Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Tic7mjgSvs.exe

Overview

General Information

Sample name:Tic7mjgSvs.exe
renamed because original name is a hash value
Original sample name:0f2d20c110d6d8cfd93c2e6dc62fb8bc.bin.exe
Analysis ID:1430685
MD5:0f2d20c110d6d8cfd93c2e6dc62fb8bc
SHA1:fda7d96c369642b0bfb2f85077e8b3c7571317be
SHA256:9ffa421a091d5ef693ac93ab09b2aac37d59888d07f8e67fda4327d521f84d5b
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Tic7mjgSvs.exe (PID: 3380 cmdline: "C:\Users\user\Desktop\Tic7mjgSvs.exe" MD5: 0F2D20C110D6D8CFD93C2E6DC62FB8BC)
    • WerFault.exe (PID: 3472 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Tic7mjgSvs.exeAvira: detected
Source: Tic7mjgSvs.exeReversingLabs: Detection: 92%
Source: Tic7mjgSvs.exeVirustotal: Detection: 79%Perma Link
Source: Tic7mjgSvs.exeJoe Sandbox ML: detected
Source: Tic7mjgSvs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\Tic7mjgSvs.exeCode function: 0_2_0040971D0_2_0040971D
Source: C:\Users\user\Desktop\Tic7mjgSvs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 228
Source: Tic7mjgSvs.exeStatic PE information: No import functions for PE file found
Source: Tic7mjgSvs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3380
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c1088805-da9d-45e3-aa7a-0592621c4559Jump to behavior
Source: C:\Users\user\Desktop\Tic7mjgSvs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Tic7mjgSvs.exeReversingLabs: Detection: 92%
Source: Tic7mjgSvs.exeVirustotal: Detection: 79%
Source: unknownProcess created: C:\Users\user\Desktop\Tic7mjgSvs.exe "C:\Users\user\Desktop\Tic7mjgSvs.exe"
Source: C:\Users\user\Desktop\Tic7mjgSvs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 228
Source: C:\Users\user\Desktop\Tic7mjgSvs.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .pgz
Source: Tic7mjgSvs.exeStatic PE information: section name: .zul
Source: Tic7mjgSvs.exeStatic PE information: section name: .pgz
Source: Tic7mjgSvs.exeStatic PE information: section name: .zodcr
Source: C:\Users\user\Desktop\Tic7mjgSvs.exeCode function: 0_2_00400134 pushfd ; iretd 0_2_0040013F
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Tic7mjgSvs.exe92%ReversingLabsWin32.Trojan.Zeus
Tic7mjgSvs.exe79%VirustotalBrowse
Tic7mjgSvs.exe100%AviraTR/Crypt.XPACK.Gen
Tic7mjgSvs.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430685
    Start date and time:2024-04-24 02:50:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 59s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Tic7mjgSvs.exe
    renamed because original name is a hash value
    Original Sample Name:0f2d20c110d6d8cfd93c2e6dc62fb8bc.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.22
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target Tic7mjgSvs.exe, PID 3380 because there are no executed function
    TimeTypeDescription
    02:51:07API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6334003920415593
    Encrypted:false
    SSDEEP:96:P+Fi+o+vsihj1yDfVQXIDcQjc6qcElcw3z+HbHg6ZAX/d5FMT2SlPkpXmTAHof/0:2oqvl09uPMjEzuiFuZ24IO8L
    MD5:C54ED000D0BBEC6445A7BC3826A5B2AA
    SHA1:C3137F1F8F80AF8E72A2CA476D3EA39110F8A631
    SHA-256:2D49818E0B33F69F6C37C5FAA30103D2794C161B1B0B2A873CFBD55CCA1C2DE9
    SHA-512:C33C83EAB305CE139922FE6C7612ED69EC6B17942137568C4740C550031A6F9C0AA76BAFFA8F9FD44257E29367A96B0F5807416142965CF9D7BA5F8CB42CA24E
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.4.5.2.8.4.9.2.7.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.4.5.4.1.9.3.0.1.1.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.8.2.d.8.0.d.a.-.d.b.5.7.-.4.a.2.3.-.9.a.c.4.-.4.9.c.b.6.a.d.c.5.8.0.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.8.9.5.6.9.c.c.-.0.4.7.e.-.4.2.4.1.-.8.a.7.b.-.2.1.8.0.4.3.f.6.b.c.c.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.T.i.c.7.m.j.g.S.v.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.3.4.-.0.0.0.1.-.0.0.1.4.-.d.f.0.a.-.0.0.7.5.e.1.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.9.a.9.d.5.a.6.5.6.8.8.b.8.e.0.c.a.e.6.9.8.1.9.2.6.f.8.e.1.6.5.0.0.0.0.f.f.f.f.!.0.0.0.0.f.d.a.7.d.9.6.c.3.6.9.6.4.2.b.0.b.f.b.2.f.8.5.0.7.7.e.8.b.3.c.7.5.7.1.3.1.7.b.e.!.T.i.c.7.m.j.g.S.v.s...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:50:52 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):1056124
    Entropy (8bit):1.0911350423360275
    Encrypted:false
    SSDEEP:1536:T98HTEdGnVkOi5+1CHVQvZyB0LZbWcJNjGXOswnGr:T98ow9y+IvXOm
    MD5:143142486C5EE93A44ED922BACEABE8B
    SHA1:62239CA051DF4363CB530F10CE485180A50191A5
    SHA-256:0F845303FB12D39AF45883A83BD7F85E7904ADA0B1C0427217A3D817AD5BB054
    SHA-512:893CF632BB6B51A9F7F2F2AC9464780831F06A94A655DEE2220BD236FB8B4EBC759C4BD525D73C2B9292EDC7C7CA766FC8AA5292564C7BD2E840520995F6B7C4
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......lW(f............4...............<.......d...............T.......8...........T...........H...4.......................................................................................................eJ......L.......GenuineIntel............T.......4...lW(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8306
    Entropy (8bit):3.6935132570413045
    Encrypted:false
    SSDEEP:192:R6l7wVeJuJ6V/Ruq6YEIuSU9kXvgmfeJEanwpD089bIBwsf0qoYm:R6lXJA6VD6YEhSU9MvgmfeJEBIBDfxe
    MD5:E95C25EA3141040B9E6B6B245DBE4330
    SHA1:45DE0212DA1A293291E2C6DF695BD865C7BAA556
    SHA-256:BDBA7442105E8BE9EBC9C7F613DE90AD8934C150B7C51940A0F31EFBDBE528DB
    SHA-512:0CC9244FCA806AF231D3A8140D663140B5B614CBF77E39CF05AEE159D3E9715C3C6D55D67CD53E92BB5645D2B113C7786244A9A54FD64ECD9913D58ACA579D0E
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.3.8.0.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4585
    Entropy (8bit):4.452549632802849
    Encrypted:false
    SSDEEP:48:cvIwWl8zs8Jg77aI9Q7WpW8VYiYm8M4JG7FEZ+q8HJ2E3Chydd:uIjf6I7eK7VqJtZ42E3Oydd
    MD5:B40E0CC6D28EBA54BE000B22002A88EC
    SHA1:2464BA78066B52800C995E45566F464703397927
    SHA-256:28E1054D8C584D20A486BA10A6098D60C1BF60AF77B05565131F62FB99C9E552
    SHA-512:00CA816A5E5DFA8D5545C5F9B5B44496B648720CA0926EE62DAD67E657FA6E62641B5477F899C786CC8B9454BA09590073E96186BE4DA4B7ED995CE312030D01
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293273" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.4215543205202765
    Encrypted:false
    SSDEEP:6144:hSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNf0uhiTw:4vloTMW+EZMM6DFyx03w
    MD5:5EE1D37163FB2698A5C475A13162C9EC
    SHA1:E71AAB5DE2DBFD23416219A3F5B0A8215EA90063
    SHA-256:10CE55F234353B5BF9D8EB588A9BE6EA7BC4318F6A38FA9ADCE39957074547AE
    SHA-512:3FECE9346714564A5DAF48E1A8B27AFFC42E53747E216F5F6E90D3ED961CC143D120474D38E1B9D860514B80DD0E555E361FBB6BEDCFEE5678C214474376D612
    Malicious:false
    Reputation:low
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmB./u.................................................................................................................................................................................................................................................................................................................................................9A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.79578462958055
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Sybase iAnywhere database files (19/3) 0.00%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Tic7mjgSvs.exe
    File size:44'032 bytes
    MD5:0f2d20c110d6d8cfd93c2e6dc62fb8bc
    SHA1:fda7d96c369642b0bfb2f85077e8b3c7571317be
    SHA256:9ffa421a091d5ef693ac93ab09b2aac37d59888d07f8e67fda4327d521f84d5b
    SHA512:b0611ef01e1c747d3f9fcbb0d9a3eb8c6e59a18f226927786db8afb019ea10f9ad62c0f26b5216f1000d54673e0658e2ae1ca3db9066a508dee64e328256effb
    SSDEEP:768:9kY+OvuxEi74MUs8bC6IVl4fyTLhPxUUhjAR9gXFfKEVxX4V4bsm9ovN:9kYnvuuzMULJLfyTV5WrAN4V4bpoV
    TLSH:37138BC63781A8F3DD5100722779B76A5BEEED235024A987C7A84DC124725E3923BE1F
    File Content Preview:MZ......................................................................H.....6.....`...`....O..............^}f}(@..X.Z.Q.=.IWG.../.6g$.,^}f}(@.._.RKP...y8..........uD..I.K.].......E.'..X..-.O.. C..dw>........Q......N.x;..<..!@.....^......?...3...gnY...m\
    Icon Hash:00928e8e8686b000
    Entrypoint:0x40f6c5
    Entrypoint Section:.pgz
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3D1A5360 [Wed Jun 26 23:50:56 2002 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    xor eax, eax
    mov edx, 523A23CFh
    xor edi, edi
    mov ebx, 0040F6FEh
    cmp eax, 00000000h
    jne 00007F5898CFC0D4h
    sub byte ptr [ebx], dl
    inc ebx
    shr edx, 08h
    inc edi
    cmp edi, 04h
    jne 00007F5898CFC0DCh
    mov edx, 523A23CFh
    mov edi, 00000000h
    cmp ebx, 0040FA00h
    jc 00007F5898CFC0AFh
    inc eax
    cmp eax, 00002715h
    jbe 00007F5898CFC09Bh
    nop
    nop
    nop
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    and ecx, ecx
    mov ecx, 523A23CFh
    cmp ecx, dword ptr [esp]
    je 00007F5898CFC262h
    mov edi, 00000000h
    mov ebx, 0040F6FEh
    add ebx, 32h
    mov edx, dword ptr [esp]
    inc ebx
    cmp ebx, 0040FA00h
    jne 00007F5898CFC0C6h
    inc edi
    cmp edi, 00015F90h
    jne 00007F5898CFC0B5h
    xor eax, eax
    mov eax, dword ptr [esp]
    xor ax, ax
    push 0000FFFFh
    push 5D7574B6h
    push 71E40722h
    push 15F8EF80h
    push 000000ECh
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1188.zodcr
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .zul0x10000xdb810x8c0064daba0a693537b0f51eaa64cd08f1e0False0.6436383928571429data6.704229765289651IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .pgz0xf0000x13400xa0024b16c0b6717f3790439c970bd4bd613False0.55625data5.2789304754180995IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .zodcr0x110000x110000x1200a1ba6ae49de02745722ed7539fa4aa9dFalse0.8198784722222222data6.650644823530544IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:50:52
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\Tic7mjgSvs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\Tic7mjgSvs.exe"
    Imagebase:0x400000
    File size:44'032 bytes
    MD5 hash:0F2D20C110D6D8CFD93C2E6DC62FB8BC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:02:50:52
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 228
    Imagebase:0x5e0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.2155139356.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2155156216.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155170701.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Tic7mjgSvs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: 69f26d5aa5d96b5452832479d11c5d5c43512d3a1fb26e635d941fbf87bf064b
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: 95817F73D1552ADBDB14CE58C4406ADB7B1EB86324F2982AADC56BB3C2C334AD41CBC4
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2155139356.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2155156216.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155170701.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Tic7mjgSvs.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: c72bc94e70dbdaa6c7b6e45edbd8f6f0a90484319418eb5941946b4bf98b31ab
      • Instruction ID: a2b6c6329966749bd2fe83194d81166975e1b845ccf7325cc7aeed30409c7d5d
      • Opcode Fuzzy Hash: c72bc94e70dbdaa6c7b6e45edbd8f6f0a90484319418eb5941946b4bf98b31ab
      • Instruction Fuzzy Hash: C2D1F571E083067AFF206B65CD46FAF7AA8AF01304F10407BF904B52D2EB7D9945876A
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2155139356.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2155156216.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155170701.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Tic7mjgSvs.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: b5e463f709a3cb013b893f95329ddc77f1b50dff00bafc00aca941a2ca1f666d
      • Instruction ID: 697941cf6ca1310f95cfa30b553c56595fecf7f3d5f69b6e6de87b3b7abd4f63
      • Opcode Fuzzy Hash: b5e463f709a3cb013b893f95329ddc77f1b50dff00bafc00aca941a2ca1f666d
      • Instruction Fuzzy Hash: 4C5183B2500205BADB11ABA5DC42FFF37ACEB49704F08443FB955F71D2EA7899048B65
      Uniqueness

      Uniqueness Score: -1.00%