12154CE32F2B557B62B3622E39572A8584429C09D197AD007EE110312807EFFEC9003D0BF693FCB13C9258238A5F62F57E2B8577686036639
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.0.0.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.461874929979743
    Encrypted:false
    SSDEEP:48:cvIwWl8zsGJg77aI9OJWpW8VYKYm8M4JQyF/w9+q8M6rvSNMhdd:uIjfcI7U47VeJ69+vSNMhdd
    MD5:8D542A0F809C600BF6F0F92B78B59C05
    SHA1:CC0524A592B5DF2AA0DB4A15F022D95D4383B804
    SHA-256:6E179AB1E97498ABE23FACDF26043154F1C82C9B14409ACAE0A92F3424351F4C
    SHA-512:C56FE1643716D1B6DD666F102688823A7512D6368776AC0B71C7BA600A11EFCB37CF1F6FE2BBE9A7BE76A5725045F555310EA25A347D413AE2A2C61EE9E6874A
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293262" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.393803981626123
    Encrypted:false
    SSDEEP:6144:ll4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNAjOBSqa:74vF0MYQUMM6VFYSjU
    MD5:3B27F58AB7AF860DAA182CB507A31183
    SHA1:129DD8D5E60310FF5FDC11C2BF88513A8EDA8D3F
    SHA-256:1567233BFDD5683EDEF55E53DE2AAF6AA4DBDB0848C196F4B84B4C61941750B8
    SHA-512:2030F9205A74AC43D4D60C1E61EBE7E8E99FA9DF4ECE9A4474450ACDCF85E802751129673CA41D4FD98F2A3A2EFA80D2CCDB181D583E18E588B464943787E3B4
    Malicious:false
    Reputation:low
    Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....................................................................................................................................................................................................................................................................................................................................................E..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.714818429710074
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Sybase iAnywhere database files (19/3) 0.00%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:cncUVRcGoI.exe
    File size:45'056 bytes
    MD5:02d4e96072e72dcbe5f9039ec7f2a4e6
    SHA1:b12bbd637110aa367797972c69108f52383d341e
    SHA256:aaf93f6187f18b40300a9135bd49a9b8dafab53c2ef5ccdae122e8ccb552b9b4
    SHA512:98fd05d8a8f7d38bce807991a9615da583dd3905ced89164599a576bd4eb55cb9c1272a37a9c60c7b40e914f2e3d9096aedbd494d0e2661dccf4f1d5ef5e30b1
    SSDEEP:768:eXSAvu65Mb/ZKBs9hzCF0kcVp6gCmylyW/VSJJfgYpN6Y9SbKNM86RNcfa:eXhvu7bUchzCFqCfNdGYWNSFlRNcC
    TLSH:45137C2761D6DDF2CD21847022A9BFB5677EF8327C686C87D32058885926DC2D13B68B
    File Content Preview:MZP.........................................................<.......ls1.....`..3.'.......eR. &......&.......^}f}(@..K.C.?.ES@.@.../...7l*.........^}f}(@.xS.K...I....f. [.../.1(C......0+:.....8..5.g.)@..]..N.H...,7.yP.Z....!X...<...`....onqh.2%L.6.pkzM.?..
    Icon Hash:00928e8e8686b000
    Entrypoint:0x4102dc
    Entrypoint Section:.ifmlcp
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x40DDD8BA [Sat Jun 26 20:12:42 2004 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    ficom word ptr [esi]
    add al, bh
    adc byte ptr [eax+00h], al
    ror byte ptr [ecx+eax*2], 1
    add byte ptr [eax-4FFFBEFFh], ch
    out dx, al
    push ss
    add al, ch
    adc byte ptr [eax+00h], al
    inc eax
    or eax, dword ptr [ecx+00h]
    push 28004100h
    out dx, eax
    push ss
    add ah, bl
    adc byte ptr [eax+00h], al
    ror byte ptr [edx], 1
    inc ecx
    add byte ptr [eax], ah
    add al, byte ptr [ecx+00h]
    mov eax, CC0016F9h
    adc byte ptr [eax+00h], al
    push esp
    or al, 41h
    add byte ptr [eax+50004102h], bl
    cli
    push ss
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    mov al, 71h
    inc eax
    add byte ptr [ebx+00h], al
    add dword ptr [ecx], eax
    int3
    jno 00007F7EFD63EE52h
    add byte ptr [eax+00h], al
    add dword ptr [ecx], eax
    in al, dx
    jno 00007F7EFD63EE52h
    add byte ptr [ecx+00h], al
    add dword ptr [ecx], eax
    or byte ptr [edx+40h], dh
    add byte ptr [ebx+00h], ah
    add byte ptr [eax], al
    sub byte ptr [edx+40h], dh
    add byte ptr [eax+eax+00h], ah
    add byte ptr [eax], ch
    jc 00007F7EFD63EE52h
    add byte ptr [edx+00h], ah
    add dword ptr [ecx], eax
    push esp
    jc 00007F7EFD63EE52h
    add byte ptr [edi], bh
    add byte ptr [eax], al
    add byte ptr [3B004073h], cl
    add byte ptr [eax], al
    add byte ptr [ebx], dh
    jnc 00007F7EFD63EE52h
    add byte ptr [eax+eax], bh
    add byte ptr [ecx], al
    imul esi, dword ptr [ebx+40h], 00h
    cmp eax, 00000000h
    add byte ptr [eax], al
    add byte ptr [esi], bh
    add byte ptr [ecx], al
    add dword ptr [ebx+44004073h], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ecx], bh
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edx], bh
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11c0.zepwl
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .dcjsn0x10000xe1c50x9000a73cbf71ad7f016984a4e7fc5c823b90False0.6405707465277778data6.704546854599579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .ifmlcp0x100000x13480x8007b90387a92c7289e532392e96555b9c7False0.3828125data3.606615726309941IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .zepwl0x120000x120000x1400ae36840448e39ff6c57a5b3f1b3e3864False0.768359375data6.463788197936661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 24, 2024 02:39:50.489134073 CEST1.1.1.1192.168.2.90x3e49No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
    Apr 24, 2024 02:39:50.489134073 CEST1.1.1.1192.168.2.90x3e49No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:4
    Start time:02:39:52
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\cncUVRcGoI.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\cncUVRcGoI.exe"
    Imagebase:0x400000
    File size:45'056 bytes
    MD5 hash:02D4E96072E72DCBE5F9039EC7F2A4E6
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:10
    Start time:02:39:52
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 232
    Imagebase:0xb70000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000004.00000002.1340647378.0000000000400000.00000002.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000004.00000002.1340671824.0000000000410000.00000080.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000004.00000002.1340695936.0000000000412000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_400000_cncUVRcGoI.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 3d97e13b26dd3522426740f9ef330935d407586b4be8ae1d2fab12bb6580138b
      • Instruction ID: 59d8166cf7fdbc8642873738d8a9e224d455259228864f6ab74ce0bd7437e5d1
      • Opcode Fuzzy Hash: 3d97e13b26dd3522426740f9ef330935d407586b4be8ae1d2fab12bb6580138b
      • Instruction Fuzzy Hash: BED11872A043057AEB206B658D4AFAF3BA5AF01314F14853FF584B52D2EF7D89408B5D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000004.00000002.1340647378.0000000000400000.00000002.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000004.00000002.1340671824.0000000000410000.00000080.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000004.00000002.1340695936.0000000000412000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_400000_cncUVRcGoI.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: bfa9e0e8f93ebcb696615f31a79b2cd5a7e6613cf0397390e58cb46fd9c26f08
      • Instruction ID: ce5992a1e8597fd9f99c918568e02d4bac0e9eefda6d1d835df4ec560f4ef6db
      • Opcode Fuzzy Hash: bfa9e0e8f93ebcb696615f31a79b2cd5a7e6613cf0397390e58cb46fd9c26f08
      • Instruction Fuzzy Hash: 1751D0B28442057AEB01AFB59C42EFF77ECEB59308F04487AF951F7193E67899048768
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000004.00000002.1340647378.0000000000400000.00000002.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000004.00000002.1340671824.0000000000410000.00000080.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000004.00000002.1340695936.0000000000412000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_400000_cncUVRcGoI.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: fb840e002854e893a129d17ca01043337550de5d8a5a387fc79acaf0b1d6308d
      • Instruction ID: 903573b7c01c78df619722caa9871fb643df9eb697e2aa793103dc107844da95
      • Opcode Fuzzy Hash: fb840e002854e893a129d17ca01043337550de5d8a5a387fc79acaf0b1d6308d
      • Instruction Fuzzy Hash: 43C159B5D00209AFDB10DFE4C884EEEBBB9EF89304F14846AE501B7291D779AD45CB64
      Uniqueness

      Uniqueness Score: -1.00%