Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tVXXRNG1av.exe

Overview

General Information

Sample name:tVXXRNG1av.exe
renamed because original name is a hash value
Original sample name:0c04d517a594cff40c4818575f6196dd.bin.exe
Analysis ID:1430682
MD5:0c04d517a594cff40c4818575f6196dd
SHA1:22bca058d3742394b310dd33d3712a5304a2888b
SHA256:98c51edd1b00b795c3cd639ff43fe5acaed66f779c52aeecb1172079be3738d1
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • tVXXRNG1av.exe (PID: 1432 cmdline: "C:\Users\user\Desktop\tVXXRNG1av.exe" MD5: 0C04D517A594CFF40C4818575F6196DD)
    • WerFault.exe (PID: 3132 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: tVXXRNG1av.exeAvira: detected
Source: tVXXRNG1av.exeReversingLabs: Detection: 81%
Source: tVXXRNG1av.exeVirustotal: Detection: 72%Perma Link
Source: tVXXRNG1av.exeJoe Sandbox ML: detected
Source: tVXXRNG1av.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\tVXXRNG1av.exeCode function: 0_2_0040A23A0_2_0040A23A
Source: C:\Users\user\Desktop\tVXXRNG1av.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 232
Source: tVXXRNG1av.exeStatic PE information: No import functions for PE file found
Source: tVXXRNG1av.exe, 00000000.00000002.2140814710.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename17drr97lR, vs tVXXRNG1av.exe
Source: tVXXRNG1av.exeBinary or memory string: OriginalFilename17drr97lR, vs tVXXRNG1av.exe
Source: tVXXRNG1av.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1432
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e8387c67-118f-4227-a090-5d6f6c2c04a7Jump to behavior
Source: C:\Users\user\Desktop\tVXXRNG1av.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: tVXXRNG1av.exeReversingLabs: Detection: 81%
Source: tVXXRNG1av.exeVirustotal: Detection: 72%
Source: unknownProcess created: C:\Users\user\Desktop\tVXXRNG1av.exe "C:\Users\user\Desktop\tVXXRNG1av.exe"
Source: C:\Users\user\Desktop\tVXXRNG1av.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 232
Source: C:\Users\user\Desktop\tVXXRNG1av.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .zcn
Source: tVXXRNG1av.exeStatic PE information: section name: .gzqdih
Source: tVXXRNG1av.exeStatic PE information: section name: .zcn
Source: tVXXRNG1av.exeStatic PE information: section name: .kjop
Source: C:\Users\user\Desktop\tVXXRNG1av.exeCode function: 0_2_004000B1 push eax; iretd 0_2_004000C4
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\tVXXRNG1av.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
tVXXRNG1av.exe82%ReversingLabsWin32.Trojan.Zeus
tVXXRNG1av.exe73%VirustotalBrowse
tVXXRNG1av.exe100%AviraTR/Crypt.XPACK.Gen
tVXXRNG1av.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430682
    Start date and time:2024-04-24 02:46:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:tVXXRNG1av.exe
    renamed because original name is a hash value
    Original Sample Name:0c04d517a594cff40c4818575f6196dd.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 5
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.22
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target tVXXRNG1av.exe, PID 1432 because there are no executed function
    TimeTypeDescription
    02:46:59API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6340382963194696
    Encrypted:false
    SSDEEP:96:0jXKFhyYi7Rsahkvg7kSfpQXIDcQvc6QcEVcw3cE/n+HbHg6ZAX/d5FMT2SlPkpq:Lbi7Rw0BU/gjEzuiFzZ24IO8L
    MD5:2FAB03A21237729DC5EE8119F50EC439
    SHA1:96EB74FF54CE4FFA42E0C4DAEDD167474C81F996
    SHA-256:5AEE6FF9848266993762BE84F2225F4D5FEA009AF0D205AE32B79C25D3A252E6
    SHA-512:06998163AFF27FECFC4663DEA0EE551B148806C2F806177401C2055997F117725CE7F17E2AF64E52BDEDA90FBB2D594FDB30B5F80B93523BC9871A05ED944CAB
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.2.1.3.3.3.3.6.4.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.2.1.3.5.8.3.6.4.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.c.c.9.9.1.d.-.2.1.8.1.-.4.7.c.8.-.b.a.8.6.-.a.a.c.e.3.d.5.5.b.1.0.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.c.d.4.2.8.3.c.-.b.b.1.d.-.4.1.c.a.-.b.3.6.6.-.5.e.d.b.e.c.f.3.5.6.6.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.t.V.X.X.R.N.G.1.a.v...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.9.8.-.0.0.0.1.-.0.0.1.5.-.7.b.a.a.-.5.0.e.6.e.0.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.6.1.f.6.3.d.9.2.1.0.9.4.d.a.2.e.5.d.3.c.0.0.e.e.f.c.2.7.5.a.e.0.0.0.0.f.f.f.f.!.0.0.0.0.2.2.b.c.a.0.5.8.d.3.7.4.2.3.9.4.b.3.1.0.d.d.3.3.d.3.7.1.2.a.5.3.0.4.a.2.8.8.8.b.!.t.V.X.X.R.N.G.1.a.v...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:46:53 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.9888916628305768
    Encrypted:false
    SSDEEP:96:5C8hE3l25i61Ri7nUfU4rKVkjS68LWx4WqFXK6/K/WIkWI/7IZm8uJbi:3aIOMU1Xe9m8sbi
    MD5:AE9CB44B104697653F7A5112F617B998
    SHA1:FFDBD8FA11DBDBDF48E7E09414EF69178F50DD73
    SHA-256:B33E3AF6E11AC01A8169CB572178E2C633404B5E524F247739CCEDCFC68C47E8
    SHA-512:5A92644D8435431D2287542B7841B04E54CEDC4439294A2220F4D6FEF2DE9036BB6083998F42626DBDDAD8C1EA5FEE142285E02DCACAE7F5EE5525840C2CEF24
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......}V(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T...........}V(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8284
    Entropy (8bit):3.7003321336752215
    Encrypted:false
    SSDEEP:192:R6l7wVeJS56JJ6Y2D/SU9kxgmfgFVTprM89bIRsfhh4m:R6lXJE6JJ6YySU9kxgmf4XIKfhr
    MD5:CF4AC626A2A166EDFDD75A7AAA1B1886
    SHA1:9A266BAD906DB09EDC8FE0D4C7192CB2AE546A49
    SHA-256:226400B3C1782D68F3968C3D6DD610F7A2B21CFFE5CD824E81128410A14D8F52
    SHA-512:D8FEC2FECE64FCF7E0347C392901C749B7F1FCEAACC35B569BF7A4B0085544B7ED02A26D0FDE4D5D019E32C38C5AFD46B9E5D2AE370B8828DFE929E89FAFE7F0
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.3.2.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.47153286076187
    Encrypted:false
    SSDEEP:48:cvIwWl8zsTJg77aI9ZmWpW8VYbYm8M4J1wcrEgFs+q8/o6q/biRfNhdd:uIjftI7Tn7VbJ1wKEhao6qjKNhdd
    MD5:8D4E6E5F41685C720561344D6AAA3A67
    SHA1:E9B3BFF5AC45EA0A3320B50F1586CE258875D0EE
    SHA-256:9BF02187B954B3B1E0465EB2C3D04E7D4CB5120462D3016D376C0C66B81653BE
    SHA-512:B2FEDDC34022DD044F3C9AFE33C8326D693FB729D4F6DAF9A628EACE0A92F66AFB1E32FA395490ACD906ACA80CF667F3E2D7CEA0D3DF78DBD38517F9E79BFF3D
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293269" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.468590056222061
    Encrypted:false
    SSDEEP:6144:czZfpi6ceLPx9skLmb0fnZWSP3aJG8nAgeiJRMMhA2zX4WABluuNcjDH5S:iZHtnZWOKnMM6bFpij4
    MD5:E0A323725698790EA4DD60AA62966554
    SHA1:517800AADBE62620B8BFEF912B27DFC84A235C02
    SHA-256:C64182E8FF8E286C21AC01A28B45971FE22605A57E710AF9FC2D59472F39B786
    SHA-512:052C0C79382ABC134D76359605931E6D154C191AB4F702C869EE1F7BACFB20B0CC8F888B820986BBC7A2EC356722005BF2C144CFF452836330773C36E7DAC56E
    Malicious:false
    Reputation:low
    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..}...................................................................................................................................................................................................................................................................................................................................................j.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.669210937818902
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:tVXXRNG1av.exe
    File size:49'664 bytes
    MD5:0c04d517a594cff40c4818575f6196dd
    SHA1:22bca058d3742394b310dd33d3712a5304a2888b
    SHA256:98c51edd1b00b795c3cd639ff43fe5acaed66f779c52aeecb1172079be3738d1
    SHA512:a5d36cf1a5d81394739b7f221b5a03978f2134959b7a649f5409987b6b464e3d4d1a3d1000638b2b517e39e770f8dabe36bf5b3bd988378f1a465c77df1309ec
    SSDEEP:1536:yXOsuooQUfmLUUA0uN7sERwr05mxNG0uCsg:GU+2ji0YxM58
    TLSH:21238D2671D1CCF2DA6144B026ADBB7663BFF4323D299C87C31409885856CD2D52FB8B
    File Content Preview:MZ......................@...................................@.......b7yy......6.`...`...`....O..`...&.......^}f}(@..[.K.GN=.C[.[<.7...-.*p........^}f}(@.._.RKP.+>......sf..wZ......?..........|K.%P.R.d.......L..5 _..4#V..'J..k~E........X......U..B..C..(G..
    Icon Hash:00928e8e8686b000
    Entrypoint:0x41034c
    Entrypoint Section:.zcn
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x450972DC [Thu Sep 14 15:18:52 2006 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    lahf
    jnc 00007FF4947E1F12h
    add byte ptr [esi+00h], ah
    add byte ptr [eax], al
    mov edi, 67004073h
    add byte ptr [eax], al
    add byte ptr [edi+65004073h], bh
    add byte ptr [ecx], al
    add ebx, ebp
    jnc 00007FF4947E1F12h
    add byte ptr [edi], bh
    add byte ptr [eax], al
    add byte ptr [esp+esi*2+003B0040h], ah
    add byte ptr [eax], al
    retf 4074h
    add byte ptr [eax+eax], bh
    add byte ptr [ecx], al
    add dh, byte ptr [ebp+40h]
    add byte ptr [00000000h], bh
    add byte ptr [eax], al
    add byte ptr [esi], bh
    add byte ptr [ecx], al
    add dword ptr [edx], ebx
    jne 00007FF4947E1F12h
    add byte ptr [eax+00h], al
    add byte ptr [eax], al
    push ecx
    jne 00007FF4947E1F12h
    add byte ptr [ecx+00h], al
    add byte ptr [eax], al
    jne 00007FF4947E1F47h
    inc eax
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    xchg eax, esi
    jne 00007FF4947E1F12h
    add byte ptr [edi+00h], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    cmp dword ptr [eax], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    cmp al, byte ptr [eax]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    dec eax
    add byte ptr [ecx], al
    add dword ptr [ecx+49004075h], edi
    add byte ptr [ecx], al
    add dword ptr [ecx+4A004075h], edi
    add byte ptr [ecx], al
    add dword ptr [ecx+4B004075h], edi
    add byte ptr [ecx], al
    add dword ptr [ecx+00004075h], edi
    add byte ptr [eax], al
    add ah, ah
    adc al, byte ptr [eax+00h]
    or dword ptr [ebp+40h], 410C6C00h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ecx+edx], dl
    inc eax
    add byte ptr [esp+ecx+41h], ah
    add al, ah
    add eax, dword ptr [ecx+00h]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11fc.kjop
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .gzqdih0x10000xe5450x9c00db3837ef7dd06c8208995f3eabee7f9bFalse0.6363932291666666data6.716936574538979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .zcn0x100000x13780x8004f5a4470e5b3476827ff699be0ebedd2False0.37841796875data3.7529377694035575IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .kjop0x120000x120000x16009e947714b284365fcb75c1f3939a80cdFalse0.7322443181818182GeoSwath RDF6.364684382623478IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x240000x10000x400a25f89feb6acb9fde0d938bdeb482438False0.3955078125data2.7236749768294204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:46:53
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\tVXXRNG1av.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\tVXXRNG1av.exe"
    Imagebase:0x400000
    File size:49'664 bytes
    MD5 hash:0C04D517A594CFF40C4818575F6196DD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:02:46:53
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 232
    Imagebase:0x650000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.2140774520.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2140795550.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_tVXXRNG1av.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: 25bb6cd5efb475021dce012517433b340aa08b3885c4012ea24f6d808b3ca75d
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: D3818232D05626DBDB14CE68C4406ADB7B1EB85324F1942AADC52BB3C1C374AD51CBC6
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2140774520.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2140795550.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_tVXXRNG1av.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 683fcd8309a47b2ce02ad2b9b4e52383ab1ea3963cdda470a5caf0d87cda8f9c
      • Instruction ID: 71c501bb1d8f02778425eada31801261c3128662274a2ccfec92f2d942834a46
      • Opcode Fuzzy Hash: 683fcd8309a47b2ce02ad2b9b4e52383ab1ea3963cdda470a5caf0d87cda8f9c
      • Instruction Fuzzy Hash: 39D105B1A043057AEB206BA5DE4AFAF7AB4AF41314F10403FF585B51E2EB7C9940876D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2140774520.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2140795550.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_tVXXRNG1av.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: eb837a683ae02825ad1d4d9cc01acaa36c56c7d1e8bf43969b9e62a7bf523e2d
      • Instruction ID: 144efbb9d98ccb5842d2b912159da0acf733c3b68e2ddc230260e38dcc66a36c
      • Opcode Fuzzy Hash: eb837a683ae02825ad1d4d9cc01acaa36c56c7d1e8bf43969b9e62a7bf523e2d
      • Instruction Fuzzy Hash: 0751A3B2900204BEDB01EFA6DC42EFF77ACAB55748B04443BB511F71D2E6789D0487AA
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2140774520.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2140795550.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_tVXXRNG1av.jbxd
      Similarity
      • API ID:
      • String ID: GetProcAddress$LoadLibraryA$Start Page$rsldps$software\microsoft\internet explorer\main
      • API String ID: 0-2928055629
      • Opcode ID: 129604185effd44480d2bd799b233bb50b644a39347faac8ca63b4a8193e56b5
      • Instruction ID: 7dba7ffa5b37e4c0859346a573d1954e89b26edda6caf5800eb6f3e533eea961
      • Opcode Fuzzy Hash: 129604185effd44480d2bd799b233bb50b644a39347faac8ca63b4a8193e56b5
      • Instruction Fuzzy Hash: C651B8B1C04204BAE710BBA69C86DAF7B6CDF45314F14407FF905B72D2EA7D5A4086AE
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2140774520.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2140795550.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2140814710.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_tVXXRNG1av.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: 16b16af8fe37eb1a2e90f67774915795ec7d7e8d6f5d4f1e18ea260e0e14bfe1
      • Instruction ID: 904ebcee51d8b131acdcec949250345806791469c77203252c0098f15b475850
      • Opcode Fuzzy Hash: 16b16af8fe37eb1a2e90f67774915795ec7d7e8d6f5d4f1e18ea260e0e14bfe1
      • Instruction Fuzzy Hash: 7FC17DB1D00209AFDB11DFE5C884EEFBBB9EF88304F14846AE601B7291D6799D45CB64
      Uniqueness

      Uniqueness Score: -1.00%