Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
W4B3Ey7x8Z.exe

Overview

General Information

Sample name:W4B3Ey7x8Z.exe
renamed because original name is a hash value
Original sample name:b04f37eeb89fefa6be3444a6585d1057.bin.exe
Analysis ID:1430696
MD5:b04f37eeb89fefa6be3444a6585d1057
SHA1:153483ea9d32d5b48aec44414d13634be0314e29
SHA256:7508eff860b58b5ae2bd47c89cc8cacfbeba08b5fe3084d7b6dd44f486cea2d7
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • W4B3Ey7x8Z.exe (PID: 7444 cmdline: "C:\Users\user\Desktop\W4B3Ey7x8Z.exe" MD5: B04F37EEB89FEFA6BE3444A6585D1057)
    • WerFault.exe (PID: 7548 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7600 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 236 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: W4B3Ey7x8Z.exeAvira: detected
Source: W4B3Ey7x8Z.exeReversingLabs: Detection: 89%
Source: W4B3Ey7x8Z.exeVirustotal: Detection: 68%Perma Link
Source: W4B3Ey7x8Z.exeJoe Sandbox ML: detected
Source: W4B3Ey7x8Z.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 232
Source: W4B3Ey7x8Z.exeStatic PE information: No import functions for PE file found
Source: W4B3Ey7x8Z.exe, 00000000.00000002.1445872522.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename9Vz5d1vPJ4 vs W4B3Ey7x8Z.exe
Source: W4B3Ey7x8Z.exeBinary or memory string: OriginalFilename9Vz5d1vPJ4 vs W4B3Ey7x8Z.exe
Source: W4B3Ey7x8Z.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@3/9@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7444
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\9853dd7a-f1ef-4ef6-a60c-c63d55020e59Jump to behavior
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: W4B3Ey7x8Z.exeReversingLabs: Detection: 89%
Source: W4B3Ey7x8Z.exeVirustotal: Detection: 68%
Source: unknownProcess created: C:\Users\user\Desktop\W4B3Ey7x8Z.exe "C:\Users\user\Desktop\W4B3Ey7x8Z.exe"
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 232
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 236
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .tuv
Source: W4B3Ey7x8Z.exeStatic PE information: section name: .xobqv
Source: W4B3Ey7x8Z.exeStatic PE information: section name: .tuv
Source: W4B3Ey7x8Z.exeStatic PE information: section name: .gpcp
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\W4B3Ey7x8Z.exeCode function: 0_2_004102FB EntryPoint,LdrInitializeThunk,0_2_004102FB
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1430696 Sample: W4B3Ey7x8Z.exe Startdate: 24/04/2024 Architecture: WINDOWS Score: 60 12 Antivirus / Scanner detection for submitted sample 2->12 14 Multi AV Scanner detection for submitted file 2->14 16 Machine Learning detection for sample 2->16 6 W4B3Ey7x8Z.exe 2->6         started        process3 process4 8 WerFault.exe 16 6->8         started        10 WerFault.exe 19 16 6->10         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
W4B3Ey7x8Z.exe89%ReversingLabsWin32.Trojan.Zeus
W4B3Ey7x8Z.exe69%VirustotalBrowse
W4B3Ey7x8Z.exe100%AviraTR/Crypt.XPACK.Gen
W4B3Ey7x8Z.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430696
    Start date and time:2024-04-24 03:01:17 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 28s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:14
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:W4B3Ey7x8Z.exe
    renamed because original name is a hash value
    Original Sample Name:b04f37eeb89fefa6be3444a6585d1057.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@3/9@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.182.143.212
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    03:02:28API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6372237702532276
    Encrypted:false
    SSDEEP:96:GUFPL2O68suhgoI7JfYQXIDcQvc6QcEVcw3cE/v+HbHg6ZAX/d5FMT2SlPkpXmTu:vf6880BU/ojEzuiFZZ24IO8g
    MD5:8B801B253FEFFA51D5FBDCA60F3C95AE
    SHA1:91349FB8BBD3F1C7C0BA70EFE82C77ED341395F2
    SHA-256:745DD67A66D7EF0011B4886F0A55CFB922654F24C3AF6AEFC1EC94B271620B5C
    SHA-512:31EE7A87CCD69E11AE400E40040A07B094AD9B25B835A9AAFFC4E50A258199BDE0B5E6D2B3398CB86A8E1C59846C614DC247F6A3E09D9071B34A2B646D7C5BCB
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.4.1.3.4.7.9.0.5.8.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.4.1.3.5.3.2.1.8.3.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.4.8.7.1.0.0.2.-.7.0.b.c.-.4.5.8.5.-.8.9.d.4.-.3.0.9.5.3.2.6.4.4.5.b.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.e.7.4.3.8.5.-.0.7.6.2.-.4.4.8.f.-.b.0.6.3.-.4.d.a.e.1.4.7.5.7.c.b.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.4.B.3.E.y.7.x.8.Z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.1.4.-.0.0.0.1.-.0.0.1.3.-.4.f.d.0.-.2.b.0.b.e.3.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.0.9.a.9.f.c.a.b.d.3.6.9.4.b.a.1.7.6.4.d.c.e.e.d.d.9.c.9.0.0.6.0.0.0.0.f.f.f.f.!.0.0.0.0.1.5.3.4.8.3.e.a.9.d.3.2.d.5.b.4.8.a.e.c.4.4.4.1.4.d.1.3.6.3.4.b.e.0.3.1.4.e.2.9.!.W.4.B.3.E.y.7.x.8.Z...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6332159853478188
    Encrypted:false
    SSDEEP:96:+r3L2O6oksuhgoU7RUSZQXIDcQzc645cocE1cw345c5+HbHg6ZAX/d5FMT2SlPk+:46ok/0tM/KjEzuiF+Z24IO89
    MD5:5E8F09F61E2AAE96CD4A858AB48CE58F
    SHA1:BAEB9052296F694A7BE3FC366C06C77401CEA441
    SHA-256:D38C8003D1C6F5670CA61CBA278C959F410240DC723F25F9EA5232ED321B611E
    SHA-512:8CBFA45FEE250F14BAF881FD8F49FD36967DC3AE8626FC94F87623FF2CCB93ABE6A087792B01218F69440A382A92C3FA889650A13EE630474166579FF2921922
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.4.1.3.4.2.1.4.2.3.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.c.3.e.3.f.8.-.f.1.a.f.-.4.e.4.8.-.b.8.d.8.-.6.4.0.f.a.b.4.9.1.d.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.6.4.6.9.0.1.6.-.f.1.c.e.-.4.c.f.3.-.9.5.b.4.-.a.7.7.2.4.d.8.f.f.0.a.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.4.B.3.E.y.7.x.8.Z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.1.4.-.0.0.0.1.-.0.0.1.3.-.4.f.d.0.-.2.b.0.b.e.3.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.0.9.a.9.f.c.a.b.d.3.6.9.4.b.a.1.7.6.4.d.c.e.e.d.d.9.c.9.0.0.6.0.0.0.0.f.f.f.f.!.0.0.0.0.1.5.3.4.8.3.e.a.9.d.3.2.d.5.b.4.8.a.e.c.4.4.4.1.4.d.1.3.6.3.4.b.e.0.3.1.4.e.2.9.!.W.4.B.3.E.y.7.x.8.Z...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.1././.0.8././.1.4.:.1.7.:.1.7.:.1.6.!.0.!.W.4.B.3.E.y.7.x.8.Z...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 01:02:14 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):17764
    Entropy (8bit):1.8780832328645454
    Encrypted:false
    SSDEEP:96:59n8H5E3EOVjJ/ptK0kNi7nuHsm4XsRzyXw3cCWIuWI7YIQfNm0o+ct:78gcNOuH0DXw3cIfNpo+ct
    MD5:BC2BAB58B7998228026B6981450F4E46
    SHA1:B334FC925949C39272FA1E7462AB781F0C78E2E7
    SHA-256:E5FF45DE3DDD346650D2F65D3021F18FA0902F4C9DE7400BADA452C398B7C5D1
    SHA-512:37850FF95ADD2040DB562FAD58D733F6B1719AF793050D6D5E07DF3DAA81DCEB9C9D9642BFD480713868B75BB84B9AFF8DE5EA0B27CB15E1A4AC66D3777CC683
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........Z(f............4...............<.......T...............T.......8...........T...........p....;......................................................................................................eJ......L.......GenuineIntel............T............Z(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8390
    Entropy (8bit):3.701371724088466
    Encrypted:false
    SSDEEP:192:R6l7wVeJx/6JK6YeRSUp4gmfzMpNB89bq21f3um:R6lXJZ6JK6Y4SUp4gmfzBqMfH
    MD5:02D40CF534A858BF523951DAC45613F4
    SHA1:2550A8EE1DC8201E4AB31741B6344B665F9B9D3D
    SHA-256:3C6A07B74F4CDA29D3153593E29CE301EFED710E3BD71C6BDEA2D45B4E74A2D4
    SHA-512:3A44B05F99E427AB94337559FB6FA6DF6ECCB59932617C549AAC67F162F2E18819009D8F66ECDD14D75B9207B53FF06B5EA09257D4D8C5E3F5817886E4EA04B9
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.4.4.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4720
    Entropy (8bit):4.492401234622523
    Encrypted:false
    SSDEEP:48:cvIwWl8zsKJg77aI9PcWpW8VY5PoYm8M4JNgFsO+q8vRhnRTsUd:uIjfYI7NV7VI9JfOKLnRTsUd
    MD5:D7D9CCF77FF7FF3CF979884BD3014A62
    SHA1:F0250CD094CDC46FAFEF29E02CAC4FA7B38760F7
    SHA-256:E2D6A74302EE8F0F7AA89547E0D37D0BAC40FBF722B872B801D55B8ED474D864
    SHA-512:F6694C5ED686BD34EB742228BBD5CA541B9B209CCFFE7361AAC729F22441B84F1D2EEF4B6657C11B0D408326783C7D256C248B7AAA085879B52D2A92D069EBE6
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293284" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 01:02:14 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18488
    Entropy (8bit):1.948119482193486
    Encrypted:false
    SSDEEP:96:59n8A5E3zOVj7oQeNi7nuHsJXqa6sl81wCWIuWIeYIWyfx/p:78ieNOuHeF6sS69yfx/p
    MD5:A63E46349DCC7F9A7E5F95558921A6C0
    SHA1:1E3E94376D8BA0464F2BD5E210B92BA1C2E5B4E0
    SHA-256:D1036EDF1F33C0926B1320A0FF77BC4CD0F8B97512E6B84729371660DDA2310E
    SHA-512:E6174A37FA6E56FEA02F529B6BB4D2B557516890D6F8D9CA8C5A7C6655630308C2C069A2FB5CFB4400457C899F8FF0F2ECD692AB5A4959FD76F34444B85CBF40
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........Z(f............4...............<.......T...............T.......8...........T................>......................................................................................................eJ......L.......GenuineIntel............T............Z(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8334
    Entropy (8bit):3.704827151353095
    Encrypted:false
    SSDEEP:192:R6l7wVeJxjy6JSXPE6YeMSU0pjOgmfs+pra89bqWsfWum:R6lXJ1y6JqPE6YlSUGjOgmfsIq1f2
    MD5:119B5F9E10B8FF99565BEB30FB2B376D
    SHA1:77B34D05F822574355D261E43677F14D380D8FE9
    SHA-256:AD571086A09F4874C5F636F2B0A528086FC33C474911F6A9EEA0A9DF87174A43
    SHA-512:E15D15B63524385DCB21625BEC479671632C14DF961735DA901EA6B0FFE4EDDC0259DF11EE6D11F5914B8FE57A3C193E8C68FDAB805376D868DB550EF9322B67
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.4.4.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4619
    Entropy (8bit):4.5054010667417685
    Encrypted:false
    SSDEEP:48:cvIwWl8zsKJg77aI9PcWpW8VY5HhYm8M4JNVFb+q8fenRTsVd:uIjfYI7NV7VIHAJ57nRTsVd
    MD5:553752202072B04368F5D87A54CCEBBF
    SHA1:E74FE7D32DA8E0B66D53778A76EB23C06F7F63C7
    SHA-256:813ACE5B7166ACB2D2ED2E5FC288763CD86E4EB748E30381EC889F0894837BCB
    SHA-512:774282090CCE17AECFFA26AFC40B58AB2D08004532BD72ABA8519C1ADA31D8ED6513A5D223587E205355E3C343D525B6B07A5E775C121BEA388BF53D253A35A4
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293284" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.298809374020849
    Encrypted:false
    SSDEEP:6144:wECqOEmWfd+WQFby/9026ZTyaRsCDusBqD5dooi8lHSD6VJSREj:VCUL6seqD5SeSWVAR8
    MD5:1A520FBCDA65C4EF9C8FC1856A5EE9B2
    SHA1:E60D99232B7185D6ACD2EA4569E9269DF1D8FBDE
    SHA-256:613DC0BAFDE736BDCD54D17203C6014436FDF58F3A030DF4DCCC549EDFA4393C
    SHA-512:7301A6B9B871EEE704A67357A5D0320C3B2D0FCA9ED4BF480D3655F7926E24AB2640564551E26928202FDC0FED4867CCBE6A6BC86BF7F3E2B3A2699DF46843AB
    Malicious:false
    Reputation:low
    Preview:regfF...F....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..]..................................................................................................................................................................................................................................................................................................................................................H?........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
    Entropy (8bit):6.618745793927637
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:W4B3Ey7x8Z.exe
    File size:47'104 bytes
    MD5:b04f37eeb89fefa6be3444a6585d1057
    SHA1:153483ea9d32d5b48aec44414d13634be0314e29
    SHA256:7508eff860b58b5ae2bd47c89cc8cacfbeba08b5fe3084d7b6dd44f486cea2d7
    SHA512:b6f64638fc4f82fa318c0424af82dca503e971d6653080e02d8cdb91c90629e2c2f3b4b38ba95dabc759b0c45ddc5acf03e29724f7a55cb4bff7a1b04f2dcb19
    SSDEEP:768:lKEUnSAvu6cMEtClbx0mz6QooKSJ0GebDnVR8WIisfp381c/Llf9FQ15qxtbRNL7:+nhvuqmQ0m2QZuXfA1L38OjUExtb7KS
    TLSH:C7239E2672E2DCF3DE22443026A9BF76637EF8333D55ACC383204A496525DD2912B64B
    File Content Preview:MZ............................................................................6.`...`...`....O..`...,.*.....^}f}(@..[.R.L.?.:.?.7...4h5.1......|........^}f}(@..[.R.L.?.:.?.7...4h5.1......|.............Q....l7.....-......bU|.fI...}.o...........k:..?.A.S...
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x4102fb
    Entrypoint Section:.tuv
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3B795D1C [Tue Aug 14 17:17:16 2001 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    add byte ptr [eax], al
    add byte ptr [eax], al
    add ah, bl
    adc byte ptr [eax+00h], al
    call 00007F1318F375CFh
    add al, byte ptr [ecx+00h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    int3
    adc byte ptr [eax+00h], al
    insb
    or al, 41h
    add byte ptr [eax+00004102h], bl
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax+eax+01h], al
    add dword ptr [esi+72h], ecx
    inc eax
    add byte ptr [ebp+00h], al
    add dword ptr [ecx], eax
    push 00000072h
    inc eax
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    mov dh, byte ptr [edx+40h]
    add byte ptr [ebx+00h], al
    add dword ptr [ecx], eax
    cmpsb
    jc 00007F12F8F33502h
    add byte ptr [ebp+00h], ah
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11dc.gpcp
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .xobqv0x10000xe38d0x9200822c96c9858713ec19a482d8de74adedFalse0.6400363869863014data6.7119935179512495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tuv0x100000x13600x8005288ae7a2c71704c091dc795f47eeca2False0.353515625data3.2652651174335103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .gpcp0x120000x120000x1600b6b01a7e228cb272f27719ffed6846e2False0.6890980113636364data6.068721400492065IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x240000x10000x400d7d39083738ff2c8d71626a803b58798False0.390625data2.7301450868393085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:03:02:13
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\W4B3Ey7x8Z.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\W4B3Ey7x8Z.exe"
    Imagebase:0x400000
    File size:47'104 bytes
    MD5 hash:B04F37EEB89FEFA6BE3444A6585D1057
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:03:02:14
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 232
    Imagebase:0x1000000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:03:02:14
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 236
    Imagebase:0x1000000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.5%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:40%
      Total number of Nodes:5
      Total number of Limit Nodes:0
      execution_graph 3350 410004 3351 41010e LdrInitializeThunk 3350->3351 3353 41034f 3351->3353 3348 4102fb LdrInitializeThunk 3349 41034f 3348->3349

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 25 4102fb-41034d LdrInitializeThunk 26 41038f-410395 25->26 27 41034f-410352 25->27 28 4103d7-410438 26->28 29 410397-4103d3 26->29 31 410464-410468 28->31 32 41043a-410463 28->32 29->28 33 410493-410494 31->33 34 41046a-410491 31->34 32->31 35 410495-4104bd 33->35 36 4104be-4105a7 33->36 34->33 35->36 37 4105a8-4105c8 36->37 38 4105ca-4105d8 37->38 39 4105ed-410631 37->39 40 4105da-4105dd 38->40 41 4105df-4105ec 38->41 39->37 40->41 41->39
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1445856143.0000000000410000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1445840452.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1445872522.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1445872522.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_W4B3Ey7x8Z.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: dec77d8b91607ebd5f6024df76c887e6deff91c12ab2a31f32a7621ed93c285d
      • Instruction ID: ae6233d59f349f8b63573ecb86175d1f462f6cddb156b0df052095a67d336d32
      • Opcode Fuzzy Hash: dec77d8b91607ebd5f6024df76c887e6deff91c12ab2a31f32a7621ed93c285d
      • Instruction Fuzzy Hash: 6EB1E46198E3C24FD71387B049795D07FA0AD2752432E96DFC4EA8B4A3D29C848BC726
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 410004-41010c 1 41011f-4102ee 0->1 2 41010e-41011d 0->2 4 4102f5-41034d LdrInitializeThunk 1->4 2->1 5 41038f-410395 4->5 6 41034f-410352 4->6 7 4103d7-410438 5->7 8 410397-4103d3 5->8 10 410464-410468 7->10 11 41043a-410463 7->11 8->7 12 410493-410494 10->12 13 41046a-410491 10->13 11->10 14 410495-4104bd 12->14 15 4104be-4105a7 12->15 13->12 14->15 16 4105a8-4105c8 15->16 17 4105ca-4105d8 16->17 18 4105ed-410631 16->18 19 4105da-4105dd 17->19 20 4105df-4105ec 17->20 18->16 19->20 20->18
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1445856143.0000000000410000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1445840452.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1445872522.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1445872522.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_W4B3Ey7x8Z.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: e282837f7e64e0432fa8b33b6193bc5d1411eeca70f5b76a18e60d354c2cc83e
      • Instruction ID: 62ecc80b7ed9cb2559a2092dc626fd7f8bf7546f3779d379835fbbd46679750b
      • Opcode Fuzzy Hash: e282837f7e64e0432fa8b33b6193bc5d1411eeca70f5b76a18e60d354c2cc83e
      • Instruction Fuzzy Hash: 5AB144A148E3C24FC71387B44C685907FB0AE1322872E91DBC1D5CF4A3D29D998BD726
      Uniqueness

      Uniqueness Score: -1.00%