Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PS-CollectionTool.exe

Overview

General Information

Sample name:PS-CollectionTool.exe
Analysis ID:1432291
MD5:32f6bb54cfc8988631e0bf97b58d68fb
SHA1:500823dd5475d68bbb3796de17be45a41bf7c991
SHA256:43ae07d6f62377c7439a675dc1f470845545bf0906f3b46c857bbffb157f1e63
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample crashes during execution, try analyze it on another analysis machine
  • System is w10x64_ra
  • PS-CollectionTool.exe (PID: 7152 cmdline: "C:\Users\user\Desktop\PS-CollectionTool.exe" MD5: 32F6BB54CFC8988631E0BF97B58D68FB)
    • WerFault.exe (PID: 3988 cmdline: C:\Windows\system32\WerFault.exe -u -p 7152 -s 848 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: PS-CollectionTool.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: PresentationFramework.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdbRSDSc source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PS-CollectionTool.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PS-CollectionTool.pdbMZ source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb* source: PS-CollectionTool.exe, 00000000.00000002.1187189249.0000017DA0B61000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: D:\projects\C#\PSCollectionTool\PS-CollectionTool\obj\x64\Release\PS-CollectionTool.pdb source: PS-CollectionTool.exe
Source: Binary string: System.Xaml.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: WindowsBase.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: PS-CollectionTool.exe, 00000000.00000002.1187189249.0000017DA0B61000.00000004.00000800.00020000.00000000.sdmp, WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDSw source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.pdbH source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.pdbco source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Xaml.ni.pdbRSDS\Y source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb source: PS-CollectionTool.exe, 00000000.00000002.1186616661.0000017D9F037000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationCore.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER1A3B.tmp.dmp.4.dr
Source: PS-CollectionTool.exeString found in binary or memory: http://schemas.datacontract.org/2004/07/CT_WCF_WebRole
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/GetDataResponse
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/GetDataT
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/GetDataUsingDataContractResponse
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/GetDataUsingDataContractT
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/IsHostBlockedResponse
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/IsHostBlockedT
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/WriteFileDetailsResponse
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/WriteFileDetailsT
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/WriteInitialResponse
Source: PS-CollectionTool.exeString found in binary or memory: http://tempuri.org/CT_IService/WriteInitialT
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: PS-CollectionTool.exeString found in binary or memory: http://wpfanimatedgif.codeplex.com
Source: PS-CollectionTool.exeString found in binary or memory: https://iceluc3.wixsite.com/smartoptimize
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7152 -s 848
Source: PS-CollectionTool.exeStatic PE information: No import functions for PE file found
Source: classification engineClassification label: clean3.winEXE@2/5@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7152
Source: C:\Users\user\Desktop\PS-CollectionTool.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e7586fd3-821e-4521-bef8-c2bc47906d29Jump to behavior
Source: PS-CollectionTool.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: PS-CollectionTool.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\PS-CollectionTool.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PS-CollectionTool.exeString found in binary or memory: Iteration 3JSON start parsing result/Loading to Dictionary:
Source: PS-CollectionTool.exeString found in binary or memory: ipv4-address
Source: PS-CollectionTool.exeString found in binary or memory: show-address-ranges;500;full;address-ranges.txt;Address Ranges;false;true
Source: PS-CollectionTool.exeString found in binary or memory: 8resources/loading/border.png
Source: PS-CollectionTool.exeString found in binary or memory: :resources/loading/loader5.gif
Source: PS-CollectionTool.exeString found in binary or memory: <resources/loading/loading1.gif
Source: PS-CollectionTool.exeString found in binary or memory: <resources/loading/loading2.gifQ
Source: PS-CollectionTool.exeString found in binary or memory: <resources/loading/loading3.gif=
Source: PS-CollectionTool.exeString found in binary or memory: <resources/loading/loading4.gif
Source: PS-CollectionTool.exeString found in binary or memory: <resources/loading/loading5.gif]
Source: PS-CollectionTool.exeString found in binary or memory: ../Resources/Loading/Loader5.gif
Source: unknownProcess created: C:\Users\user\Desktop\PS-CollectionTool.exe "C:\Users\user\Desktop\PS-CollectionTool.exe"
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7152 -s 848
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: PS-CollectionTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: PS-CollectionTool.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: PS-CollectionTool.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: PS-CollectionTool.exeStatic file information: File size 3746816 > 1048576
Source: PS-CollectionTool.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x392400
Source: PS-CollectionTool.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: PS-CollectionTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: PresentationFramework.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdbRSDSc source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PS-CollectionTool.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PS-CollectionTool.pdbMZ source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb* source: PS-CollectionTool.exe, 00000000.00000002.1187189249.0000017DA0B61000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: D:\projects\C#\PSCollectionTool\PS-CollectionTool\obj\x64\Release\PS-CollectionTool.pdb source: PS-CollectionTool.exe
Source: Binary string: System.Xaml.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: WindowsBase.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: PS-CollectionTool.exe, 00000000.00000002.1187189249.0000017DA0B61000.00000004.00000800.00020000.00000000.sdmp, WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDSw source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.pdbH source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.pdbco source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Xaml.ni.pdbRSDS\Y source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb source: PS-CollectionTool.exe, 00000000.00000002.1186616661.0000017D9F037000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: PresentationCore.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WER1A3B.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER1A3B.tmp.dmp.4.dr
Source: C:\Users\user\Desktop\PS-CollectionTool.exeCode function: 0_2_00007FFEC84701BA push E95E4D4Ch; ret 0_2_00007FFEC84701C9
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeMemory allocated: 17D9F230000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeMemory allocated: 17DB8B60000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c8 0c e4 52 1d cc-a0 8f d3 a4 82 3e 8f 04
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: PS-CollectionTool.exeBinary or memory string: \qEmu
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeQueries volume information: C:\Users\user\Desktop\PS-CollectionTool.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PS-CollectionTool.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432291 Sample: PS-CollectionTool.exe Startdate: 26/04/2024 Architecture: WINDOWS Score: 3 5 PS-CollectionTool.exe 2->5         started        process3 7 WerFault.exe 22 16 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PS-CollectionTool.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://tempuri.org/CT_IService/GetDataResponse0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/GetDataUsingDataContractT0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/GetDataT0%Avira URL Cloudsafe
http://schemas.datacontract.org/2004/07/CT_WCF_WebRole0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/IsHostBlockedT0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/WriteFileDetailsResponse0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/IsHostBlockedResponse0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/WriteInitialResponse0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/IsHostBlockedT2%VirustotalBrowse
http://tempuri.org/CT_IService/GetDataUsingDataContractResponse0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/IsHostBlockedResponse2%VirustotalBrowse
http://tempuri.org/CT_IService/GetDataUsingDataContractT2%VirustotalBrowse
http://tempuri.org/CT_IService/WriteFileDetailsT0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/WriteInitialT0%Avira URL Cloudsafe
http://tempuri.org/CT_IService/WriteInitialResponse2%VirustotalBrowse
http://schemas.datacontract.org/2004/07/CT_WCF_WebRole0%VirustotalBrowse
http://tempuri.org/CT_IService/WriteFileDetailsT2%VirustotalBrowse
http://tempuri.org/CT_IService/GetDataResponse2%VirustotalBrowse
http://tempuri.org/CT_IService/WriteInitialT2%VirustotalBrowse
http://tempuri.org/CT_IService/GetDataT2%VirustotalBrowse
http://tempuri.org/CT_IService/GetDataUsingDataContractResponse2%VirustotalBrowse
http://tempuri.org/CT_IService/WriteFileDetailsResponse2%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://tempuri.org/CT_IService/GetDataResponsePS-CollectionTool.exefalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://tempuri.org/CT_IService/GetDataUsingDataContractTPS-CollectionTool.exefalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://tempuri.org/CT_IService/GetDataTPS-CollectionTool.exefalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://iceluc3.wixsite.com/smartoptimizePS-CollectionTool.exefalse
    high
    http://schemas.datacontract.org/2004/07/CT_WCF_WebRolePS-CollectionTool.exefalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://tempuri.org/CT_IService/IsHostBlockedTPS-CollectionTool.exefalse
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://tempuri.org/CT_IService/WriteFileDetailsResponsePS-CollectionTool.exefalse
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://tempuri.org/CT_IService/IsHostBlockedResponsePS-CollectionTool.exefalse
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      http://wpfanimatedgif.codeplex.comPS-CollectionTool.exefalse
        high
        http://tempuri.org/CT_IService/WriteInitialResponsePS-CollectionTool.exefalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://tempuri.org/CT_IService/GetDataUsingDataContractResponsePS-CollectionTool.exefalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://tempuri.org/CT_IService/WriteFileDetailsTPS-CollectionTool.exefalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://tempuri.org/CT_IService/WriteInitialTPS-CollectionTool.exefalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1432291
        Start date and time:2024-04-26 19:41:47 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 59s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:PS-CollectionTool.exe
        Detection:CLEAN
        Classification:clean3.winEXE@2/5@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 2
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.189.173.21
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target PS-CollectionTool.exe, PID 7152 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        TimeTypeDescription
        19:42:19API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.9966866244961838
        Encrypted:false
        SSDEEP:192:qHCozPBYohlj77A0/XoiBEDaW8HzuiFbZ24lO83v7:SL5BjHb/YiCaXzuiFbY4lO8z
        MD5:007E680B1B667068517803163E72CBEE
        SHA1:71148C8E1B4755D6FA4DE4874689717A23D43AC1
        SHA-256:2736B67AA6470D876A0539F47A021F47F60AFA5212EF9B1A7BB08547E92CC1D3
        SHA-512:A504AF7974471470F79494DC4CDDA22AC7FE3AD000A73BC6635F483C8550445E1E1E1E706A1C76B2F2257E709914A501668FD72CF0D36E615827FE67D909F166
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.6.2.6.9.3.6.0.4.7.4.3.9.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.6.2.6.9.3.6.5.6.2.4.3.7.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.3.0.8.1.3.8.-.f.d.d.4.-.4.f.7.2.-.8.4.c.7.-.5.6.2.e.c.1.7.8.1.0.c.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.4.8.2.1.a.3.3.-.c.3.5.0.-.4.4.2.b.-.b.8.2.a.-.6.c.b.0.8.1.0.5.0.4.5.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.P.S.-.C.o.l.l.e.c.t.i.o.n.T.o.o.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.S.-.C.o.l.l.e.c.t.i.o.n.T.o.o.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.f.0.-.0.0.0.1.-.0.0.1.6.-.3.d.8.c.-.7.0.1.3.0.1.9.8.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.8.9.6.3.d.f.d.3.8.0.d.a.8.a.5.e.2.4.f.4.1.b.e.e.2.1.7.6.c.c.6.0.0.0.0.0.0.0.0.!.0.0.0.0.5.0.0.8.2.3.d.d.5.4.7.5.d.6.8.b.b.b.3.7.9.6.d.e.1.7.b.e.4.5.a.4.1.b.f.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 16 streams, Fri Apr 26 17:42:16 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):436325
        Entropy (8bit):3.690500969926466
        Encrypted:false
        SSDEEP:3072:Cr6sWFA6yuxJ4xW2LmLzx+Rx9G2V6/pea39BaSmVYLcJzaUlOV9EDZSBeQmlfEP:CAJ4xXY+Rj7s/pISm2IVaUlXIYx
        MD5:6C704F7F3CDD8DD44D35A15559794817
        SHA1:331B3278C54853D0EF2ECB0D16DE5E24E2917E35
        SHA-256:54D3E6162DD990FE247903A27D55928D2A0D669188BDE76736388063A6AC2187
        SHA-512:CF7CE325A613D0C02EB60D6A7CAE03F679D4B03BE97F44A929408B5DF0DD092A317265F55AA632EA612197ADA1B3CF02961AD1234FB83793E487069F36B3DF5F
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... .......x.+f........................P...........$...$...........H.......D-..PU..........l.......8...........T............!..............@...........,...............................................................................eJ..............Lw......................T...........v.+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8772
        Entropy (8bit):3.7008686400425868
        Encrypted:false
        SSDEEP:192:R6l7wVeJ/4rZnURv6YNUPZMgmfVf4dbaprt89bpoUfchjm:R6lXJ0Zna6YePygmfN4dZpzfco
        MD5:F82014CAF3CA3531C6FBC8C5F75940C3
        SHA1:E4614D9D269816ADF3ADD0359050C07CC72053A5
        SHA-256:A66D97FE98268F83B4420961728BF384FF43F642D1B0F5FE96A6A883466EC104
        SHA-512:81C6ECEE8BFE668EE4C4EEE752A0F978780924621A952D6A4B31568E68F997F5349F607480555D9F685EDDEEEA2444889BBB47368D7C86762B9529CEE03EAC30
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.5.2.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4760
        Entropy (8bit):4.501481425366531
        Encrypted:false
        SSDEEP:48:cvIwWl8zs0Jg771I9NCWda80aLYm8M4JwVjIsF0yq85Ia6L3S7uIuzqrd:uIjfyI7eDdl2JwG9L3plz0d
        MD5:FA8551749A4D2EE05AD69B1C1162A820
        SHA1:0FEEA3294CDA9D771C9413F379E8A4EFD8D27BE1
        SHA-256:FEBEC349C49214E9F2EA08F07B1E92134311AC29399CBF505A2279882FA97985
        SHA-512:B777073D78270414046B9A988BA007D400E666516B09945A77271109FC4FBA46F7670F717D8D28FB6B47E143660E91C5B4607FC5EB923EA7BF241229D34BA6B0
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="297164" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.310188199104861
        Encrypted:false
        SSDEEP:6144:6+w8CE/ZeaJFSSPNY6B0CvpuIUOa4+e9gFbJUjWKdHjj5+yJ1uREf4V0A:6b8kWvp63qtdHHgeAe
        MD5:0EE51C1D73D4D6987CD142B85FB04345
        SHA1:485624812A4567B42BCDD22C067B05A08FDC8B4B
        SHA-256:9CE54F97049D180BA3FE4449C2E8875032668E6E4421C9477F3523E6992D886D
        SHA-512:311CF4822137565BE97E51CE59C2D68C2E95494AF127C5BEBD2E556188E5A9FDA93481B866A08C754FD8D00108ACB905A77D858604CBD4C48A55F6E1C7136452
        Malicious:false
        Reputation:low
        Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....................................................................................................................................................................................................................................................................................................................................................!|. ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.966467979628159
        TrID:
        • Win64 Executable GUI Net Framework (217006/5) 49.88%
        • Win64 Executable GUI (202006/5) 46.43%
        • Win64 Executable (generic) (12005/4) 2.76%
        • Generic Win/DOS Executable (2004/3) 0.46%
        • DOS Executable Generic (2002/1) 0.46%
        File name:PS-CollectionTool.exe
        File size:3'746'816 bytes
        MD5:32f6bb54cfc8988631e0bf97b58d68fb
        SHA1:500823dd5475d68bbb3796de17be45a41bf7c991
        SHA256:43ae07d6f62377c7439a675dc1f470845545bf0906f3b46c857bbffb157f1e63
        SHA512:cd39024ee1446b7370185089175821a01dd84436d88e67dc737928d9db32eb5a6be98fe9db76373b6d90b5ee612cd9c1a55c2c32d2a852f85c2f9fb761bdbe89
        SSDEEP:98304:EtRyVHlqCdmmkgh+mANEs2kWo6mtFOJ9aa0J:I4HlqCdIgVANP21Ds
        TLSH:E306231123F5C221F5FF2D78583511904E7ABCAA99B1DFAE2C9032DD0EB27509990FA7
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....}d.........."...0..$9.............. .....@..... ........................9...........`...@......@............... .....
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x140000000
        Entrypoint Section:
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x647D9EEA [Mon Jun 5 08:38:02 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        dec ebp
        pop edx
        nop
        add byte ptr [ebx], al
        add byte ptr [eax], al
        add byte ptr [eax+eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3960000x5ec.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x39426c0x1c.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x3923a40x3924001f88330a4b4fd29193ebfed7f475097eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x3960000x5ec0x6000e9a10f2e5cee0d666d78dd3145a74d5False0.4231770833333333data4.209202098625474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x3960900x35cdata0.4046511627906977
        RT_MANIFEST0x3963fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:19:42:14
        Start date:26/04/2024
        Path:C:\Users\user\Desktop\PS-CollectionTool.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\PS-CollectionTool.exe"
        Imagebase:0x17d9eb70000
        File size:3'746'816 bytes
        MD5 hash:32F6BB54CFC8988631E0BF97B58D68FB
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:4
        Start time:19:42:15
        Start date:26/04/2024
        Path:C:\Windows\System32\WerFault.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\WerFault.exe -u -p 7152 -s 848
        Imagebase:0x7ff65bed0000
        File size:570'736 bytes
        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >
          Memory Dump Source
          • Source File: 00000000.00000002.1187622692.00007FFEC8470000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFEC8470000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffec8470000_PS-CollectionTool.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 31010003278b6cf766be5f195726c4bdaa91ce5a6da4fffb94a15296bbe46c96
          • Instruction ID: edf8a17b1136fc592d8eb80ced1c67dec12580f8b8dea782444fdf8e4e898665
          • Opcode Fuzzy Hash: 31010003278b6cf766be5f195726c4bdaa91ce5a6da4fffb94a15296bbe46c96
          • Instruction Fuzzy Hash: B4F06DA641E3D05FD703AB3498615957FB0EF53204F8A08EBD5C4CF1A3C668968AC353
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1187622692.00007FFEC8470000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFEC8470000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffec8470000_PS-CollectionTool.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f0864cc0a97c5fe2c86844ab0c7a2ad6939977cc25e0ca977ff5cdb8b5fa1b21
          • Instruction ID: c22128b0cc5a1c62c2f42fac80a9e9dfeebdf84e1877b9dc6d5494d77f9becca
          • Opcode Fuzzy Hash: f0864cc0a97c5fe2c86844ab0c7a2ad6939977cc25e0ca977ff5cdb8b5fa1b21
          • Instruction Fuzzy Hash: B0E06D61B199094BE348E62CA4403A572C2EFC9360F640179E58CC329ADDA99C428386
          Uniqueness

          Uniqueness Score: -1.00%