Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
U4fyOXrnTL.exe

Overview

General Information

Sample name:U4fyOXrnTL.exe
renamed because original name is a hash value
Original sample name:01653d986e172b9f90f78c1483d17b90.bin.exe
Analysis ID:1430695
MD5:01653d986e172b9f90f78c1483d17b90
SHA1:6f9dcf4f387a25baf02baca5e0c54279c452fe18
SHA256:7e30376b1f2ce098baaa3aca6919fb3e945e94a320afe70ede333e4319e4f695
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • U4fyOXrnTL.exe (PID: 5352 cmdline: "C:\Users\user\Desktop\U4fyOXrnTL.exe" MD5: 01653D986E172B9F90F78C1483D17B90)
    • WerFault.exe (PID: 6844 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: U4fyOXrnTL.exeAvira: detected
Source: U4fyOXrnTL.exeVirustotal: Detection: 83%Perma Link
Source: U4fyOXrnTL.exeReversingLabs: Detection: 84%
Source: U4fyOXrnTL.exeJoe Sandbox ML: detected
Source: U4fyOXrnTL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\U4fyOXrnTL.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 232
Source: U4fyOXrnTL.exeStatic PE information: No import functions for PE file found
Source: U4fyOXrnTL.exe, 00000000.00000000.1393355710.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename59TNH0 vs U4fyOXrnTL.exe
Source: U4fyOXrnTL.exeBinary or memory string: OriginalFilename59TNH0 vs U4fyOXrnTL.exe
Source: U4fyOXrnTL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5352
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\64c1ae69-25cd-4989-a9de-f86b7ac625c8Jump to behavior
Source: C:\Users\user\Desktop\U4fyOXrnTL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: U4fyOXrnTL.exeVirustotal: Detection: 83%
Source: U4fyOXrnTL.exeReversingLabs: Detection: 84%
Source: unknownProcess created: C:\Users\user\Desktop\U4fyOXrnTL.exe "C:\Users\user\Desktop\U4fyOXrnTL.exe"
Source: C:\Users\user\Desktop\U4fyOXrnTL.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 232
Source: C:\Users\user\Desktop\U4fyOXrnTL.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .gjuxuj
Source: U4fyOXrnTL.exeStatic PE information: section name: .qjojsz
Source: U4fyOXrnTL.exeStatic PE information: section name: .gjuxuj
Source: U4fyOXrnTL.exeStatic PE information: section name: .dob
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\U4fyOXrnTL.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
U4fyOXrnTL.exe83%VirustotalBrowse
U4fyOXrnTL.exe84%ReversingLabsWin32.Trojan.Zeus
U4fyOXrnTL.exe100%AviraTR/Spy.Zbot.dyy
U4fyOXrnTL.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430695
    Start date and time:2024-04-24 03:00:20 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 8s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:U4fyOXrnTL.exe
    renamed because original name is a hash value
    Original Sample Name:01653d986e172b9f90f78c1483d17b90.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target U4fyOXrnTL.exe, PID 5352 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    03:01:20API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6336832925983196
    Encrypted:false
    SSDEEP:96:LmF4yzx0I6sYnhkYl7x9jQXIDcQvc6QcEVcw3cE/ugp+HbHg6ZAX/d5FMT2SlPke:qyE6Y0BU/gjEzuiF+Z24IO8+d
    MD5:EEBBB81124D9DB76AA92842E09326221
    SHA1:1339E2CBDF2DE9D21A5A005E49B71D5DA413528F
    SHA-256:4E435FF7D37A082EE91AA715190FB8BEC5542F510B428BDA571BB5F60D5F440A
    SHA-512:6E3942D601DAAA892C488CCC8C5CB9A40774C78E5C5575E43EB3C51E05B7CC985CEF230F30BBC653088AAA7CBCC9F8CD0ADB6C5BE6D28BA8B4EE503091E13C0C
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.4.0.7.3.9.5.2.6.5.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.4.0.7.4.2.3.3.8.8.8.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.b.2.f.4.a.d.-.5.0.6.6.-.4.c.c.5.-.b.e.8.b.-.8.a.1.4.d.1.8.9.a.f.8.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.a.3.d.a.0.f.c.-.f.6.3.0.-.4.a.a.f.-.8.7.c.b.-.5.c.d.a.f.1.6.4.1.c.2.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.U.4.f.y.O.X.r.n.T.L...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.e.8.-.0.0.0.1.-.0.0.1.4.-.b.6.3.7.-.3.4.e.7.e.2.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.7.2.4.5.c.c.0.5.b.a.7.6.f.5.3.1.a.1.a.a.f.3.5.7.4.c.e.7.b.6.c.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.d.c.f.4.f.3.8.7.a.2.5.b.a.f.0.2.b.a.c.a.5.e.0.c.5.4.2.7.9.c.4.5.2.f.e.1.8.!.U.4.f.y.O.X.r.n.T.L...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 01:01:14 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.9857011130784337
    Encrypted:false
    SSDEEP:96:5M87E3ncWzSPESi7nA+rMZ9CTekRohWI9WIbBI4Z8kIBdeKy:Fe+OFgin6zZ8fy
    MD5:244750EF163E3FE758D482993477F023
    SHA1:65DF60A019864C3466F3DA1ED8988800D3ED1683
    SHA-256:C52310B2D77D1FC159C5EF7F4759DA39DCBF03485969140CA18B90592C429434
    SHA-512:36D8BBDC7DF83D57FAF24A98DD13F815D19DC46B5B4817B7CE9A0EA82BBE8ED9A2DCF538D87105AEA7E40E2513B7A9F5C83E5A6DE2D6E7322A8F68A994DF55CC
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........Y(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............Y(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8284
    Entropy (8bit):3.6971831107456645
    Encrypted:false
    SSDEEP:192:R6l7wVeJtB6JK6YSVSU9QTgmf1GrprOx89bZAsfKzm:R6lXJb6JK6YwSU9QTgmfQXZTfH
    MD5:DB429BE0F6DF7C1EDC05265E1586F010
    SHA1:8E64D70BFA1D15DB8002E56A2FB6BA2EC5A8DF20
    SHA-256:1FDAA62F85AF3B5D62100B2196AADD61D13EAF6E438FED41C27FA6BFBA965227
    SHA-512:868FF2DB78A88AB7017A5B19F1650C918E57065D9BC27F3EE2F994963FF7CA06AC2E1C335350FA150D6BB7CB32AEF839C0F60EA35CD436047364773D125DCDE6
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.5.2.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.473405493335009
    Encrypted:false
    SSDEEP:48:cvIwWl8zsbJg77aI9EHWpW8VYhYm8M4J9gyFx+q8PgJrCLDktjd:uIjf1I7C27V5J2imgrCfktjd
    MD5:991C42CBA2519FFA942B3110E41E6764
    SHA1:4F89ECAB01BE8F6207E9FF1D1DC4DE8DB769452D
    SHA-256:92495AEDCD277FEAF64E141D571A52A808F2563402AD142991B28BC30560AA02
    SHA-512:87506C390F3B62C7DBBD1EA87D3FAB035FA6B774C261C202A7708DD5F7FF0D29CD9B7B8F1624EBCF2EABB7025ADA688EBE1620B920CA3F9A08232A09AD312C61
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293283" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.372073177043739
    Encrypted:false
    SSDEEP:6144:wFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNKiL:oV1QyWWI/glMM6kF7Eq
    MD5:71B21F0781CE6B07B6EE1F513F134BF0
    SHA1:B2948F072D28E8E9225DD90FED513B8D2FE2AA71
    SHA-256:AE509494C2AD8DD0706C6B1FD15276BF111C3183CD7014CC9903E39DB6A457CB
    SHA-512:C5243D80804C14EB6D82B6532F6661C516E2C6B93F5348C968F2DBA467EEC52196C882716F67698FAF05BFF202EC452A9EE1EFE3219FD6957205D323EAD6A74A
    Malicious:false
    Reputation:low
    Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..o..................................................................................................................................................................................................................................................................................................................................................y.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.6796758408304555
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:U4fyOXrnTL.exe
    File size:49'664 bytes
    MD5:01653d986e172b9f90f78c1483d17b90
    SHA1:6f9dcf4f387a25baf02baca5e0c54279c452fe18
    SHA256:7e30376b1f2ce098baaa3aca6919fb3e945e94a320afe70ede333e4319e4f695
    SHA512:5cd2a069fdbbd6fa4098cfa9b0c7cef502c057ca0890c72c7fd97bb92dd0dfee8e183cc07a6c2b01bae7ef6f05fe55077c7532ce94f0a067139c8a9088e9696b
    SSDEEP:1536:i7ZeybolYrKXJslP41rqHOns/p974k+ryQH6bb:5YreK7HOsBZUH4b
    TLSH:65238D4376E4FCB2DA62093167943B7793BBFD304E265C078374089919B9993C627B8B
    File Content Preview:MZ......................@...........................................main......6...P..'...'....$...P.!...........................).o..{...{...{...{x..v...{x..v...{x..v.......{..`.D.`.D.`.D.`.D.............................................^}f}(@.z\.N.M.MSD.F
    Icon Hash:00928e8e8686b000
    Entrypoint:0x4102ff
    Entrypoint Section:.gjuxuj
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x437FA8B5 [Sat Nov 19 22:35:33 2005 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    add byte ptr [esi+00h], al
    add dword ptr [ecx], eax
    in al, 74h
    inc eax
    add byte ptr [ebx+00h], al
    add dword ptr [ecx], eax
    add al, 75h
    inc eax
    add byte ptr [eax+eax+01h], al
    add dword ptr [eax], esp
    jne 00007FE060B1A342h
    add byte ptr [esi+00h], ah
    add byte ptr [eax], al
    inc eax
    jne 00007FE060B1A342h
    add byte ptr [edi+00h], ah
    add byte ptr [eax], al
    inc eax
    jne 00007FE060B1A342h
    add byte ptr [ebp+00h], ah
    add dword ptr [ecx], eax
    insb
    jne 00007FE060B1A342h
    add byte ptr [edi], bh
    add byte ptr [eax], al
    add byte ptr [3B004076h], ah
    add byte ptr [eax], al
    add byte ptr [ebx+76h], cl
    inc eax
    add byte ptr [eax+eax], bh
    add byte ptr [ecx], al
    xor dword ptr [esi+40h], 00000000h
    cmp eax, 00000000h
    add byte ptr [eax], al
    add byte ptr [esi], bh
    add byte ptr [ecx], al
    add dword ptr [ebx+40004076h], ebx
    add byte ptr [eax], al
    add dl, dl
    jbe 00007FE060B1A342h
    add byte ptr [ecx+00h], al
    add byte ptr [eax], al
    div byte ptr [esi+40h]
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    pop ss
    jnbe 00007FE060B1A342h
    add byte ptr [edi+00h], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    cmp dword ptr [eax], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    cmp al, byte ptr [eax]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    dec eax
    add byte ptr [ecx], al
    add dword ptr [edx], edi
    jnbe 00007FE060B1A342h
    add byte ptr [ecx+00h], cl
    add dword ptr [ecx], eax
    cmp dh, byte ptr [edi+40h]
    add byte ptr [edx+00h], cl
    add dword ptr [ecx], eax
    cmp dh, byte ptr [edi+40h]
    add byte ptr [ebx+00h], cl
    add dword ptr [ecx], eax
    cmp dh, byte ptr [edi+40h]
    add byte ptr [esp+ebp+40h], dh
    add byte ptr [eax+2Ch], ch
    inc eax
    add byte ptr [esp+ebp+40h], bl
    add byte ptr [eax+2Ch], dl
    inc eax
    add byte ptr [eax+2Ch], al
    inc eax
    add byte ptr [eax], dh
    sub al, 40h
    add byte ptr [eax], ah
    sub al, 40h
    add byte ptr [eax], bl
    sub al, 40h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x1220.dob
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .qjojsz0x10000xe5a20x9c0040c22c275db776c1d27744cf8eb4d5d9False0.6393229166666666data6.696483908284442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .gjuxuj0x100000x13690x8006ee6a2987fd2d70ff87d12a49cf9e66eFalse0.40087890625data3.7596512888080382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .dob0x120000x120000x160083238d0be69cfac164e78fd09a0c893dFalse0.7505326704545454GLS_BINARY_LSB_FIRST6.506446310429045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x240000x10000x4006c6cbfb2974da19cc072706f2410baaeFalse0.3974609375data2.7465743115551673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:03:01:13
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\U4fyOXrnTL.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\U4fyOXrnTL.exe"
    Imagebase:0x400000
    File size:49'664 bytes
    MD5 hash:01653D986E172B9F90F78C1483D17B90
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:03:01:13
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 232
    Imagebase:0x8b0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1467133194.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1467148993.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1467164037.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1467164037.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_U4fyOXrnTL.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 3dbe249be6df49ae560b1f5fbef0830cfa75612bddb6a69f1d72b527e6bee727
      • Instruction ID: 331cb6d7f24a1dbba1dba4b97af0177cbec83d3b103f1ffabfecd80f8e6a44c4
      • Opcode Fuzzy Hash: 3dbe249be6df49ae560b1f5fbef0830cfa75612bddb6a69f1d72b527e6bee727
      • Instruction Fuzzy Hash: CFD14671944306BAEF206BA5CC4AFAF7AA9DF05304F14403BF601B52E2E77D89518B9D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1467133194.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1467148993.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1467164037.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1467164037.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_U4fyOXrnTL.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: c66114319e4601608c47dbd5cf9d84a63d98562db7cfe23df6ca578a5578f024
      • Instruction ID: d5796d15e4005830adcfcb8cb3357ddcf5fde14d5326d47617b26e5b14a25056
      • Opcode Fuzzy Hash: c66114319e4601608c47dbd5cf9d84a63d98562db7cfe23df6ca578a5578f024
      • Instruction Fuzzy Hash: 3BC13AB1A00609AFDB11DFA4C884AEFBBB9EF48304F14846AE441B7291D6399E45CF64
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1467133194.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1467148993.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1467164037.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1467164037.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_U4fyOXrnTL.jbxd
      Similarity
      • API ID:
      • String ID: *<input *value="$*<option selected$*<select $/
      • API String ID: 0-2404899240
      • Opcode ID: f6600d01d7835feffcec873756123683d842e5e3023926bde7bd854356cfa84b
      • Instruction ID: 9efe82cc5bbbdabac7a59ae8312e83676c362cac6b909490e6712e15ec38b07c
      • Opcode Fuzzy Hash: f6600d01d7835feffcec873756123683d842e5e3023926bde7bd854356cfa84b
      • Instruction Fuzzy Hash: 4861D371D04209AFDF119BA8CC85BFE7BB9EF04304F1440BAE501B71D1D6796D468B99
      Uniqueness

      Uniqueness Score: -1.00%