Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SP6EhLXmY2.exe

Overview

General Information

Sample name:SP6EhLXmY2.exe
renamed because original name is a hash value
Original sample name:5004b177e0defa4e32f2aa8e51bb0e03.bin.exe
Analysis ID:1430687
MD5:5004b177e0defa4e32f2aa8e51bb0e03
SHA1:653d241e8ebd9333e7e1e37c99d24ce5354df0dc
SHA256:231174108b0b282e7c9237de612203cd5aaee96b0ced55a17634aa6f9ef85780
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • SP6EhLXmY2.exe (PID: 7292 cmdline: "C:\Users\user\Desktop\SP6EhLXmY2.exe" MD5: 5004B177E0DEFA4E32F2AA8E51BB0E03)
    • WerFault.exe (PID: 7360 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7292 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SP6EhLXmY2.exeAvira: detected
Source: SP6EhLXmY2.exeVirustotal: Detection: 70%Perma Link
Source: SP6EhLXmY2.exeReversingLabs: Detection: 63%
Source: SP6EhLXmY2.exeJoe Sandbox ML: detected
Source: SP6EhLXmY2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: SP6EhLXmY2.exeString found in binary or memory: https://bc.nsk.
Source: SP6EhLXmY2.exeString found in binary or memory: https://www.faktura.ru/enter.jsp?site=
Source: SP6EhLXmY2.exeString found in binary or memory: https://www.faktura.ru/enter.jsp?site=https://bc.nsk.
Source: C:\Users\user\Desktop\SP6EhLXmY2.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7292 -s 232
Source: SP6EhLXmY2.exeStatic PE information: No import functions for PE file found
Source: SP6EhLXmY2.exeBinary or memory string: OriginalFilename.FZdLhlBlb8 vs SP6EhLXmY2.exe
Source: SP6EhLXmY2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7292
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\db71ddf5-0abf-40bc-8942-51ded5bb411bJump to behavior
Source: C:\Users\user\Desktop\SP6EhLXmY2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SP6EhLXmY2.exeVirustotal: Detection: 70%
Source: SP6EhLXmY2.exeReversingLabs: Detection: 63%
Source: unknownProcess created: C:\Users\user\Desktop\SP6EhLXmY2.exe "C:\Users\user\Desktop\SP6EhLXmY2.exe"
Source: C:\Users\user\Desktop\SP6EhLXmY2.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7292 -s 232
Source: C:\Users\user\Desktop\SP6EhLXmY2.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .laj
Source: SP6EhLXmY2.exeStatic PE information: section name: .whibul
Source: SP6EhLXmY2.exeStatic PE information: section name: .laj
Source: SP6EhLXmY2.exeStatic PE information: section name: .bufot
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SP6EhLXmY2.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SP6EhLXmY2.exeCode function: 0_2_0041134F EntryPoint,LdrInitializeThunk,0_2_0041134F
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SP6EhLXmY2.exe70%VirustotalBrowse
SP6EhLXmY2.exe63%ReversingLabsWin32.Trojan.Zeus
SP6EhLXmY2.exe100%AviraTR/Crypt.XPACK.Gen
SP6EhLXmY2.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://bc.nsk.0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.faktura.ru/enter.jsp?site=SP6EhLXmY2.exefalse
    high
    http://upx.sf.netAmcache.hve.3.drfalse
      high
      https://www.faktura.ru/enter.jsp?site=https://bc.nsk.SP6EhLXmY2.exefalse
        high
        https://bc.nsk.SP6EhLXmY2.exefalse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1430687
        Start date and time:2024-04-24 02:51:23 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 59s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SP6EhLXmY2.exe
        renamed because original name is a hash value
        Original Sample Name:5004b177e0defa4e32f2aa8e51bb0e03.bin.exe
        Detection:MAL
        Classification:mal60.winEXE@2/5@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 1
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.94
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        02:52:37API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.63742337064804
        Encrypted:false
        SSDEEP:96:WOFnRRlzyNyEnyvsd9h5ok7JfPQXIDcQDc6scEhcw3Ucz+HbHg6ZAX/d5FMT2SlW:5jDzmwvf0doLcjEzuiFkZ24IO8n
        MD5:43CE8D783D00041C2F6EDB61F315A5E4
        SHA1:88CE49A9DCB78D114F40987707DB93A4DBCD6637
        SHA-256:1CF7DCE5A396E4B922E3709D8DA9F2C35255DE099E609710E5218D32C84F59E0
        SHA-512:C836F2C720F803D6E567185D81737F82C9CCAF035B7F08D5E7454A7102BAA245BE90A010081FD59C17696F25B5BB19020370F3084BA1EE93699CB54E34C71ECB
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.5.3.2.9.6.2.3.4.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.5.3.3.8.6.8.6.0.2.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.5.0.3.6.b.3.c.-.2.d.2.c.-.4.e.1.c.-.8.5.e.5.-.a.7.5.a.4.3.4.b.e.4.a.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.e.8.e.1.3.2.4.-.8.f.7.6.-.4.3.9.7.-.8.3.b.9.-.6.4.7.6.c.f.1.6.c.6.3.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.P.6.E.h.L.X.m.Y.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.7.c.-.0.0.0.1.-.0.0.1.4.-.f.e.1.a.-.5.3.a.4.e.1.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.8.f.c.6.6.1.a.9.0.4.f.d.d.1.9.9.c.6.d.1.4.2.4.0.1.c.2.c.4.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.5.3.d.2.4.1.e.8.e.b.d.9.3.3.3.e.7.e.1.e.3.7.c.9.9.d.2.4.c.e.5.3.5.4.d.f.0.d.c.!.S.P.6.E.h.L.X.m.Y.2...e.x.e.....T.a.r.g.e.t.A.p.p.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:52:13 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):18516
        Entropy (8bit):1.9355562857397648
        Encrypted:false
        SSDEEP:96:5R8AE3JA6CQRdGdZE1M/oi7n1kuQKABAtA9M6XrwSWIVbWIXsI4yFHs+:YtxFsZEPOquQKAB2ArbrKyFHs+
        MD5:823D0EF8EDAC763D7B3848BEFA37E8F5
        SHA1:8CBBE1569BE25CFC12614CA3032808CC83F3F260
        SHA-256:060E3F631FC7919A370AAD357CA066C0D0138FCA3DDACC6C341C49F8CFF9E43F
        SHA-512:B637665C90D21B9B646FAFD9B66A70696D3F1BFFD13CA15D4493C657ED7B9C41E21A51B6FBD239E22CF97FC4E5B4D3FADC94690B6B150585786807AEE626AF52
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... ........W(f............4...............<.......d...............T.......8...........T................>......................................................................................................eJ......L.......GenuineIntel............T.......|....W(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8326
        Entropy (8bit):3.70256859595032
        Encrypted:false
        SSDEEP:192:R6l7wVeJNt67F6Y93SUiHKgmf1Upr989bBusfRLm:R6lXJ367F6YNSUAKgmf1bBtfg
        MD5:5D28946315B4B7D3813E68080CC7C28C
        SHA1:F4545FD94F03108421C8F17854E3ED029E9F9D0B
        SHA-256:AA280828E194ECA5427EC4229C64E4ABEE449A90025493E8966FB0789760FF54
        SHA-512:9F258799048AE17753260EE6EC089D8A1C2201E175E23296ADC81AD4803B4D36202DD3A7A3CB1CC58A93D108D851D86E0AED44B45EE6D50750F95ADD87F60632
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.9.2.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4619
        Entropy (8bit):4.514111697577561
        Encrypted:false
        SSDEEP:48:cvIwWl8zsRJg77aI9rYWpW8VY/Ym8M4J2NcFs09+q8LB+TX+Nid:uIjfjI7NR7VvJ2O00TX+Nid
        MD5:55489D779E364487862AC7B2126F6FCD
        SHA1:102E118380EF205C147A8111B45EAFA24DFF5A3F
        SHA-256:DB9265122FDC5C577C32E8DAA97F806B04291B17AA26AF56F68B47638DCF7E0E
        SHA-512:5D2821772CB8FC29D0B8F33C6A5A8A583A75E5EA1BFD4BB16D8C428BC4B681C5311282776829DDC3528C237DD92C2D53B355AD82900A3D9E982798807CE01509
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293274" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.465458456124756
        Encrypted:false
        SSDEEP:6144:oIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN1dwBCswSbw:9XD94+WlLZMM6YFHr+w
        MD5:1C4851DCD6C3A39333BBFB1C276AD211
        SHA1:D25D34D3E642DB52B46ED002E3FD87F8AA524CE6
        SHA-256:D9F1B1AF31141B666C281B9777B9C86B6061954297940931907D8C96A10493EB
        SHA-512:E535583799C8B19F32E13A9728628FD7C594DE8DC936714E77964917BCDFF3EE388234F22034CFF311917F851D598FABBC6659737FD2C1C6A2F970E673D6E7AB
        Malicious:false
        Reputation:low
        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):2.8776225829811755
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:SP6EhLXmY2.exe
        File size:163'840 bytes
        MD5:5004b177e0defa4e32f2aa8e51bb0e03
        SHA1:653d241e8ebd9333e7e1e37c99d24ce5354df0dc
        SHA256:231174108b0b282e7c9237de612203cd5aaee96b0ced55a17634aa6f9ef85780
        SHA512:4b0dc2946a207e8902ac798afb554dff123fb1598b1d34f9e8f7511144501235d486216515a737b856b72147e9b481455dadd018084636009f47142ddc5ea1f9
        SSDEEP:1536:a7FzuGotNKS+YEs/SG5he1FQRJot8whZl04tRtYXs0YD:3NKBk5eHHe2/Ks0o
        TLSH:36F37C4232D0DCB1CAA3807237797F36B2BFE9758E165843833058CC6BA59E2C515E9B
        File Content Preview:MZ......................@.....................................................6.`...`...`....O..`..... .....^}f}(@.F.N.O.S.W.Z.^..=...6k .(^}f}(@..]...F.N.C.;./...+.5k!.'t..{.E8_.I,.~.`.R...f..o..|.N...".$.6e...i.......1t...(.Z....=P.......x.*.l....'.Q...
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x41134f
        Entrypoint Section:.laj
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x43D7BD78 [Wed Jan 25 18:03:36 2006 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        add esp, 0Ch
        test al, al
        je 00007F2F0CC6C8A0h
        test byte ptr [ebp-10h], 00000004h
        je 00007F2F0CC6C886h
        xor eax, eax
        jmp 00007F2F0CC6C8B5h
        test byte ptr [ebp-10h], 00000002h
        je 00007F2F0CC6C887h
        xor eax, eax
        inc eax
        jmp 00007F2F0CC6C8AAh
        cmp dword ptr [ebp-08h], 28h
        jne 00007F2F0CC6C885h
        mov esi, dword ptr [ebp-0Ch]
        cmp byte ptr [ebp+08h], 00000000h
        mov eax, dword ptr [004120DCh]
        jne 00007F2F0CC6C887h
        mov eax, dword ptr [004120E0h]
        push dword ptr [ebp+18h]
        push dword ptr [ebp+14h]
        push dword ptr [ebp+10h]
        push esi
        push dword ptr [ebp+0Ch]
        call eax
        pop esi
        leave
        retn 0014h
        push ebp
        mov ebp, esp
        push dword ptr [ebp+18h]
        mov eax, dword ptr [ebp+0Ch]
        push dword ptr [ebp+14h]
        push dword ptr [ebp+10h]
        push dword ptr [ebp+08h]
        push 00000001h
        call 00007F2F0CC6C7C4h
        pop ebp
        retn 0014h
        push ebp
        mov ebp, esp
        push dword ptr [ebp+18h]
        mov eax, dword ptr [ebp+0Ch]
        push dword ptr [ebp+14h]
        push dword ptr [ebp+10h]
        push dword ptr [ebp+08h]
        push 00000000h
        call 00007F2F0CC6C7A7h
        pop ebp
        retn 0014h
        and dword ptr [00411974h], 00000000h
        and dword ptr [00411970h], 00000000h
        push 00411958h
        call dword ptr [00412410h]
        ret
        mov edx, dword ptr [00411970h]
        push esi
        xor eax, eax
        test edx, edx
        push edi
        jbe 00007F2F0CC6C89Eh
        mov edi, dword ptr [00411974h]
        mov esi, edi
        mov ecx, dword ptr [esi]
        cmp ecx, dword ptr [esp+0Ch]
        jne 00007F2F0CC6C886h
        test ecx, ecx
        jne 00007F2F0CC6C88Fh
        inc eax
        add esi, 0Ch
        cmp eax, edx
        jc 00007F2F0CC6C86Eh
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000x13c0.bufot
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .whibul0x10000xfe0e0xae000381fc87bc4f2c1befa4d9ed1ca03b7dFalse0.5957480244252874data6.432273483065789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .laj0x110000x14750x800bdd57566183f8261382e10716fb0d259False0.712890625data6.260404025185798IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .bufot0x130000x140000x18008afdd104c39406276685a07c99eac134False0.12174479166666667data1.5167225672959757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x270000x10000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:02:52:11
        Start date:24/04/2024
        Path:C:\Users\user\Desktop\SP6EhLXmY2.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\SP6EhLXmY2.exe"
        Imagebase:0x400000
        File size:163'840 bytes
        MD5 hash:5004B177E0DEFA4E32F2AA8E51BB0E03
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:02:52:12
        Start date:24/04/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7292 -s 232
        Imagebase:0xbc0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:0.2%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:33.3%
          Total number of Nodes:12
          Total number of Limit Nodes:0
          execution_graph 3151 4113b5 3152 4112f0 LdrInitializeThunk 3151->3152 3153 4113ce 3152->3153 3144 411398 3147 4112f0 3144->3147 3148 411304 3147->3148 3149 41135c 3148->3149 3150 411384 LdrInitializeThunk 3148->3150 3150->3149 3140 41134f 3143 411356 3140->3143 3141 411384 LdrInitializeThunk 3142 41135c 3141->3142 3143->3141 3143->3142

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 41134f-411354 1 411374-41137d 0->1 2 411356-41135a 0->2 5 411384-411391 LdrInitializeThunk 1->5 6 41137f 1->6 3 411360-411364 2->3 4 41135c-41135e 2->4 8 411366-411369 3->8 9 41136b-41136f 3->9 7 411393-411395 4->7 5->7 6->5 8->7 9->1 10 411371 9->10 10->1
          APIs
          • LdrInitializeThunk.NTDLL(?,?,?,?,?), ref: 00411391
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1914415312.0000000000411000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1914397186.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1914465770.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_SP6EhLXmY2.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID: (
          • API String ID: 2994545307-3887548279
          • Opcode ID: dc38b860eaf026644876a99371a734a354dfa64abb50c6c5b53465b2ad5c2ecc
          • Instruction ID: 07c2190ca4c1d14ef34a6a34d74e4af80d80f5b914b0bf81e06c856988f4ec14
          • Opcode Fuzzy Hash: dc38b860eaf026644876a99371a734a354dfa64abb50c6c5b53465b2ad5c2ecc
          • Instruction Fuzzy Hash: 18F0823150418DAAEF11CF90DD057EF3F61AB05344F088656EF6192575C3798AE1D794
          Uniqueness

          Uniqueness Score: -1.00%