Loading ...

Play interactive tourEdit tour

Analysis Report jesovROZ8A.exe

Overview

General Information

Sample Name:jesovROZ8A.exe
Analysis ID:346431
MD5:039ce25d495fa555ae1c210592b564d0
SHA1:6684d0ffde174052a03931981262dc0a7cb9891c
SHA256:94fff127753ed1d704c781b5c391f5e62f4a907b67f7e1d51c3c84addd5851ab
Tags:unnamed3

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • jesovROZ8A.exe (PID: 2416 cmdline: 'C:\Users\user\Desktop\jesovROZ8A.exe' MD5: 039CE25D495FA555AE1C210592B564D0)
    • WerFault.exe (PID: 5888 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 588 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: jesovROZ8A.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: jesovROZ8A.exeVirustotal: Detection: 85%Perma Link
Source: jesovROZ8A.exeReversingLabs: Detection: 100%
Machine Learning detection for sampleShow sources
Source: jesovROZ8A.exeJoe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE filesShow sources
Source: jesovROZ8A.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00401401
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00403827
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040142A
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00401C2B
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040C4D3
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040BCEA
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040AD5F
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040AD60
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00408116
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00417516
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040FD1C
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00410528
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0042313D
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004125CA
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004131CC
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004221ED
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004065F2
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004065F6
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00411982
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00410DBE
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00413220
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00421AE6
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0041B2F3
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040D684
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040D6A0
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0041BF43
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00404B50
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00409711
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0041E32C
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040E734
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0041CBD1
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004203E1
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040BFFB
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00425FFC
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00407388
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 588
Source: jesovROZ8A.exe, 00000000.00000002.206549685.0000000000446000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameChevy.exe` vs jesovROZ8A.exe
Source: jesovROZ8A.exeBinary or memory string: OriginalFilenameChevy.exe` vs jesovROZ8A.exe
Source: jesovROZ8A.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: jesovROZ8A.exeStatic PE information: Section: UPX1 ZLIB complexity 0.996900699013
Source: classification engineClassification label: mal60.winEXE@2/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2416
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER97.tmpJump to behavior
Source: C:\Users\user\Desktop\jesovROZ8A.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: jesovROZ8A.exeVirustotal: Detection: 85%
Source: jesovROZ8A.exeReversingLabs: Detection: 100%
Source: unknownProcess created: C:\Users\user\Desktop\jesovROZ8A.exe 'C:\Users\user\Desktop\jesovROZ8A.exe'
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 588
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040D056 push ds; retf
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00405414 push ds; retn 0000h
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004060E9 push ecx; ret
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00410DFE pushad ; ret
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040D5B6 push 00880000h; ret
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_004046EA pushad ; ret
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_00405EFB pushad ; ret
Source: C:\Users\user\Desktop\jesovROZ8A.exeCode function: 0_2_0040577F push edi; ret
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\jesovROZ8A.exeProcess queried: DebugPort

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsSoftware Packing11LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information11NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
jesovROZ8A.exe86%VirustotalBrowse
jesovROZ8A.exe100%ReversingLabsWin32.Trojan.Zeus
jesovROZ8A.exe100%AviraTR/Sirefef.AO
jesovROZ8A.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.2.jesovROZ8A.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
0.0.jesovROZ8A.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:346431
Start date:31.01.2021
Start time:15:51:17
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 17s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:jesovROZ8A.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal60.winEXE@2/4@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 98.3% (good quality ratio 69.3%)
  • Quality average: 46.9%
  • Quality standard deviation: 34.2%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Sleeps bigger than 120000ms are automatically reduced to 1000ms
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): WerFault.exe
  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 52.255.188.83, 104.43.193.48
  • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, watson.telemetry.microsoft.com, skypedataprdcolcus15.cloudapp.net

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_jesovROZ8A.exe_43fc5ffcbae1f11637667ee26b773884583759_76289d07_174609fe\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):11734
Entropy (8bit):3.7756645450844095
Encrypted:false
SSDEEP:192:d6lo4/KjHBUZMXYjRWV//u7s7S274ItDX2:H4/+BUZMXYjM/u7s7X4ItDX2
MD5:90348400B8FF91427A3D8FE633406DAD
SHA1:B0890BF3F5D23484AE45B77C2B2916D01DB734BF
SHA-256:B896514327C8A7E71B11B5A09D4C29C3A0300D34BA416416CF6E4FA8483053C2
SHA-512:B8A9BB49180A44760BE185E39C8BBC696E60DCAF8ED4723B80E7A00034E1DDB5F0AA69D972B22B0EABC5E0958AD76029F32DEE513842759525EBA0B618A30409
Malicious:true
Reputation:low
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.6.6.1.0.7.2.4.8.0.7.9.4.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.6.6.1.0.7.2.5.5.5.7.9.5.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.1.6.b.8.a.4.8.-.6.5.c.0.-.4.2.2.5.-.a.6.c.8.-.2.3.9.f.a.8.7.2.9.c.c.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.6.7.8.e.b.2.4.-.7.c.1.1.-.4.3.c.8.-.a.2.a.e.-.5.a.9.c.0.8.1.4.d.4.9.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.j.e.s.o.v.R.O.Z.8.A...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.h.e.v.y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.7.0.-.0.0.0.1.-.0.0.1.7.-.1.5.d.5.-.a.2.1.2.2.c.f.8.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.e.9.9.7.4.9.2.3.7.a.0.6.0.7.c.4.b.f.6.b.d.7.1.4.a.8.4.d.c.b.3.0.0.0.0.0.9.0.4.!.0.0.0.0.6.6.8.4.d.0.f.f.d.e.1.7.4.0.5.2.a.0.3.9.3.1.9.8.1.2.6.2.d.c.0.a.7.c.b.
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28C.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8282
Entropy (8bit):3.6994579938462806
Encrypted:false
SSDEEP:192:Rrl7r3GLNijt6jfy6YS/SUIUpblGgmfPjStCprF89brnesfH5m:RrlsNip6e6YqSUIU+gmfPjS/rndfU
MD5:3BAD7B2DBEFB569A73D48F4E1BDBE508
SHA1:8573B937AC58F6F45B2ABFDE4444E5EE9D0B382B
SHA-256:794287A06E613B335CCBDB4141CAF7A8D2B5E3EC8B67905360FEA6DE030DBBB5
SHA-512:30A5B628C11FD517627724BB6B40E3A587E33047F685365AA264D4AF2580A626B3D94D6DD8E5E55F9B498624AF3B615139558106B26079926CDF91F8FBED36FC
Malicious:false
Reputation:low
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.4.1.6.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32A.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4622
Entropy (8bit):4.459246142148875
Encrypted:false
SSDEEP:48:cvIwSD8zs8tJgtWI98/EWSC8B1/8fm8M4JosSFL+q8qrVZ5P9M0h4sd:uITf8HNdSNsJ8tZ5P9MCdd
MD5:EE9A37A7CF7A48B561CE809E0A9FD314
SHA1:7A53D5C095AE88DB6527D23ED6F1828661065825
SHA-256:3A7ACD8DFC4FFB86D5B8D14C837E25B5E82FCC2B699CAA7E3B5DA2EF2A1660FF
SHA-512:27B92BA14C832DCDC77EFA83CDA0CB756907858062DB83C14A435ACE13D716A2EA8F58C7230016101D5410A3265994B3358B1E73AF41405BEE8B062AD6910DEA
Malicious:false
Reputation:low
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="841502" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
C:\ProgramData\Microsoft\Windows\WER\Temp\WER97.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun Jan 31 23:52:05 2021, 0x1205a4 type
Category:dropped
Size (bytes):41942
Entropy (8bit):2.338919342839634
Encrypted:false
SSDEEP:192:/N/t2P6MvHmWzxUsxtr+AkK2VOD+wGt6t5Q3KrRMjCTx/aE6MC:GuWzxUsxx+bgTsZKruCTpP6MC
MD5:EF41E4BCD97E9BF8344AE871265D27F2
SHA1:5013FCE08852EA3B415DC5B9B0F312DD1D1DDE18
SHA-256:FDD7E4E2E749661B7BBEB808272674283A5FA9D0E13AE47EE71D8B9E0F118D0C
SHA-512:9ED65096CD14476E73D7BD6503BDB5B496715968DBA737832EA936478A2FF314931D3D9AB97450AF2831D870A93A423CF2CA7C6BD337437F564F5638EAF619A9
Malicious:false
Reputation:low
Preview: MDMP....... ........B.`...................U...........B..............GenuineIntelW...........T.......p....B.`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.9178862272744785
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.39%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:jesovROZ8A.exe
File size:202240
MD5:039ce25d495fa555ae1c210592b564d0
SHA1:6684d0ffde174052a03931981262dc0a7cb9891c
SHA256:94fff127753ed1d704c781b5c391f5e62f4a907b67f7e1d51c3c84addd5851ab
SHA512:c2be8d6b80e57339957f370b4ac31bd03140f9a9ed4865926eb6d7e5a69d3510b046930c1933d38629b4c3bcae007b6cf5e6140463ab6e064820cdd91bbd46bb
SSDEEP:3072:RD9PfpJ/v2bIfdjba+htCsw0qv2AYjGX9E7e+q8EOADhpsWgXDeet78Bx/rUyMHL:RXJWbUTwsTqvdMO9nnSmphgTeE4B+8U
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........F...'...'...'......h%......;'...k...'..0...C'...y...&..<&...%.......&..^....%...w...&...3...$.......$...7..Z&..Rich.'.........

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x445590
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x4D771DAA [Wed Mar 9 06:26:50 2011 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:8
OS Version Minor:2
File Version Major:8
File Version Minor:2
Subsystem Version Major:8
Subsystem Version Minor:2
Import Hash:976c9384d1a3c367e491662f20af4316

Entrypoint Preview

Instruction
pushad
mov esi, 00416000h
lea edi, dword ptr [esi-00015000h]
push edi
jmp 00007F753091967Dh
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007F7530919679h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F753091965Fh
mov eax, 00000001h
add ebx, ebx
jne 00007F7530919679h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007F7530919661h
jne 00007F753091967Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007F7530919656h
xor ecx, ecx
sub eax, 03h
jc 00007F753091967Fh
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007F75309196E6h
mov ebp, eax
add ebx, ebx
jne 00007F7530919679h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jne 00007F7530919679h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jne 00007F7530919692h
inc ecx
add ebx, ebx
jne 00007F7530919679h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007F7530919661h
jne 00007F753091967Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007F7530919656h
add ecx, 02h
cmp ebp, FFFFF300h
adc ecx, 01h
lea edx, dword ptr [edi+ebp]
cmp ebp, FFFFFFFCh
jbe 00007F7530919681h
mov al, byte ptr [edx]
inc edx
mov byte ptr [edi], al
inc edi
dec ecx
jne 00007F7530919669h
jmp 00007F75309195D8h
nop
mov eax, dword ptr [edx]
add edx, 04h
mov dword ptr [edi], eax
add edi, 04h
sub ecx, 04h
jnbe 00007F7530919663h
add edi, ecx
jmp 00007F75309295C1h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4749c0x428.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x149c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x150000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
UPX10x160000x300000x2f800False0.996900699013data7.94664222533IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x460000x20000x1a00False0.621394230769data5.74902503533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_FONT0x463ec0x5dataEnglishUnited States
RT_FONT0x463f80x5dataEnglishUnited States
RT_FONT0x464040x5dataEnglishUnited States
RT_FONT0x464100x5dataEnglishUnited States
RT_FONT0x4641c0x5dataEnglishUnited States
RT_FONT0x464280x5dataEnglishUnited States
RT_FONT0x464340x5dataEnglishUnited States
RT_FONT0x464400x5dataEnglishUnited States
RT_FONT0x4644c0x5dataEnglishUnited States
RT_RCDATA0x464580xb08dataEnglishUnited States
RT_VERSION0x46f640x32cdataEnglishUnited States
RT_MANIFEST0x472940x1beASCII text, with CRLF line terminatorsEnglishUnited States
None0x474580x5dataEnglishUnited States
None0x474640x5Non-ISO extended-ASCII text, with no line terminatorsEnglishUnited States
None0x474700x5dataEnglishUnited States
None0x4747c0x5dataEnglishUnited States
None0x474880x5dataEnglishUnited States
None0x474940x5dataEnglishUnited States

Imports

DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
advapi32.dllRegEnumKeyW
comctl32.dllImageList_Add
comdlg32.dllChooseColorW
crypt32.dllCryptProtectData
gdi32.dllDPtoLP
msimg32.dllAlphaBlend
msvcrt.dllexit
ole32.dllDoDragDrop
rpcrt4.dllUuidEqual
secur32.dllGetUserNameExW
shell32.dllShellAboutW
shlwapi.dllUrlIsW
urlmon.dllCreateAsyncBindCtx
user32.dllGetDC
version.dllVerQueryValueW
wininet.dllInternetOpenW
winmm.dllmixerOpen

Version Infos

DescriptionData
LegalCopyrightCrops Mama Poll 2003-2010
InternalNameFirm Veal Pores Funds Elms
FileVersion8.9
CompanyNameFoundstone Inc.
ProductNameYak Press Bent Met Shuts Cogent
ProductVersion8.9
FileDescriptionWrong Knot Wilt Alto Shrew Strap
OriginalFilenameChevy.exe
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Jan 31, 2021 15:51:57.030225039 CET53559848.8.8.8192.168.2.3
Jan 31, 2021 15:51:58.114346027 CET6418553192.168.2.38.8.8.8
Jan 31, 2021 15:51:58.171156883 CET53641858.8.8.8192.168.2.3
Jan 31, 2021 15:51:59.309480906 CET6511053192.168.2.38.8.8.8
Jan 31, 2021 15:51:59.357852936 CET53651108.8.8.8192.168.2.3
Jan 31, 2021 15:52:00.330826044 CET5836153192.168.2.38.8.8.8
Jan 31, 2021 15:52:00.380363941 CET53583618.8.8.8192.168.2.3
Jan 31, 2021 15:52:01.876180887 CET6349253192.168.2.38.8.8.8
Jan 31, 2021 15:52:01.927094936 CET53634928.8.8.8192.168.2.3
Jan 31, 2021 15:52:02.834682941 CET6083153192.168.2.38.8.8.8
Jan 31, 2021 15:52:02.882750988 CET53608318.8.8.8192.168.2.3
Jan 31, 2021 15:52:03.956110001 CET6010053192.168.2.38.8.8.8
Jan 31, 2021 15:52:04.009675980 CET53601008.8.8.8192.168.2.3
Jan 31, 2021 15:52:05.175945997 CET5319553192.168.2.38.8.8.8
Jan 31, 2021 15:52:05.223980904 CET53531958.8.8.8192.168.2.3
Jan 31, 2021 15:52:05.743197918 CET5014153192.168.2.38.8.8.8
Jan 31, 2021 15:52:05.802350044 CET53501418.8.8.8192.168.2.3
Jan 31, 2021 15:52:06.373653889 CET5302353192.168.2.38.8.8.8
Jan 31, 2021 15:52:06.421638012 CET53530238.8.8.8192.168.2.3
Jan 31, 2021 15:52:07.194112062 CET4956353192.168.2.38.8.8.8
Jan 31, 2021 15:52:07.242078066 CET53495638.8.8.8192.168.2.3
Jan 31, 2021 15:52:08.044931889 CET5135253192.168.2.38.8.8.8
Jan 31, 2021 15:52:08.095187902 CET53513528.8.8.8192.168.2.3
Jan 31, 2021 15:52:09.233760118 CET5934953192.168.2.38.8.8.8
Jan 31, 2021 15:52:09.292754889 CET53593498.8.8.8192.168.2.3
Jan 31, 2021 15:52:10.289381981 CET5708453192.168.2.38.8.8.8
Jan 31, 2021 15:52:10.337560892 CET53570848.8.8.8192.168.2.3

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:15:52:02
Start date:31/01/2021
Path:C:\Users\user\Desktop\jesovROZ8A.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\jesovROZ8A.exe'
Imagebase:0x400000
File size:202240 bytes
MD5 hash:039CE25D495FA555AE1C210592B564D0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:15:52:03
Start date:31/01/2021
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 588
Imagebase:0x230000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >