Loading ...

Play interactive tourEdit tour

Analysis Report 2760000.netprovfw.bin

Overview

General Information

Sample Name:2760000.netprovfw.bin (renamed file extension from bin to exe)
Analysis ID:345555
MD5:90478bb3273d74a7a4bae530dee87174
SHA1:8fa8f069d4391a21346de65a5ee729ad6ef56a60
SHA256:f865736f27acaaca93c530f82295fdddf9b97fc54f37732815e89ad660eb69e4

Most interesting Screenshot:

Detection

Emotet
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Emotet
Machine Learning detection for sample
Checks if the current process is being debugged
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
One or more processes crash
PE file contains an invalid checksum
PE file contains strange resources
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • 2760000.netprovfw.exe (PID: 3636 cmdline: 'C:\Users\user\Desktop\2760000.netprovfw.exe' MD5: 90478BB3273D74A7A4BAE530DEE87174)
    • WerFault.exe (PID: 4852 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 640 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
2760000.netprovfw.exeJoeSecurity_EmotetYara detected EmotetJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.215311677.0000000002761000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000000.00000000.206372217.0000000002761000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.0.2760000.netprovfw.exe.2760000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          0.2.2760000.netprovfw.exe.2760000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: 2760000.netprovfw.exeAvira: detected
            Multi AV Scanner detection for submitted fileShow sources
            Source: 2760000.netprovfw.exeVirustotal: Detection: 50%Perma Link
            Source: 2760000.netprovfw.exeReversingLabs: Detection: 79%
            Machine Learning detection for sampleShow sources
            Source: 2760000.netprovfw.exeJoe Sandbox ML: detected

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: 2760000.netprovfw.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
            Source: 2760000.netprovfw.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NO_ISOLATION, NX_COMPAT
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02763A10 _snwprintf,FindNextFileW,_snwprintf,FindFirstFileW,
            Source: 2760000.netprovfw.exe, 00000000.00000002.215076314.000000000076A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected EmotetShow sources
            Source: Yara matchFile source: 2760000.netprovfw.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000002.215311677.0000000002761000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.206372217.0000000002761000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.0.2760000.netprovfw.exe.2760000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.2760000.netprovfw.exe.2760000.0.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02761C70
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02767590
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02768180
            Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 640
            Source: 2760000.netprovfw.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 2760000.netprovfw.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 2760000.netprovfw.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 2760000.netprovfw.exeStatic PE information: No import functions for PE file found
            Source: 2760000.netprovfw.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: classification engineClassification label: mal68.troj.winEXE@2/4@0/0
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3636
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5C6.tmpJump to behavior
            Source: 2760000.netprovfw.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: 2760000.netprovfw.exeVirustotal: Detection: 50%
            Source: 2760000.netprovfw.exeReversingLabs: Detection: 79%
            Source: unknownProcess created: C:\Users\user\Desktop\2760000.netprovfw.exe 'C:\Users\user\Desktop\2760000.netprovfw.exe'
            Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 640
            Source: 2760000.netprovfw.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NO_ISOLATION, NX_COMPAT
            Source: 2760000.netprovfw.exeStatic PE information: real checksum: 0x59bfd should be: 0x6199f
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765D70 push ecx; mov dword ptr [esp], 00008067h
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765F70 push ecx; mov dword ptr [esp], 000084ADh
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765E70 push ecx; mov dword ptr [esp], 00008D73h
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765E40 push ecx; mov dword ptr [esp], 0000AEA2h
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765D30 push ecx; mov dword ptr [esp], 00002C7Ch
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765F20 push ecx; mov dword ptr [esp], 0000E2ADh
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765D00 push ecx; mov dword ptr [esp], 000021B4h
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765DE0 push ecx; mov dword ptr [esp], 000025AAh
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765FB0 push ecx; mov dword ptr [esp], 0000460Eh
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765EA0 push ecx; mov dword ptr [esp], 00007473h
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02765DA0 push ecx; mov dword ptr [esp], 000036B8h
            Source: initial sampleStatic PE information: section name: .text entropy: 6.84651766717
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02763A10 _snwprintf,FindNextFileW,_snwprintf,FindFirstFileW,
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02763F70 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\2760000.netprovfw.exeCode function: 0_2_02764E10 mov eax, dword ptr fs:[00000030h]

            Stealing of Sensitive Information:

            barindex
            Yara detected EmotetShow sources
            Source: Yara matchFile source: 2760000.netprovfw.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000002.215311677.0000000002761000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.206372217.0000000002761000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.0.2760000.netprovfw.exe.2760000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.2760000.netprovfw.exe.2760000.0.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1Input Capture1Security Software Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsSoftware Packing1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSSystem Information Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            2760000.netprovfw.exe50%VirustotalBrowse
            2760000.netprovfw.exe79%ReversingLabsWin32.Trojan.Convagent
            2760000.netprovfw.exe100%AviraTR/Crypt.XPACK.Gen
            2760000.netprovfw.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.1.2760000.netprovfw.exe.2760000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.0.2760000.netprovfw.exe.2760000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.2760000.netprovfw.exe.2760000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:345555
            Start date:28.01.2021
            Start time:16:27:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 2m 26s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:2760000.netprovfw.bin (renamed file extension from bin to exe)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:3
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal68.troj.winEXE@2/4@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 100% (good quality ratio 99.3%)
            • Quality average: 71.8%
            • Quality standard deviation: 20.8%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Stop behavior analysis, all processes terminated
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): WerFault.exe
            • Excluded IPs from analysis (whitelisted): 52.147.198.201, 52.255.188.83
            • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, watson.telemetry.microsoft.com

            Simulations

            Behavior and APIs

            TimeTypeDescription
            16:27:54API Interceptor1x Sleep call for process: WerFault.exe modified

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_2760000.netprovf_50482980db6f70d047bdd5f2b763ef22b1cfde7_9c33c211_129efdf4\Report.wer
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
            Category:dropped
            Size (bytes):10994
            Entropy (8bit):3.7614659673061346
            Encrypted:false
            SSDEEP:96:zAaFnqcKJ1hskDRf2pXIQcQvc6QcEDMcw3Db+HbHg/uAnQ0DFV6Fq/TOiNkoJT4V:caF3VHBUZMXYjIa/u7scS274ItkS+
            MD5:720CE52891513A7CE9B86362267F0DA5
            SHA1:DEBB950A22077D504E7615EAF440772D1903A500
            SHA-256:694BB24B19E45591A31DD2B4F2744B883E902E1A59692CD4735E4DE3AC58CCC8
            SHA-512:F211EAD3CFDE2F98CCB5ADBBCCD0D5C27D35201B0AE5BB4A70E0B5E23BAD30010BF26DA94F41497B1F938CD5F45D1400A2368A8E28D4FA08CF3C9C47317EF8CC
            Malicious:false
            Reputation:low
            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.6.3.5.3.6.7.2.0.5.9.4.2.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.6.3.5.3.6.7.2.7.6.2.5.4.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.d.e.9.d.f.1.3.-.b.a.c.d.-.4.a.a.b.-.8.7.f.5.-.a.3.7.1.1.d.b.5.0.0.6.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.1.3.7.b.7.7.-.b.d.f.0.-.4.d.d.7.-.8.b.3.6.-.6.2.2.3.0.1.0.9.7.5.0.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.2.7.6.0.0.0.0...n.e.t.p.r.o.v.f.w...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.3.4.-.0.0.0.1.-.0.0.1.7.-.e.c.3.9.-.3.2.9.3.d.5.f.5.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.0.f.c.c.3.2.5.5.9.8.9.5.0.a.9.b.b.8.c.a.5.b.6.5.8.9.1.d.6.8.6.0.0.0.0.f.f.f.f.!.0.0.0.0.8.f.a.8.f.0.6.9.d.4.3.9.1.a.2.1.3.4.6.d.e.6.5.a.5.e.e.7.2.9.a.d.6.e.f.5.6.a.6.0.!.2.7.6.0.0.0.0...n.e.t.p.r.o.v.
            C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5C6.tmp.dmp
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Fri Jan 29 00:27:52 2021, 0x1205a4 type
            Category:dropped
            Size (bytes):41726
            Entropy (8bit):2.2476995034013756
            Encrypted:false
            SSDEEP:192:A1X2ZQnnUJO7htz2SKwrdcMhMDyTROcb5Kszgeb:W/gSKaS1DyTRRblvb
            MD5:87A7ABC2F6BEAB6144BC5B26B23AE74A
            SHA1:90BC5F6AD1F9D5474FC3AB9F696FC6B37F65B421
            SHA-256:A14D136A44ECE61B85B934F9A0F7CD91704847AEF659196F536710F0F5F478BB
            SHA-512:6330C9B8B186F8FA0656C7FBF1AEF94BE11A519E6FE7D3511D7C7EF45D15B4288880564873F02F3B479541283DEC1F549255C73D6A4A90E60D6BDB38A4940C93
            Malicious:false
            Reputation:low
            Preview: MDMP....... ........V.`...................U...........B......T.......GenuineIntelW...........T.......4....V.`.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
            C:\ProgramData\Microsoft\Windows\WER\Temp\WERF78C.tmp.WERInternalMetadata.xml
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
            Category:dropped
            Size (bytes):8316
            Entropy (8bit):3.694070001122533
            Encrypted:false
            SSDEEP:192:Rrl7r3GLNi526b6YS3SUnYsgmfJfGSwCprR889b+sWsfG4Km:RrlsNio6b6YiSUnYsgmfJ+SJp+s1fN7
            MD5:D984D43F2B351442B894831AED8A541A
            SHA1:D17A0A15F90E05B8305E1593EB236CDE91B5CE5A
            SHA-256:10AB7323E241217ECA9B43DAAC0C0AEDA00A17B42CEEEB9253DD45B505746688
            SHA-512:55FEB2D609DF9EBD3ECC5960280B666412F455E6E1565FBC01D03C2FC8F183DD1439C5402685C0C2CE95ED3CB6B6DF3ED448708A6AABB783C06899CA429F17BE
            Malicious:false
            Reputation:low
            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.6.3.6.<./.P.i.d.>.......
            C:\ProgramData\Microsoft\Windows\WER\Temp\WERF81A.tmp.xml
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4605
            Entropy (8bit):4.454386786497803
            Encrypted:false
            SSDEEP:48:cvIwSD8zsxlJgtWI9EKWSC8Bq8fm8M4JzXYlFs8+q8I6ROC6vG6d:uITf53rSN9JR8JVvG6d
            MD5:5EF659495C5F15CBFFB7E779342ECDF1
            SHA1:9E271CDB285588F5EE1A8F0D125EA0E6EB149E03
            SHA-256:EC7E8E6E007E9BA87CF04894BD00BB64B1BAE5E8D8851B82B054BC0B12C08873
            SHA-512:9C386FE1DC6B6B8C5F7F62DAD5A39AF7AB911361F65CBD6880CA541B2FFEA2EE470E466251C44376F64946B00E5F7A3418CB6B69157006E59D3BF51B49EF8D99
            Malicious:false
            Reputation:low
            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="837218" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.529033895906113
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:2760000.netprovfw.exe
            File size:350208
            MD5:90478bb3273d74a7a4bae530dee87174
            SHA1:8fa8f069d4391a21346de65a5ee729ad6ef56a60
            SHA256:f865736f27acaaca93c530f82295fdddf9b97fc54f37732815e89ad660eb69e4
            SHA512:4df47075f24abd5882f27e22d39c6a73b1586ddd1757539387a885e3f112e1e00b4b97b4f68d91ef5662c7a3973ab350fe5e1e68d36943948ffa255315f51961
            SSDEEP:6144:Lt0Ju8YGNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqOY:x0J5nKXzJ4pdd3klnnWosPhnzqL
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.../.../.../...".J.....R.p.....R.K.....Rich/...................PE..L...M.._.............................\............v........

            File Icon

            Icon Hash:c0d9f1f399a4c2c1

            Static PE Info

            General

            Entrypoint:0x2765cd0
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x2760000
            Subsystem:windows gui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NO_ISOLATION, NX_COMPAT
            Time Stamp:0x5F90A34D [Wed Oct 21 21:08:29 2020 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:

            Entrypoint Preview

            Instruction
            call 00007F0628F9DD70h
            mov eax, dword ptr [0276E2C4h]
            test eax, eax
            jne 00007F0628F9D50Dh
            mov ecx, A2CE093Fh
            call 00007F0628F9B77Dh
            mov edx, B9B17DC0h
            mov ecx, eax
            call 00007F0628F9B6D1h
            mov dword ptr [0276E2C4h], eax
            push 00000000h
            call eax
            retn 0010h
            push ecx
            mov dword ptr [esp], 000021B4h
            add dword ptr [esp], 00005AC3h
            shl dword ptr [esp], 04h
            mov eax, dword ptr [esp]
            shl eax, 06h
            mov dword ptr [esp], eax
            or dword ptr [esp], CC87922Ah
            xor dword ptr [esp], CDF7DF6Ah
            mov eax, dword ptr [esp]
            pop ecx
            ret
            int3
            push ecx
            mov dword ptr [esp], 00002C7Ch
            imul eax, dword ptr [esp], 2Dh
            mov dword ptr [esp], eax
            shl dword ptr [esp], 0Ch
            xor dword ptr [esp], 9184714Ch
            shl dword ptr [esp], 0Fh
            or dword ptr [esp], 011C88C3h
            xor dword ptr [esp], 59BE8863h
            mov eax, dword ptr [esp]
            pop ecx
            ret
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push ecx
            mov dword ptr [esp], 00008067h
            xor dword ptr [esp], 30B3246Ch
            add dword ptr [esp], 000090BEh
            xor dword ptr [esp], 30B43B69h
            mov eax, dword ptr [esp]
            pop ecx
            ret
            int3
            int3
            int3
            int3
            int3

            Rich Headers

            Programming Language:
            • [ASM] VS2013 build 21005
            • [LNK] VS2013 UPD4 build 31101

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x49800.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x74c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xb0000xa600False0.544686558735data6.84651766717IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0xc0000x10000x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xd0000x20000xc00False0.851888020833data7.19591538106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .reloc0xf0000x10000x800False0.01123046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            .rsrc0x100000x4a0000x49800False0.348051525298data5.21306515691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x102fc0x668data
            RT_ICON0x109640x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2296940798, next used block 15239304
            RT_ICON0x10c4c0x1e8data
            RT_ICON0x10e340x128GLS_BINARY_LSB_FIRST
            RT_ICON0x10f5c0xea8data
            RT_ICON0x11e040x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 14019316, next used block 14479096
            RT_ICON0x126ac0x6c8data
            RT_ICON0x12d740x568GLS_BINARY_LSB_FIRST
            RT_ICON0x132dc0x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 0, next used block 0
            RT_ICON0x553040x25a8data
            RT_ICON0x578ac0x10a8data
            RT_ICON0x589540x988data
            RT_ICON0x592dc0x468GLS_BINARY_LSB_FIRST
            RT_GROUP_ICON0x597440xbcdata

            Network Behavior

            Network Port Distribution

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jan 28, 2021 16:27:44.950273991 CET6349253192.168.2.38.8.8.8
            Jan 28, 2021 16:27:45.001044035 CET53634928.8.8.8192.168.2.3
            Jan 28, 2021 16:27:45.804285049 CET6083153192.168.2.38.8.8.8
            Jan 28, 2021 16:27:45.852279902 CET53608318.8.8.8192.168.2.3
            Jan 28, 2021 16:27:46.676866055 CET6010053192.168.2.38.8.8.8
            Jan 28, 2021 16:27:46.728919983 CET53601008.8.8.8192.168.2.3
            Jan 28, 2021 16:27:47.529217005 CET5319553192.168.2.38.8.8.8
            Jan 28, 2021 16:27:47.577835083 CET53531958.8.8.8192.168.2.3
            Jan 28, 2021 16:27:48.344050884 CET5014153192.168.2.38.8.8.8
            Jan 28, 2021 16:27:48.394737959 CET53501418.8.8.8192.168.2.3
            Jan 28, 2021 16:27:49.204808950 CET5302353192.168.2.38.8.8.8
            Jan 28, 2021 16:27:49.261265993 CET53530238.8.8.8192.168.2.3
            Jan 28, 2021 16:27:50.005877018 CET4956353192.168.2.38.8.8.8
            Jan 28, 2021 16:27:50.057293892 CET53495638.8.8.8192.168.2.3
            Jan 28, 2021 16:27:50.848668098 CET5135253192.168.2.38.8.8.8
            Jan 28, 2021 16:27:50.896701097 CET53513528.8.8.8192.168.2.3
            Jan 28, 2021 16:27:51.791634083 CET5934953192.168.2.38.8.8.8
            Jan 28, 2021 16:27:51.844265938 CET53593498.8.8.8192.168.2.3
            Jan 28, 2021 16:27:52.679951906 CET5708453192.168.2.38.8.8.8
            Jan 28, 2021 16:27:52.727832079 CET53570848.8.8.8192.168.2.3
            Jan 28, 2021 16:27:52.961210966 CET5882353192.168.2.38.8.8.8
            Jan 28, 2021 16:27:53.011951923 CET53588238.8.8.8192.168.2.3

            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:16:27:50
            Start date:28/01/2021
            Path:C:\Users\user\Desktop\2760000.netprovfw.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\2760000.netprovfw.exe'
            Imagebase:0x2760000
            File size:350208 bytes
            MD5 hash:90478BB3273D74A7A4BAE530DEE87174
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.215311677.0000000002761000.00000020.00020000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000000.206372217.0000000002761000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:low

            General

            Start time:16:27:51
            Start date:28/01/2021
            Path:C:\Windows\SysWOW64\WerFault.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 640
            Imagebase:0x1210000
            File size:434592 bytes
            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Disassembly

            Code Analysis

            Reset < >