Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe
Analysis ID:1431790
MD5:9ec45fd755974a8b50342ee6dd8205e7
SHA1:76f0aeb1891a895cee93aad524d37cc444344dbc
SHA256:d67de542a7c8c3535b0a79589d4ba10880bd97e4c126038c13a2efaa5d854a64
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeAvira: detected
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeReversingLabs: Detection: 28%
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: http://InetURL:/1.0
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: http://www.clamav.net
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: http://www.indyproject.org/
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040BC600_2_0040BC60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 232
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
Source: classification engineClassification label: mal60.evad.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3108
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\01f267ee-3f06-4755-889e-069247feae51Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeReversingLabs: Detection: 28%
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: NATS-SEFI-ADD
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: NATS-DANO-ADD
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: jp-ocr-b-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: jp-ocr-hand-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: ISO_6937-2-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: NATS-SEFI-ADD
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: NATS-DANO-ADD
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: jp-ocr-b-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: jp-ocr-hand-add
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeString found in binary or memory: ISO_6937-2-add
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 232
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeSection loaded: apphelp.dllJump to behavior
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic file information: File size 3121152 > 1048576
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x27d000
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E976 push ecx; mov dword ptr [esp], edx0_2_0040E979
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E918 push ecx; mov dword ptr [esp], edx0_2_0040E919
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E924 push ecx; mov dword ptr [esp], edx0_2_0040E925
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E930 push ecx; mov dword ptr [esp], edx0_2_0040E931
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E99C push ecx; mov dword ptr [esp], edx0_2_0040E99D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E9BE push ecx; mov dword ptr [esp], edx0_2_0040E9C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_00411A2A push ecx; mov dword ptr [esp], edx0_2_00411A2D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040EAC8 push ecx; mov dword ptr [esp], edx0_2_0040EAC9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040EAB0 push ecx; mov dword ptr [esp], edx0_2_0040EAB1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040E300 push ecx; mov dword ptr [esp], edx0_2_0040E301
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_00410F5E push ecx; mov dword ptr [esp], eax0_2_00410F61
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_00411702 push ecx; mov dword ptr [esp], ecx0_2_00411709
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_00406F04 push ecx; mov dword ptr [esp], eax0_2_00406F05
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeBinary or memory string: WIRESHARK.EXE
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_0040F4EC LdrInitializeThunk,0_2_0040F4EC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exeCode function: 0_2_00408020 cpuid 0_2_00408020
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe, SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe, 00000000.00000000.1353169784.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe, SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe, 00000000.00000000.1353169784.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: ollydbg.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping121
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe29%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe100%AviraTR/ATRAPS.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.indyproject.org/0%URL Reputationsafe
http://InetURL:/1.00%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.clamav.netSecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exefalse
    high
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      http://www.indyproject.org/SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exefalse
      • URL Reputation: safe
      unknown
      http://InetURL:/1.0SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exefalse
      • Avira URL Cloud: safe
      low
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1431790
      Start date and time:2024-04-25 19:23:11 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 56s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:13
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe
      Detection:MAL
      Classification:mal60.evad.winEXE@2/5@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 1
      • Number of non-executed functions: 2
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 104.208.16.94
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      19:24:28API Interceptor1x Sleep call for process: WerFault.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.6808283954874877
      Encrypted:false
      SSDEEP:96:wPFDaG39+hqsGhMyoI7JfYQXIDcQvc6QcEVcw3cE//+HbHg6ZAX/d5FMT2SlPkpq:eJaG39oql0BU/YjEzuiFGZ24IO8A
      MD5:DF8BB1D5820047E81EA884C464C5A459
      SHA1:D179B650A3C8D538D96D2C1F0650917EFB91672D
      SHA-256:11A02BD41968AF98D215783F2C553F56F83A8A2F441E6E3B1B74C3C32EDB2678
      SHA-512:5402AA9D616ED0FA9A3C0C097ABD337673D9ED2A0207CF82F8D60978D9B0CB7206A317DAD7F427DC96111382A12BFB0E8761B059B8E27D7A9F5FEB3997F030D5
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.3.9.4.5.8.1.3.0.7.3.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.3.9.4.5.8.5.0.5.7.4.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.b.8.0.3.6.7.a.-.b.9.a.8.-.4.c.7.8.-.9.d.2.c.-.1.e.f.6.6.8.4.6.0.b.7.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.3.a.1.a.4.d.-.e.a.5.7.-.4.b.0.5.-.9.7.0.e.-.9.6.e.3.1.5.4.9.3.b.b.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...T.R...A.T.R.A.P.S...G.e.n...2.8.2.7.7...5.9.7.8...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.2.4.-.0.0.0.1.-.0.0.1.3.-.0.2.b.0.-.f.3.6.6.3.5.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.c.c.2.7.3.e.1.8.d.c.e.6.f.f.4.5.5.3.e.4.f.0.8.f.9.b.b.2.e.e.3.0.0.0.0.f.f.f.f.!.0.0.0.0.7.6.f.0.a.e.b.1.8.9.1.a.8.9.5.c.e.e.9.3.a.a.d.5.2.4.d.3.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 17:24:18 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):18596
      Entropy (8bit):1.9686712532799382
      Encrypted:false
      SSDEEP:96:5y8RE3AyR4GuL6i7nKU+tC3p2sOWIXWIikI4MbOiFvdvT:DYOlQC3HoMKiFvdv
      MD5:31DE7DB0DA0EDAEB4F71F17F396E6FB8
      SHA1:55929AAD5F4221ADA00748E3594364F678B1D1B2
      SHA-256:10E9502F495D2F70F814A256C93D558A76FE4FC7A467CB26189F00F6B9C72D7C
      SHA-512:EC55DFB5DFB336CA9E4FA0F5D4210DB9F130E6CC28A4B680F45B38308F47C242CE40EEC3309EE859607EF9AECA9D641212AFC27D84B18D6EBA214E7E92E05BA3
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... ........*f............4...............<.......T...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T.......$.....*f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8474
      Entropy (8bit):3.711111274471374
      Encrypted:false
      SSDEEP:192:R6l7wVeJYT6jy6YeLSU9RgmfZhgprj89bkYsfgRMm:R6lXJk6jy6YSSU9RgmffhkLf+
      MD5:79F9CAAECAA920EBE94456E14B445FE4
      SHA1:694B07797DAF37E0E3649748BD7DDE69DB9370E4
      SHA-256:9D893B887F670C4D102995AC28A1724466013EC606E2C99EAD3690D82C5793EE
      SHA-512:C83F7658AA4605BAC97C1B29E20E04016FEDBEE9AE7CA18A0772315490459A2534DFB704DC0F0A96F311DD03BDE0DC562C9C58C8B662FD0E27A4409E9D08FFC6
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.0.8.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4809
      Entropy (8bit):4.6020446139820175
      Encrypted:false
      SSDEEP:48:cvIwWl8zs9rJg77aI9YDWpW8VYH0Ym8M4JyBKBWVFY+q8zBy+AwB/+qB/Wd:uIjfPI76y7VQJyMBi/9p+qpWd
      MD5:6E496F195ECACA78E4859B2785A87E02
      SHA1:62D0C26B5147A41A43D772501ACB7A5B02BC518C
      SHA-256:CD843C2B8D473B3E6CC248F1A3F83CBCFB8A7786D6499C0172644D61FAA96B91
      SHA-512:851092CAB34D8BE5ADC5692A6E1BCE3C21C0A6B2D0DA900E15D394389284A9045FA7774990A0851F523217A64FD16051098959965049831CAF1F0027E47F9033
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295706" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.298760230123356
      Encrypted:false
      SSDEEP:6144:WECqOEmWfd+WQFNy/9026ZTyaRsCDusBqD5dooi8lsSD6VJSRZs:LCWL6seqD5S1SWVARq
      MD5:E6AEA3AE2515A1F1B2FBB1622F6182C9
      SHA1:E9B7AB7E5069A0D0C3E70488DFDEEB49CFAE101D
      SHA-256:92385230053383119C48E66D56D48F5106EB2066D8BF69B0B13D06DFC625BF81
      SHA-512:310AE1C65A21261B9727BC45093083080989FB47D17E88748193FB87C32B858B61BB356A4C6A0F917ECAE319D8438429A7B36318C7A958A62B4836DB0BAC603C
      Malicious:false
      Reputation:low
      Preview:regfE...E....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..)g5................................................................................................................................................................................................................................................................................................................................................4<S........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Entropy (8bit):6.519494951757422
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe
      File size:3'121'152 bytes
      MD5:9ec45fd755974a8b50342ee6dd8205e7
      SHA1:76f0aeb1891a895cee93aad524d37cc444344dbc
      SHA256:d67de542a7c8c3535b0a79589d4ba10880bd97e4c126038c13a2efaa5d854a64
      SHA512:2a27f0ca6bd953145a3daa0d03046c9a7ef96d22ed33bc6f21cfd1917848e1a783f780f642d8e86836c5bcf4abe7b1314604025fb50ff11929d1353fdd6f1a95
      SSDEEP:49152:MPOqWKcR4SmJruozxkweqUaJpCCEBuTcWk+ot:+OdKX9zxkweqLlEBddt
      TLSH:47E55B22B2456A2FD16F1A32153BC594583FB6626E128C477BECAC0C8F3B5817D36787
      File Content Preview:MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM..................'...........(....
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x6801f8
      Entrypoint Section:.itext
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
      DLL Characteristics:
      Time Stamp:0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:
      Instruction
      push ebp
      mov ebp, esp
      add esp, FFFFFFF0h
      mov eax, 00674060h
      call 00007F9B80B487E9h
      mov eax, dword ptr [0068CC98h]
      mov eax, dword ptr [eax]
      call 00007F9B80CFF169h
      mov eax, dword ptr [0068CC98h]
      mov eax, dword ptr [eax]
      xor edx, edx
      call 00007F9B80D00EA3h
      mov eax, dword ptr [0068CC98h]
      mov eax, dword ptr [eax]
      mov edx, 00680268h
      call 00007F9B80CFEB7Ah
      mov ecx, dword ptr [0068D020h]
      mov eax, dword ptr [0068CC98h]
      mov eax, dword ptr [eax]
      mov edx, dword ptr [006721D4h]
      call 00007F9B80CFF14Ah
      mov eax, dword ptr [0068CC98h]
      mov eax, dword ptr [eax]
      call 00007F9B80CFF29Ah
      call 00007F9B80B430B9h
      mov al, 04h
      add al, byte ptr [eax]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x2990000xa1.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x2940000x39cc.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x29c0000x5da00.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x29b0000x18.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x294ac40x8e4.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2980000xa40.didata
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x27d0000x27d000a63cb59e80112da0bef7ba6eff65c89bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .itext0x27e0000x30000x3000b37854b3822aa6f2479ee2e016e5feacFalse0.3655598958333333data4.920761088770934IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x2810000xd0000xd00071dd15184f62e6ec3f1b68912ad1f7b6False0.48214017427884615data5.580706967413219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .bss0x28e0000x60000x600091ff0dac5df86e798bfef5e573536b08False0.0019124348958333333data0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x2940000x40000x4000ce338fe6899778aacfc28414f2d9498bFalse0.00238037109375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .didata0x2980000x10000x10000ab51a204593656ad562f0ccbb900699False0.23486328125data2.9859506114704937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .edata0x2990000x10000x10005c84d8d705cb45e1e35f3f8954e027d0False0.038330078125data0.3410301073430528IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .tls0x29a0000x10000x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x29b0000x10000x10007a1a225b5c6899d9d8eef95b1f61c877False0.028076171875data0.23094581536916917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x29c0000x5e0000x5e000a7575a3e2816af5ef58e06828575189aFalse0.6415522149268617data7.123569338131972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameOrdinalAddress
      TMethodImplementationIntercept30x461560
      __dbk_fcall_wrapper20x40f3c0
      dbkFCallWrapperAddr10x690c5c
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:19:24:17
      Start date:25/04/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe"
      Imagebase:0x400000
      File size:3'121'152 bytes
      MD5 hash:9EC45FD755974A8B50342EE6DD8205E7
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:19:24:18
      Start date:25/04/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 232
      Imagebase:0x7b0000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:0.1%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:50%
        Total number of Nodes:4
        Total number of Limit Nodes:0
        execution_graph 5036 6801f8 5039 40f4ec LdrInitializeThunk 5036->5039 5038 680208 5040 40f527 5039->5040 5040->5038

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 40f4ec-40f51d LdrInitializeThunk 1 40f527-40f534 0->1
        APIs
        • LdrInitializeThunk.NTDLL(00000000,?,00680208), ref: 0040F4F8
        Memory Dump Source
        • Source File: 00000000.00000002.1461441351.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1461426391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461623408.0000000000681000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461646852.0000000000682000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461672096.0000000000698000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461690519.0000000000699000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.000000000069B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.000000000069D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.00000000006BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID: InitializeThunk
        • String ID:
        • API String ID: 2994545307-0
        • Opcode ID: 50e5c3f68494a54043d36ff7b7a5838f0464130f5945b12e2c89c7ad2eaf9eda
        • Instruction ID: 183c9ba248d5c2c1da39b610dc5b8c704b00d0b3ce75f27104f8b5b0e0d4ba85
        • Opcode Fuzzy Hash: 50e5c3f68494a54043d36ff7b7a5838f0464130f5945b12e2c89c7ad2eaf9eda
        • Instruction Fuzzy Hash: 64E09275A94300AFD740DF7DBD806453BEBA70D3207107B369424CF3A0EA78C5568B44
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1461441351.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1461426391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461623408.0000000000681000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461646852.0000000000682000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461672096.0000000000698000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461690519.0000000000699000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.000000000069B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.000000000069D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.00000000006BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
        • Instruction ID: abdc557a844d30f29a59efcf289cc8f4fca72c180f0b533cba847285143d9f64
        • Opcode Fuzzy Hash: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
        • Instruction Fuzzy Hash: 7601D632B047110B970CDD3ECD9862BB6C3ABC8910F09C73E9589C72C4DE318C1AC686
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1461441351.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1461426391.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461623408.0000000000681000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461646852.0000000000682000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461672096.0000000000698000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461690519.0000000000699000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.000000000069B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.000000000069D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1461711910.00000000006BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ae0e43f82692c6785844f3e70bb209c8b319b1924ab6e756aa91dc1deac9637f
        • Instruction ID: 1b71701d53a4aa5e9bd8cdf746baade5e8446fc55e8d173dcde710736be538e5
        • Opcode Fuzzy Hash: ae0e43f82692c6785844f3e70bb209c8b319b1924ab6e756aa91dc1deac9637f
        • Instruction Fuzzy Hash: 14D012FA26110216F726902D5BE4B631547E741324F26CC3EA845F5FD5DA7EDCE88024
        Uniqueness

        Uniqueness Score: -1.00%