Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9RCD7cPzza.exe

Overview

General Information

Sample name:9RCD7cPzza.exe
renamed because original name is a hash value
Original sample name:0ddf2aeeb49e6e35132ea103a89259ef.bin.exe
Analysis ID:1430680
MD5:0ddf2aeeb49e6e35132ea103a89259ef
SHA1:80d6e6086858e22f5de591423fc08d5ce64f222b
SHA256:1207199c662ef02c36e37beee575f6dbd6dc46013b662ffb3b26a749764b6f15
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • 9RCD7cPzza.exe (PID: 5652 cmdline: "C:\Users\user\Desktop\9RCD7cPzza.exe" MD5: 0DDF2AEEB49E6E35132EA103A89259EF)
    • WerFault.exe (PID: 2868 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 564 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 9RCD7cPzza.exeAvira: detected
Source: 9RCD7cPzza.exeReversingLabs: Detection: 86%
Source: 9RCD7cPzza.exeVirustotal: Detection: 76%Perma Link
Source: 9RCD7cPzza.exeJoe Sandbox ML: detected
Source: 9RCD7cPzza.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\9RCD7cPzza.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 228
Source: 9RCD7cPzza.exeStatic PE information: No import functions for PE file found
Source: 9RCD7cPzza.exe, 00000000.00000002.1344386893.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerVdP3P3Vf., vs 9RCD7cPzza.exe
Source: 9RCD7cPzza.exeBinary or memory string: OriginalFilenamerVdP3P3Vf., vs 9RCD7cPzza.exe
Source: 9RCD7cPzza.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@3/9@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5652
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\33d70dc5-9635-48e2-a116-29eec6ad845dJump to behavior
Source: C:\Users\user\Desktop\9RCD7cPzza.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 9RCD7cPzza.exeReversingLabs: Detection: 86%
Source: 9RCD7cPzza.exeVirustotal: Detection: 76%
Source: unknownProcess created: C:\Users\user\Desktop\9RCD7cPzza.exe "C:\Users\user\Desktop\9RCD7cPzza.exe"
Source: C:\Users\user\Desktop\9RCD7cPzza.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 228
Source: C:\Users\user\Desktop\9RCD7cPzza.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 232
Source: C:\Users\user\Desktop\9RCD7cPzza.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .qrmx
Source: 9RCD7cPzza.exeStatic PE information: section name: .ohmp
Source: 9RCD7cPzza.exeStatic PE information: section name: .qrmx
Source: 9RCD7cPzza.exeStatic PE information: section name: .lmtov
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\9RCD7cPzza.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1430680 Sample: 9RCD7cPzza.exe Startdate: 24/04/2024 Architecture: WINDOWS Score: 60 12 Antivirus / Scanner detection for submitted sample 2->12 14 Multi AV Scanner detection for submitted file 2->14 16 Machine Learning detection for sample 2->16 6 9RCD7cPzza.exe 2->6         started        process3 process4 8 WerFault.exe 2 16 6->8         started        10 WerFault.exe 19 16 6->10         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
9RCD7cPzza.exe87%ReversingLabsWin32.Trojan.Zeus
9RCD7cPzza.exe76%VirustotalBrowse
9RCD7cPzza.exe100%AviraTR/Crypt.XPACK.Gen
9RCD7cPzza.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430680
    Start date and time:2024-04-24 02:43:39 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 12s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:24
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:9RCD7cPzza.exe
    renamed because original name is a hash value
    Original Sample Name:0ddf2aeeb49e6e35132ea103a89259ef.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@3/9@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 9RCD7cPzza.exe, PID 5652 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:44:43API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6312396253003719
    Encrypted:false
    SSDEEP:96:DMiR4NOHa2s0hN+7YC8SZQXIDcQzc645cocE1cw345cLOK+HbHg6ZAX/d5FMT2SC:94QHa2d0tM/KjEzuiFdZ24IO83C
    MD5:62FD6A5E7B4E87F3C85EDF469A929622
    SHA1:00530F1D16E87C7787B20E2340624AD36863ED18
    SHA-256:20B4D59FE73F80FB3515E65494087279615F758BF7FFDAF95702C4D4A05AC30E
    SHA-512:3D45B86B66F7B561BD9732E4C33EC435E4E256A113ED96EED7512E17CC5AB68E8522DDECA4CFE639E64466E55C7EF82CFB222D831A360BA75295790CF67F3500
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.0.7.0.2.8.1.0.6.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.b.c.a.e.b.1.-.0.2.5.4.-.4.8.a.3.-.9.1.9.6.-.4.7.b.f.2.8.b.d.5.c.2.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.7.a.3.0.5.c.9.-.2.d.c.4.-.4.c.d.5.-.b.2.7.a.-.0.c.0.f.6.8.8.8.5.1.e.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.9.R.C.D.7.c.P.z.z.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.1.4.-.0.0.0.1.-.0.0.1.4.-.4.a.8.d.-.0.d.9.1.e.0.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.c.f.3.0.e.1.d.1.2.f.c.3.8.6.7.c.b.8.9.9.0.6.9.9.6.8.d.e.d.4.9.0.0.0.0.f.f.f.f.!.0.0.0.0.8.0.d.6.e.6.0.8.6.8.5.8.e.2.2.f.5.d.e.5.9.1.4.2.3.f.c.0.8.d.5.c.e.6.4.f.2.2.2.b.!.9.R.C.D.7.c.P.z.z.a...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.5././.0.9././.1.3.:.0.1.:.5.6.:.1.9.!.0.!.9.R.C.D.7.c.P.z.z.a...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6352926845633695
    Encrypted:false
    SSDEEP:96:yTF9QyNOHaUs0hN+7AfCQQXIDcQvc6QcEVcw3cE/9OK+HbHg6ZAX/d5FMT2SlPkW:UPXQHaUK0BU/ojEzuiFdZ24IO8qC
    MD5:9697CAEA2B8DD2D4FEBAE1D8DEDD7B9E
    SHA1:4868596E74A8A9D7D82C1663957BDDA0E3A6AD99
    SHA-256:45A791AFD62F2D0A348C5825BF1C2CB8F559F1FF73DC2DE3C00E4FBCF84AD291
    SHA-512:ADF6ABF0B45B85520B2688923716EFD51AA1988DC80B5B35E219520D230382DDB1F31F6A64CB8F9073BD12563354D909D360034C4E3854E7CE3091EED5E165BC
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.0.7.0.8.0.7.8.5.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.0.7.1.3.7.0.3.6.1.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.1.a.d.0.7.a.b.-.1.6.5.d.-.4.5.4.f.-.a.b.9.6.-.9.1.9.f.9.2.a.d.9.2.b.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.7.b.4.c.a.2.c.-.7.3.5.8.-.4.f.9.f.-.a.b.9.2.-.5.d.b.1.a.e.a.3.9.2.6.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.9.R.C.D.7.c.P.z.z.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.1.4.-.0.0.0.1.-.0.0.1.4.-.4.a.8.d.-.0.d.9.1.e.0.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.c.f.3.0.e.1.d.1.2.f.c.3.8.6.7.c.b.8.9.9.0.6.9.9.6.8.d.e.d.4.9.0.0.0.0.f.f.f.f.!.0.0.0.0.8.0.d.6.e.6.0.8.6.8.5.8.e.2.2.f.5.d.e.5.9.1.4.2.3.f.c.0.8.d.5.c.e.6.4.f.2.2.2.b.!.9.R.C.D.7.c.P.z.z.a...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:44:30 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18036
    Entropy (8bit):1.9116397577756774
    Encrypted:false
    SSDEEP:96:5s8VlE3EsWyIEXZ3i7nczu0iHtSdowaZvWIkWIcoIQjQS4:dOXO8iYdYcjQS4
    MD5:00D196904F56531479F9A20CB3556AC1
    SHA1:A7E631D64ACBABB503AF507091395817063870B0
    SHA-256:2111D3608D2EB3176BAEC7CB79E8CBC6DC78F821EFA296F49FD79A5FA0E669DC
    SHA-512:7EDC5581B0F5C3111B04EE6727D8BB525A1448E1449C3E58C2F9765C5CF1CBEACD50186362ADDAA1159B68D47D800E7263689312F75728DBCE2A81C991AE8636
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........U(f............4...............<.......d...............T.......8...........T...........p....=......................................................................................................eJ......L.......GenuineIntel............T............U(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8348
    Entropy (8bit):3.6949799948779716
    Encrypted:false
    SSDEEP:192:R6l7wVeJM76Je6YNbSUKCGgmfhepNH89bnq1fStm:R6lXJI6Je6YBSUmgmfhlnAfh
    MD5:4644FF77B72C17EED8BBC4E8A0B851E0
    SHA1:CF2062E7AA82267F94DA30CEA2F8E949774F1BD0
    SHA-256:9DA39DBD43A35D4BE46C50DE9EBA19F70772111F73246D16DBFB1AD1462D2478
    SHA-512:73B3035FD16B8DC861C841C1CEA3B752D06B57D148DAE481B3CB5715886144EEEEA0C970C87FEF4F96808D16A46FE3B1298748ACC4BFDB2237E4BFC485BCE74B
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.5.2.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4680
    Entropy (8bit):4.459689452770467
    Encrypted:false
    SSDEEP:48:cvIwWl8zshJg77aI92RnWpW8VYzYm8M4JyzFP+q8vE3/X+vdd:uIjfzI70w7VLJiKy/X+vdd
    MD5:B9D5CEEEB82300FEDED9D902320DEB4A
    SHA1:3BF44378BC876913D4CC729C1B4B87D15B60DEFB
    SHA-256:5B7659C99E09E8012BC7BA05A802675E53881740643285BEB41A9D482FEDA9DD
    SHA-512:5049213DD90CD0EE34B2C739789209F6817E03507B896F907660B691FD586196060908BA6A51F7517B9DEF46DD33AE7C7AFE8D1C28A3E1B81CA8F012538A6068
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293267" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:44:30 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.9827318178412658
    Encrypted:false
    SSDEEP:96:5s8XlE3OsWyICh/id3i7ncAYEHzW4oIavUvWIkWI/oIAP8uG4sDy:d6d/aOiETHJP8T4sDy
    MD5:083526EFC2EE8DFF32CA920569E81EAB
    SHA1:B38E34A4C06F8553CAA8CBBE1C00651AB6ADAD25
    SHA-256:3A6C3202B651E19DF748F2BB695167F9BE01D1CFEF8618330AE7372A45AF04EC
    SHA-512:52656726B3F560D63E3E7A917A520DE10F4A952DF9A90ADB1160C1E2BF286F6EF5C26C069FD85B886036A0443AAB522B51935D659F16801678960A94F4C161CD
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........U(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............U(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8288
    Entropy (8bit):3.698999305764221
    Encrypted:false
    SSDEEP:192:R6l7wVeJMW6JiW6YNLSU2CGgmf+sprG89bn6sfAtm:R6lXJ16JiW6YhSU6gmf+GnZfn
    MD5:91B537A91B734C0FDEA63D87CAF43A1B
    SHA1:3959C4A9C4514DCC6C4AF75B525F31A4A242E587
    SHA-256:81603097A903FF7BB4ED16B475B71C1A36E1B46D8F3E91A6F038D938F5600B25
    SHA-512:9D41A620B2E05CBDB1057B1D367C476ACDA8DC5B3E121D616ACB33829EF0465E0283BB0A53AD797136F446CC9EC5648CD2434EA0BE5ADC67879CFE3829DF8FC6
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.5.2.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.472530658544525
    Encrypted:false
    SSDEEP:48:cvIwWl8zshJg77aI92RnWpW8VY2HYm8M4JyQFX+q86s/X+v8d:uIjfzI70w7VvaJNU/X+v8d
    MD5:58DA2152D4A5609912BB244F4BC94868
    SHA1:133BB79074270757D879C2E871652A2107007904
    SHA-256:4C0BDBE74B0C492ACFE89AB564058847DB582D8EB9CFE1B1551111C3F9B7D300
    SHA-512:7AB36C546EF6A3267ADC90BF5B564069F107597F29807ED164FA1F2ECE595B9D03F079C2DA047FF21E5698F8619ABCFC22B710474307C9762A837CDEBBCB0F13
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293267" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.416675839046804
    Encrypted:false
    SSDEEP:6144:wcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNt5+:Vi58oSWIZBk2MM6AFB3o
    MD5:31E17FF487A96E332DA04B1D8050DE8C
    SHA1:513EC4A2ECC5606953FD772D3D8E8AAB878064BE
    SHA-256:EF71CAA441D9DFDA738381221043746D9F2E140E50FF0053AA0442AD290AC79C
    SHA-512:9019C5A44C0344B3B4FE40E259399EBD97E291B4E8E329F213DA7C82BA936F4833B0FDF72D96ACFBC3E2F28925B2F9064E805A45E1322BE9D498B921B00AF706
    Malicious:false
    Reputation:low
    Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..7..................................................................................................................................................................................................................................................................................................................................................!.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
    Entropy (8bit):6.6023744181027375
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:9RCD7cPzza.exe
    File size:47'104 bytes
    MD5:0ddf2aeeb49e6e35132ea103a89259ef
    SHA1:80d6e6086858e22f5de591423fc08d5ce64f222b
    SHA256:1207199c662ef02c36e37beee575f6dbd6dc46013b662ffb3b26a749764b6f15
    SHA512:b6212ab861751ba55719c64e5a03f93a3bb97e715ca161b51983a769ddfab32226f817c895e320e26daffa4b8a721329367994ccb6facfd3307cc2c9a7df8669
    SSDEEP:768:jUnSAvu6cMEtClbx0mz6QooKSJ0GebDnVR8WIisfp381c/Llf9FQ15qxtbRTLDBI:gnhvuqmQ0m2QZuXfA1L38OjUExtblK8
    TLSH:72239E1672E2DCF3CE22843026A9BF76637EF8333D65ACC7832049496565DD2911BB4B
    File Content Preview:MZ..........................................................@.................6.`...`...`....O..`..... .....^}f}(@.F.N.O.S.X.Z.a..7d).)k .(^}f}(@..]...F.N.C.;./...+.5k!.'t......^....yD....':......ob..sV.....|;..........xG.!L.N.`.......H.*1.[..0.R..#F..gzA
    Icon Hash:00928e8e8686b000
    Entrypoint:0x4102c8
    Entrypoint Section:.qrmx
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x432631C3 [Tue Sep 13 01:56:19 2005 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    add byte ptr [eax], al
    inc ecx
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ecx+edx], al
    inc eax
    add ah, dl
    or eax, dword ptr [ecx+00h]
    pop eax
    add dword ptr [ecx+00h], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    clc
    adc byte ptr [eax+00h], al
    call 00007F493505B9C1h
    add dword ptr [ecx+00h], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    call 00007F49E505B8C5h
    or eax, dword ptr [ecx+00h]
    push 00004100h
    add byte ptr [eax], al
    add ah, bl
    adc byte ptr [eax+00h], al
    call 00007F49AD05B9BFh
    add al, byte ptr [ecx+00h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    int3
    adc byte ptr [eax+00h], al
    insb
    or al, 41h
    add byte ptr [eax+00004102h], bl
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax+eax+01h], al
    add dword ptr [esi+72h], ecx
    inc eax
    add byte ptr [ebp+00h], al
    add dword ptr [ecx], eax
    push 00000072h
    inc eax
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    mov dh, byte ptr [edx+40h]
    add byte ptr [ebx+00h], al
    add dword ptr [ecx], eax
    cmpsb
    jc 00007F498D0578F2h
    add byte ptr [ebp+00h], ah
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11dc.lmtov
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .ohmp0x10000xe38d0x9200822c96c9858713ec19a482d8de74adedFalse0.6400363869863014data6.7119935179512495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .qrmx0x100000x13600x8005de1acf7c3dc52287057d23fed595fb7False0.31494140625data2.9853589708197874IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .lmtov0x120000x120000x160036407070411762f95eb2b6eb81f73fbaFalse0.6912286931818182data6.078479660752423IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x240000x10000x4008c81fc5d239a986ad5f19095e9491ca3False0.3857421875data2.692847394520265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:44:29
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\9RCD7cPzza.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\9RCD7cPzza.exe"
    Imagebase:0x400000
    File size:47'104 bytes
    MD5 hash:0DDF2AEEB49E6E35132EA103A89259EF
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:02:44:30
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 228
    Imagebase:0xdd0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:02:44:30
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 232
    Imagebase:0xdd0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1344329410.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1344352241.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1344386893.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1344386893.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_9RCD7cPzza.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 6ba2068ead8c61e426769bc77282661b89c7ac0549fd707ea0ef990be71d3505
      • Instruction ID: 61f76a0ac3b7a1b4ff89f563731c461fe45e252c4236de128adafd7111798064
      • Opcode Fuzzy Hash: 6ba2068ead8c61e426769bc77282661b89c7ac0549fd707ea0ef990be71d3505
      • Instruction Fuzzy Hash: 14D1C3B1A44305BAEB206BA58D4AFBF7EA89F41314F14403FF580B52D2EF798940875E
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1344329410.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1344352241.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1344386893.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1344386893.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_9RCD7cPzza.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 494530a21cbceca3e0db01d9583dbaf78bd4040d22689b67190a4c0714f1f18d
      • Instruction ID: fc9a663a2bd2d8528119567c51527500a7dfbb8a2f76faf961b164dc3110fbe4
      • Opcode Fuzzy Hash: 494530a21cbceca3e0db01d9583dbaf78bd4040d22689b67190a4c0714f1f18d
      • Instruction Fuzzy Hash: 0251A2B24402147FDB11ABA9EC46FFF37ACAF95708F14443AF911F7192EA7899048768
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1344329410.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1344352241.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1344386893.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1344386893.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_9RCD7cPzza.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: ae8db38646a89a2f5ed4727abbcb65f41a713295528821256727b87fd8a2b525
      • Instruction ID: e3a8399fb03ea5441ac8e59a336333a7135dd30eab7360b7d3bc5551a1e74678
      • Opcode Fuzzy Hash: ae8db38646a89a2f5ed4727abbcb65f41a713295528821256727b87fd8a2b525
      • Instruction Fuzzy Hash: 83C16CB5D00209AFDB10DFA4C884AEEBBB9FF88304F14846AE601B7291D7799D45DB64
      Uniqueness

      Uniqueness Score: -1.00%