Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ffOiU4OIBd.exe

Overview

General Information

Sample name:ffOiU4OIBd.exe
renamed because original name is a hash value
Original sample name:0509054d92b3379375506f673d392ead.bin.exe
Analysis ID:1430684
MD5:0509054d92b3379375506f673d392ead
SHA1:4bf02c86897f2c295562385babdc0cdbab118f23
SHA256:d81322811538084bf9a91914f16e9aff3ff7b2aaa16969225dfccf2c0aab6bd1
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • ffOiU4OIBd.exe (PID: 6728 cmdline: "C:\Users\user\Desktop\ffOiU4OIBd.exe" MD5: 0509054D92B3379375506F673D392EAD)
    • WerFault.exe (PID: 6444 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ffOiU4OIBd.exeAvira: detected
Source: ffOiU4OIBd.exeReversingLabs: Detection: 81%
Source: ffOiU4OIBd.exeVirustotal: Detection: 65%Perma Link
Source: ffOiU4OIBd.exeJoe Sandbox ML: detected
Source: ffOiU4OIBd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\ffOiU4OIBd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 232
Source: ffOiU4OIBd.exeStatic PE information: No import functions for PE file found
Source: ffOiU4OIBd.exe, 00000000.00000000.1652965307.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesJnJPPp\0 vs ffOiU4OIBd.exe
Source: ffOiU4OIBd.exeBinary or memory string: OriginalFilenamesJnJPPp\0 vs ffOiU4OIBd.exe
Source: ffOiU4OIBd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6728
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6e7d258c-bfce-4b13-92cf-571e0eb75693Jump to behavior
Source: C:\Users\user\Desktop\ffOiU4OIBd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ffOiU4OIBd.exeReversingLabs: Detection: 81%
Source: ffOiU4OIBd.exeVirustotal: Detection: 65%
Source: unknownProcess created: C:\Users\user\Desktop\ffOiU4OIBd.exe "C:\Users\user\Desktop\ffOiU4OIBd.exe"
Source: C:\Users\user\Desktop\ffOiU4OIBd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 232
Source: C:\Users\user\Desktop\ffOiU4OIBd.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .mnyr
Source: ffOiU4OIBd.exeStatic PE information: section name: .rod
Source: ffOiU4OIBd.exeStatic PE information: section name: .mnyr
Source: ffOiU4OIBd.exeStatic PE information: section name: .bep
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\ffOiU4OIBd.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ffOiU4OIBd.exe82%ReversingLabsWin32.Trojan.Zeus
ffOiU4OIBd.exe65%VirustotalBrowse
ffOiU4OIBd.exe100%AviraTR/Crypt.XPACK.Gen
ffOiU4OIBd.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430684
    Start date and time:2024-04-24 02:48:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:ffOiU4OIBd.exe
    renamed because original name is a hash value
    Original Sample Name:0509054d92b3379375506f673d392ead.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.21
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target ffOiU4OIBd.exe, PID 6728 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:49:10API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6316973246218429
    Encrypted:false
    SSDEEP:96:+1FIjfNIsqphMqr7J9zQXIDcQvc6QcEVcw3cE/X+HbHg6ZAX/d5FMT2SlPkpXmTK:iG5If3w0BU/wjEzuiF4Z24IO8DT
    MD5:B7600F4F8EE9FE5BF3A46DF1751CACC5
    SHA1:8D93C02234AFB73D5FD2D45B47AFED0188F59B7E
    SHA-256:A92DD918D1D9C1E767E4AC5C07F39FF7854355E016626F937CA19772EF651775
    SHA-512:57656B3696A07849A1846D3699FC724C8E22B931A05C8BA7FF2FE5779633FD961ECB3771C48F126890A5E75F8AE63E806B687852E8EE524D82DF0E3634F8B8FF
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.3.3.7.5.6.3.6.3.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.3.3.7.8.6.0.5.0.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.1.c.c.c.3.7.1.-.1.5.c.9.-.4.c.5.f.-.b.7.a.0.-.3.a.c.2.e.4.b.e.f.a.9.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.3.6.8.4.a.a.7.-.8.1.b.7.-.4.7.0.9.-.a.5.4.9.-.b.e.7.3.5.2.a.8.e.3.c.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.f.O.i.U.4.O.I.B.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.4.8.-.0.0.0.1.-.0.0.1.4.-.e.6.8.4.-.5.e.3.0.e.1.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.0.b.c.e.3.d.4.b.7.e.3.9.f.d.f.6.6.4.9.a.a.6.3.7.6.9.3.1.a.4.4.0.0.0.0.f.f.f.f.!.0.0.0.0.4.b.f.0.2.c.8.6.8.9.7.f.2.c.2.9.5.5.6.2.3.8.5.b.a.b.d.c.0.c.d.b.a.b.1.1.8.f.2.3.!.f.f.O.i.U.4.O.I.B.d...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:48:57 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.9848534951564492
    Encrypted:false
    SSDEEP:96:5W8gE3B6CQR3CM9i7n3zdNFLgA3zwzrWIkWI/6PI4o8uPNy3:rkPvOpNFL1io8SNy
    MD5:553C13386AB0BADEAACA02B303BE92B8
    SHA1:F6200D38636BFC0CE80D59C20B0DF0F63B66CDE8
    SHA-256:6283ACC0F42417988D4FBE735736015F8E9F9CC0DF6B4DDD93674FC050524C9E
    SHA-512:5EAA5FE8CC366E25358A697C211E19115660EA04AE2BEA214029ECCA5A345020652DB87CBF854D3AAE6E25024F66F5800AC88F41550B0B647019AE5F2AD45581
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........V(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T.......H....V(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8282
    Entropy (8bit):3.6947227122304347
    Encrypted:false
    SSDEEP:192:R6l7wVeJl46JZ6Y9BSUfigmf1GwprO89bC/sfwWm:R6lXJq6JZ6YLSU6gmf1GSCkfI
    MD5:370EF9FDC2BBA86C6DE79EC0281797F6
    SHA1:3F2FC4514027D7BB7EEB9AF1ECB9B5D05E287EBC
    SHA-256:AE58360DB3D209B65E4ADBD47C27A8ED20B0DFA72ED0720107006BD3B83D4B22
    SHA-512:896C74FA4F7C8EFD999186D5CEC003400A52C9514F1BED09D6CF61475DD29836B5350AADFE0E3278E932E15C74AC3D01DD84ECA9A4F81608E451A3295EDBD217
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.2.8.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.461322954604668
    Encrypted:false
    SSDEEP:48:cvIwWl8zs2Jg77aI9wA8XWpW8VYRYm8M4JJMCFm+q8fg9bkqGl2Md:uIjfMI7GA8m7VpJiRiqk9l2Md
    MD5:9A03BF8A23A2442F972737399D415365
    SHA1:75B672DCACF126152E91E7741CB0F3C6A7DBB30A
    SHA-256:B25A5F31F1D8D43B25A61716A24F9F9646BDC56E16E76B52E5DB226B9A4ED108
    SHA-512:E5970541CCDB5EA10713742198BC65603C52DADB59CBB92AD7AE524FCAECE49CFFD50952FD477A15A8E132A8C31980EE266045CB1B272FE584868F62D5D00207
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293271" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.465426077870457
    Encrypted:false
    SSDEEP:6144:TIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNydwBCswSbZ:EXD94+WlLZMM6YFHU+Z
    MD5:38C39E129407E437948ACDE66481FB8B
    SHA1:F76D8EDB201E2272CCE5487B05D418DC4744DDA2
    SHA-256:3A79D2204E3DD523C0F06F7B0DAD30109233B6E3B29A42FEE1B3DFE1169B4240
    SHA-512:A6741297D5A3F9B64DACF7DC579498DA23B3EDDAEECBA234F9107A16F797A4D6CD1839102E8AC0166CF36C888EA8748530D3FC4D7046597D1431197A26414283
    Malicious:false
    Reputation:low
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.a.0................................................................................................................................................................................................................................................................................................................................................n..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.681514067717261
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:ffOiU4OIBd.exe
    File size:49'152 bytes
    MD5:0509054d92b3379375506f673d392ead
    SHA1:4bf02c86897f2c295562385babdc0cdbab118f23
    SHA256:d81322811538084bf9a91914f16e9aff3ff7b2aaa16969225dfccf2c0aab6bd1
    SHA512:f8e5a88b7129d232a204f7c6982b53816021ee20fde9b4db0737840c9ddd358ca1de19449b6550bbc20a3934128274a259c5f6a192f5c226f96cddd42cfcabc4
    SSDEEP:768:O577i3suKBbMTUMPFaIwI8+pTT3Hlnrrb3+gPXezEx9npwBwbKcxHkZmAKcAJNYS:07Ssuoo9oId3BfbuwpwBcRxHkfKkB34o
    TLSH:7C238D533BD0BDB2E9A2493067597BB653BFEC314E365E039324058D09728D3CA1B66B
    File Content Preview:MZ......................@................................... .......MAIN....@w...................h..).2.@...^}f}(@.yU.C.LR.SD.F\6.C.,...,... ...#....^}f}(@..]...F.N.I.K.>_-.3h#.2.'.*.!................5...YTc6.(..a<.^E..Ri$....w.q.;.U`?.y......J....e0.....
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x41030c
    Entrypoint Section:.mnyr
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x4585CA5B [Sun Dec 17 22:53:15 2006 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    nop
    outsb
    or eax, dword ptr [eax]
    sub al, 10h
    inc eax
    add al, ch
    adc byte ptr [ecx+00h], al
    cwde
    add al, byte ptr [ecx+00h]
    sub byte ptr [edi+0Bh], ch
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ebp+00h], al
    add dword ptr [ecx], eax
    pushad
    jno 00007F51C8501402h
    add byte ptr [esi+00h], al
    add dword ptr [ecx], eax
    jl 00007F51C8501433h
    inc eax
    add byte ptr [ebx+00h], al
    add dword ptr [ecx], eax
    pushfd
    jno 00007F51C8501402h
    add byte ptr [eax+eax+01h], al
    add dword ptr [eax+66004071h], edi
    add byte ptr [eax], al
    add al, bl
    jno 00007F51C8501402h
    add byte ptr [edi+00h], ah
    add byte ptr [eax], al
    fdiv dword ptr [ecx+40h]
    add byte ptr [ebp+00h], ah
    add dword ptr [ecx], eax
    add al, 72h
    inc eax
    add byte ptr [edi], bh
    add byte ptr [eax], al
    add byte ptr [ebp+3B004072h], bh
    add byte ptr [eax], al
    add bl, ah
    jc 00007F51C8501402h
    add byte ptr [eax+eax], bh
    add byte ptr [ecx], al
    sbb esi, dword ptr [ebx+40h]
    add byte ptr [00000000h], bh
    add byte ptr [eax], al
    add byte ptr [esi], bh
    add byte ptr [ecx], al
    add dword ptr [ebx], esi
    jnc 00007F51C8501402h
    add byte ptr [eax+00h], al
    add byte ptr [eax], al
    push 00000073h
    inc eax
    add byte ptr [ecx+00h], al
    add byte ptr [eax], al
    mov seg?, word ptr [ebx+40h]
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    scasd
    jnc 00007F51C8501402h
    add byte ptr [edi+00h], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    cmp dword ptr [eax], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    cmp al, byte ptr [eax]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    dec eax
    add byte ptr [ecx], al
    add edx, edx
    jnc 00007F51C8501402h
    add byte ptr [ecx+00h], cl
    add dword ptr [ecx], eax
    sal byte ptr [ebx+40h], cl
    add byte ptr [edx+00h], cl
    add dword ptr [ecx], eax
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11f4.bep
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .rod0x10000xe1e60x9a00dcc4190f5fa7e167804210b3140af21aFalse0.6357041396103896data6.69240909343031IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .mnyr0x100000x13850x80069a6b80cddef11a1ce6490747984f30dFalse0.3857421875data3.6181335073908634IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .bep0x120000x120000x1600d97b77b56d90ce219bf96d09122e4b7aFalse0.7439630681818182GLS_BINARY_LSB_FIRST6.434313946753717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x240000x10000x4007e6c1f4396bbe9fa019fc852ace4873dFalse0.40234375data2.791925927779056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:48:57
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\ffOiU4OIBd.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\ffOiU4OIBd.exe"
    Imagebase:0x400000
    File size:49'152 bytes
    MD5 hash:0509054D92B3379375506F673D392EAD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:02:48:57
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 232
    Imagebase:0x450000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1785758156.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1785774558.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1785787926.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1785787926.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ffOiU4OIBd.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 1e27132a7b86b4d2f603327251c44be151422c3464530aeb78d8de9f8b50b639
      • Instruction ID: 42143cb97ae42baf2a78ab2c8315201cabae44e4d9de5e1110a1143599b8d402
      • Opcode Fuzzy Hash: 1e27132a7b86b4d2f603327251c44be151422c3464530aeb78d8de9f8b50b639
      • Instruction Fuzzy Hash: FBD1E271A44705BAEB206BA5CC4AFAF7AA8EF41304F14413BF600B51E2E67D99408F6D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1785758156.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1785774558.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1785787926.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1785787926.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ffOiU4OIBd.jbxd
      Similarity
      • API ID:
      • String ID: GetProcAddress$LoadLibraryA$Start Page$rsldps$software\microsoft\internet explorer\main
      • API String ID: 0-2928055629
      • Opcode ID: 3cf239bae01ff0ff5128dbfb6dc34cfd660dffe4531e023292e5bf7cc3b074f8
      • Instruction ID: f3ba658f7d37e3ef815e93d5bf2c6b07f678c2a860bc79dfc1a139a7e0ff0dfb
      • Opcode Fuzzy Hash: 3cf239bae01ff0ff5128dbfb6dc34cfd660dffe4531e023292e5bf7cc3b074f8
      • Instruction Fuzzy Hash: 1B51B5B1C00114BADB10BBA69C82DAF7BBCDF45314F1445BBF605B22D2E63D5A409AAD
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1785758156.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1785774558.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1785787926.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1785787926.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ffOiU4OIBd.jbxd
      Similarity
      • API ID:
      • String ID: *<input *value="$*<option selected$*<select $/
      • API String ID: 0-2404899240
      • Opcode ID: bb0c47381c92facdd955301ea5b9bc788fdb9cc0fe499003e3f1343b0e9fd1d7
      • Instruction ID: c65085ca2c524f608f486d5231c1fc6880b183715eff2db670529ed1e3993e7c
      • Opcode Fuzzy Hash: bb0c47381c92facdd955301ea5b9bc788fdb9cc0fe499003e3f1343b0e9fd1d7
      • Instruction Fuzzy Hash: 1B610572D04249AFDF119BA4CC84FEE7B78EB44308F1440BAE605B72D2D6396E45CB59
      Uniqueness

      Uniqueness Score: -1.00%