Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6W9hpMEmjY.exe

Overview

General Information

Sample name:6W9hpMEmjY.exe
renamed because original name is a hash value
Original sample name:028198ade0e557b7c6ec0194b6ec6db0.bin.exe
Analysis ID:1430679
MD5:028198ade0e557b7c6ec0194b6ec6db0
SHA1:06bc87bcf260763f38b75c03f817d2a015c9a144
SHA256:0c9be3ce8238637a3eaf5dee061f00865429f66f3ef44c07c4664bcd691d0955
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • 6W9hpMEmjY.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\6W9hpMEmjY.exe" MD5: 028198ADE0E557B7C6EC0194B6EC6DB0)
    • WerFault.exe (PID: 7732 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 204 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 6W9hpMEmjY.exeAvira: detected
Source: 6W9hpMEmjY.exeReversingLabs: Detection: 86%
Source: 6W9hpMEmjY.exeVirustotal: Detection: 74%Perma Link
Source: 6W9hpMEmjY.exeJoe Sandbox ML: detected
Source: 6W9hpMEmjY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\6W9hpMEmjY.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 204
Source: 6W9hpMEmjY.exeStatic PE information: No import functions for PE file found
Source: 6W9hpMEmjY.exe, 00000000.00000000.1315374901.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTX9195DjX50 vs 6W9hpMEmjY.exe
Source: 6W9hpMEmjY.exeBinary or memory string: OriginalFilenameTX9195DjX50 vs 6W9hpMEmjY.exe
Source: 6W9hpMEmjY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7624
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\42d8983d-5935-4e2e-aaf6-7738ef3f23d8Jump to behavior
Source: C:\Users\user\Desktop\6W9hpMEmjY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 6W9hpMEmjY.exeReversingLabs: Detection: 86%
Source: 6W9hpMEmjY.exeVirustotal: Detection: 74%
Source: unknownProcess created: C:\Users\user\Desktop\6W9hpMEmjY.exe "C:\Users\user\Desktop\6W9hpMEmjY.exe"
Source: C:\Users\user\Desktop\6W9hpMEmjY.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 204
Source: C:\Users\user\Desktop\6W9hpMEmjY.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .nkz
Source: 6W9hpMEmjY.exeStatic PE information: section name: .uxifoj
Source: 6W9hpMEmjY.exeStatic PE information: section name: .nkz
Source: 6W9hpMEmjY.exeStatic PE information: section name: .olkryl
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\6W9hpMEmjY.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
6W9hpMEmjY.exe87%ReversingLabsWin32.Trojan.Zeus
6W9hpMEmjY.exe75%VirustotalBrowse
6W9hpMEmjY.exe100%AviraTR/Crypt.XPACK.Gen
6W9hpMEmjY.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430679
    Start date and time:2024-04-24 02:42:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 3s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:13
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:6W9hpMEmjY.exe
    renamed because original name is a hash value
    Original Sample Name:028198ade0e557b7c6ec0194b6ec6db0.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 6W9hpMEmjY.exe, PID 7624 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:43:02API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    bg.microsoft.map.fastly.netcncUVRcGoI.exeGet hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://www.admin-longin.co.jp.mc3lva.cn/Get hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://www.longin-eki.co.jp.zurxyjp.cn/Get hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://xxnewmac5xx.z13.web.core.windows.net/Get hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://windowdefalerts-error0x21916-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
    • 199.232.210.172
    https://windowdefalerts-error0x21915-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
    • 199.232.210.172
    https://netorg442802-my.sharepoint.com/:b:/g/personal/darek_daronto_com/EeXtnEaZ3XJBqGk13it6odUB-K9vuYAC7zp7SfyciZ3BpQ?e=nkKu2wGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://lithiuimvalley.com/ssdGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
    • 199.232.214.172
    https://proofpoint.onelogin.sso-signon.com/Get hashmaliciousUnknownBrowse
    • 199.232.214.172
    file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
    • 199.232.210.172
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6367205040675343
    Encrypted:false
    SSDEEP:96:rWwQ8FukhKWSLaszh1oI7JfoQXIDcQvc6QcEVcw3cE/jVR+HbHg6ZAX/d5FMT2S0:r+8EK1Sus0BU/HVGjEzuiFnZ24IO8ZO
    MD5:AC7F9CE489B836481A529C2E6C0CEBE8
    SHA1:6E3225227B20AD16ED66BC801F308E4E3FA38554
    SHA-256:126A5A8BD4C500C787495017F10CA2850F4A800AF8EE3AC66E3BDC582A0C618C
    SHA-512:4CA6226E564A3EA64749956273FB3116D0881E0126266C1C09892103FCF44071707AC6920142EE13C9E8454FC9DAAA5769468D7335014E78824B186E8D4EB4BD
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.2.9.7.7.1.7.9.2.0.7.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.2.9.7.7.4.2.9.2.0.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.d.9.d.6.5.2.-.6.0.5.0.-.4.7.3.7.-.9.8.5.8.-.a.e.8.2.8.3.4.d.6.c.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.8.d.f.9.3.1.e.-.e.f.d.2.-.4.2.e.9.-.b.2.2.e.-.c.8.0.1.3.a.d.7.2.2.d.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.6.W.9.h.p.M.E.m.j.Y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.c.8.-.0.0.0.1.-.0.0.1.4.-.a.e.8.a.-.6.c.5.9.e.0.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.e.c.f.b.0.8.c.b.d.e.3.a.c.c.0.d.8.9.b.5.1.1.3.f.4.d.d.b.2.2.8.0.0.0.0.f.f.f.f.!.0.0.0.0.0.6.b.c.8.7.b.c.f.2.6.0.7.6.3.f.3.8.b.7.5.c.0.3.f.8.1.7.d.2.a.0.1.5.c.9.a.1.4.4.!.6.W.9.h.p.M.E.m.j.Y...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:42:57 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18488
    Entropy (8bit):1.9442595015300006
    Encrypted:false
    SSDEEP:96:5v8CE3OHjvHmKAlAvQZYi7n/4YmF31UmONm5bNkWIkWIeQIwEdRd6:WRKAWNOAtF31U/YbNvEzd6
    MD5:047164F0ACF7306F8F6FA97D347E8E1A
    SHA1:5897DD649748DAC14B634CDBA7B4F1F7D8543111
    SHA-256:2F449E1B74EF93C770159FB4FA47C7C8F7858161F7FABED3ABAAED14B1C05AB9
    SHA-512:A3896D84D474D8388094A5FE8D7441101997CC8A59F86BD2B77EAD8D04B6A6690D676F41838622B66C6A714981F89A0ECDB76509284CBCFFE0700B4CDAFFD47D
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........U(f............4...............<.......T...............T.......8...........T................>......................................................................................................eJ......L.......GenuineIntel............T............U(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8324
    Entropy (8bit):3.7050177296621745
    Encrypted:false
    SSDEEP:192:R6l7wVeJYK6JI6YcD4SUd2gmf8EprO89boesfEYm:R6lXJN6JI6YvSUd2gmf82odfa
    MD5:1DD7E62C7CBF69A00A6C19F67BB210D5
    SHA1:85535DDD7B6667B315C2A27677C6E92E34A0A272
    SHA-256:6AE8333ADC3C01C7FEBC48912C6F73A58CF9100D84B3AFC9DADAFF1E0FE24140
    SHA-512:3E9A1A04399B109B3313DB6187180B84FC7BB544B39DDEC71BC236D8CE0CB975F85A13A7C7501940086BCD4F6E168CC3EA9F6F8D7A907C1DF4254E9520A1AC1D
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.2.4.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4619
    Entropy (8bit):4.502192796530025
    Encrypted:false
    SSDEEP:48:cvIwWl8zsfJg77aI947WpW8VYAYm8M4JGLBFasz+q8p7A3bxd:uIjfBI76K7VsJeNsA3bxd
    MD5:150FFD1BC350856645BEF4D26AF4EFB5
    SHA1:B9F3EA974F8A9A031A3626A761C6D0CB3064C8BD
    SHA-256:EEB778CD61186463B6A960A7A3FDF62F3DAA733B1F7ECF733A03119946CF84A0
    SHA-512:1D4EFACD81F6134E86D7FEF2946EE0343513D248CA23E4A2E3CB3AAA641F19888A06F29544F9785BF1EBA753B82CC85E13DD5747774EC0F496C00A08EDD2DF15
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293265" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.393834566411105
    Encrypted:false
    SSDEEP:6144:Gl4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuN5ROBSqa:G4vF0MYQUMM6VFY7RU
    MD5:72017E1F4AF4ADC9EC35FE4B0843784D
    SHA1:28F66139586B80CA9A6BF6D2A76F26EE51582421
    SHA-256:642830735DB9F35D942A336760573F59748F6F54635951CFF35561A1FEC9DD32
    SHA-512:8D02897FB03C9ECA0CE0F82B19DD0579BAEFDB1F2D095171AC3E7F8836A1B9C67CFB954EC7878784245BA9A267F6C79ED9B10AFD4D592BCD056D723FA5A1DEEA
    Malicious:false
    Reputation:low
    Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...Y................................................................................................................................................................................................................................................................................................................................................. .m........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
    Entropy (8bit):6.628299858013664
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:6W9hpMEmjY.exe
    File size:47'104 bytes
    MD5:028198ade0e557b7c6ec0194b6ec6db0
    SHA1:06bc87bcf260763f38b75c03f817d2a015c9a144
    SHA256:0c9be3ce8238637a3eaf5dee061f00865429f66f3ef44c07c4664bcd691d0955
    SHA512:240104b006e39e14a4599d9182d5a86a2a96d914a26ba7126e964418aa167dc7191630eac240b0d846d4e0911c8824c691e87a17941a22b7b22ee93ce3355082
    SSDEEP:768:fUnSAvu6cMEtClbx0mz6QooKSJ0GebDnVR8WIisfp381c/Llf9FQ15qxtbMvcLDR:cnhvuqmQ0m2QZuXfA1L38OjUExtb4YKG
    TLSH:B8238F1662E2D8F3CE22443126E9BF76637FF8337D54ACC783104A896522DD2912B74B
    File Content Preview:MZ..........................................................l.................6.`...`...`....O..`...'.......^}f}(@.}O.V.P.=.D.7.B_-...1.$.!t...{...^re.].cxU.V.V...DX3.;.8d/...&..uL.V.....T...8...\....kjmd..!H.2.lgvI.;..tO.qX..e|7........N.hsR........]....
    Icon Hash:00928e8e8686b000
    Entrypoint:0x410304
    Entrypoint Section:.nkz
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3E334847 [Sun Jan 26 02:30:31 2003 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    call 00007FFA884F7CFFh
    add al, byte ptr [ecx+00h]
    call 00007FFA344F47F6h
    adc byte ptr [eax+00h], al
    insb
    or al, 41h
    add byte ptr [eax-7FFFBEFEh], bl
    add cl, byte ptr [eax+eax]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    inc esp
    add byte ptr [ecx], al
    add dword ptr [esi+72h], ecx
    inc eax
    add byte ptr [ebp+00h], al
    add dword ptr [ecx], eax
    push 00000072h
    inc eax
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    mov dh, byte ptr [edx+40h]
    add byte ptr [ebx+00h], al
    add dword ptr [ecx], eax
    cmpsb
    jc 00007FFA684F3C32h
    add byte ptr [ebp+00h], ah
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11dc.olkryl
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .uxifoj0x10000xe38d0x9200822c96c9858713ec19a482d8de74adedFalse0.6400363869863014data6.7119935179512495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .nkz0x100000x13600x800d32c0934fc6fe971ed8cde08c342cea1False0.39501953125data3.645609702084239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .olkryl0x120000x120000x160012bd97e046d125fdf11c9b82f3c924e6False0.6889204545454546data6.067187076777254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x240000x10000x40070861edf67c53cbac64ff774b6f9c5f8False0.39453125data2.762001444526288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 24, 2024 02:42:51.190331936 CEST1.1.1.1192.168.2.90xe215No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
    Apr 24, 2024 02:42:51.190331936 CEST1.1.1.1192.168.2.90xe215No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:42:56
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\6W9hpMEmjY.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\6W9hpMEmjY.exe"
    Imagebase:0x400000
    File size:47'104 bytes
    MD5 hash:028198ADE0E557B7C6EC0194B6EC6DB0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:02:42:57
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 204
    Imagebase:0x120000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1375335965.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1375357846.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1375376151.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1375376151.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_6W9hpMEmjY.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 6ba2068ead8c61e426769bc77282661b89c7ac0549fd707ea0ef990be71d3505
      • Instruction ID: 61f76a0ac3b7a1b4ff89f563731c461fe45e252c4236de128adafd7111798064
      • Opcode Fuzzy Hash: 6ba2068ead8c61e426769bc77282661b89c7ac0549fd707ea0ef990be71d3505
      • Instruction Fuzzy Hash: 14D1C3B1A44305BAEB206BA58D4AFBF7EA89F41314F14403FF580B52D2EF798940875E
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1375335965.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1375357846.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1375376151.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1375376151.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_6W9hpMEmjY.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 494530a21cbceca3e0db01d9583dbaf78bd4040d22689b67190a4c0714f1f18d
      • Instruction ID: fc9a663a2bd2d8528119567c51527500a7dfbb8a2f76faf961b164dc3110fbe4
      • Opcode Fuzzy Hash: 494530a21cbceca3e0db01d9583dbaf78bd4040d22689b67190a4c0714f1f18d
      • Instruction Fuzzy Hash: 0251A2B24402147FDB11ABA9EC46FFF37ACAF95708F14443AF911F7192EA7899048768
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1375335965.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1375357846.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1375376151.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1375376151.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_6W9hpMEmjY.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: ae8db38646a89a2f5ed4727abbcb65f41a713295528821256727b87fd8a2b525
      • Instruction ID: e3a8399fb03ea5441ac8e59a336333a7135dd30eab7360b7d3bc5551a1e74678
      • Opcode Fuzzy Hash: ae8db38646a89a2f5ed4727abbcb65f41a713295528821256727b87fd8a2b525
      • Instruction Fuzzy Hash: 83C16CB5D00209AFDB10DFA4C884AEEBBB9FF88304F14846AE601B7291D7799D45DB64
      Uniqueness

      Uniqueness Score: -1.00%