Loading ...

Play interactive tourEdit tour

Analysis Report Facturas Pagadas Al Vencimiento.exe

Overview

General Information

Sample Name:Facturas Pagadas Al Vencimiento.exe
Analysis ID:433561
MD5:c8d357afda8635441bc5838244ca0029
SHA1:026b3b6bafa462c763860afeb21b3cfe05aeb600
SHA256:94bfbe95a21d987080ac95825abde8cf1aa7955fa711c8daeea32ba18590979d
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Checks if the current process is being debugged
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
One or more processes crash
PE file contains strange resources
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • Facturas Pagadas Al Vencimiento.exe (PID: 6040 cmdline: 'C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe' MD5: C8D357AFDA8635441BC5838244CA0029)
    • WerFault.exe (PID: 5540 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 3180 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1dBTGLOe-ZeMuRpNWg8qsJp7BOE8QNF9s5l"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Facturas Pagadas Al Vencimiento.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: Facturas Pagadas Al Vencimiento.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1dBTGLOe-ZeMuRpNWg8qsJp7BOE8QNF9s5l"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Facturas Pagadas Al Vencimiento.exeVirustotal: Detection: 71%Perma Link
    Source: Facturas Pagadas Al Vencimiento.exeMetadefender: Detection: 45%Perma Link
    Source: Facturas Pagadas Al Vencimiento.exeReversingLabs: Detection: 69%
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1dBTGLOe-ZeMuRpNWg8qsJp7BOE8QNF9s5l
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000002.251983968.000000000073A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

    System Summary:

    barindex
    Potential malicious icon foundShow sources
    Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_004014BC
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.236913139.0000000000610000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Facturas Pagadas Al Vencimiento.exe
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.228562671.0000000000421000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGRFTNING.exe vs Facturas Pagadas Al Vencimiento.exe
    Source: Facturas Pagadas Al Vencimiento.exeBinary or memory string: OriginalFilenameGRFTNING.exe vs Facturas Pagadas Al Vencimiento.exe
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal76.rans.troj.winEXE@3/8@0/1
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6040
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C35.tmpJump to behavior
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Facturas Pagadas Al Vencimiento.exeVirustotal: Detection: 71%
    Source: Facturas Pagadas Al Vencimiento.exeMetadefender: Detection: 45%
    Source: Facturas Pagadas Al Vencimiento.exeReversingLabs: Detection: 69%
    Source: unknownProcess created: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe 'C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe'
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Source: Window RecorderWindow detected: More than 3 window changes detected

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: Facturas Pagadas Al Vencimiento.exe, type: SAMPLE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Facturas Pagadas Al Vencimiento.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.7.unpack, type: UNPACKEDPE
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00406C48 push edi; iretd
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040A4F0 push edi; retf
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040B88A push es; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_004018A5 push eax; retn 0041h
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040CD40 push FFFFFF87h; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040AD1C pushfd ; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040DE63 push ds; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040C20B push FFFFFFF9h; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040C20D push FFFFFFF9h; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040CAC2 pushad ; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00405EC5 push es; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040D6DA push cs; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040BA91 push ss; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040829F push 00000055h; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00409768 push ebp; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00409F3A push 00000048h; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00409FCB push 00000048h; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_004077DD push ebp; ret
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess queried: DebugPort
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection2Virtualization/Sandbox Evasion1Input Capture1Security Software Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Facturas Pagadas Al Vencimiento.exe71%VirustotalBrowse
    Facturas Pagadas Al Vencimiento.exe49%MetadefenderBrowse
    Facturas Pagadas Al Vencimiento.exe70%ReversingLabsWin32.Trojan.Midie

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious

    Private

    IP
    192.168.2.1

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:433561
    Start date:12.06.2021
    Start time:15:09:33
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 26s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:Facturas Pagadas Al Vencimiento.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:25
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal76.rans.troj.winEXE@3/8@0/1
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 14.2% (good quality ratio 2.9%)
    • Quality average: 15.3%
    • Quality standard deviation: 28.6%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
    • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 13.64.90.137, 92.122.145.220, 168.61.161.212, 13.88.21.125, 20.82.210.154, 184.30.20.56, 20.54.26.129, 51.103.5.159, 92.122.213.247, 92.122.213.194
    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    TimeTypeDescription
    15:10:33API Interceptor2x Sleep call for process: WerFault.exe modified

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Facturas Pagadas_2024e1b44264dba4d9a5d8d4883c883c62d1e68_380e93cd_0c3f9333\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):11524
    Entropy (8bit):3.776556767599868
    Encrypted:false
    SSDEEP:96:UYX3IxwgNFA3gQzFD7DcSpXIQcQ5c6ScE4cw3M+HbHg/TVG4rmMoVazWbSmnFdOx:r4xwg/KC0HnWSZja0I/u7sXS274ItSBw
    MD5:9EA029D2DEC2DAC1871DA0DE53099B26
    SHA1:EC7F053B9C4D11B27BA47633298867D30D4348AE
    SHA-256:DA4F27E735FEA5ECF5F676004681DC59A448345BBB6EA095624B160C2BF7C63A
    SHA-512:FD3C3369C289ED666F47C10EE187B42B089B25C9E49762FD003A5F944B3C8CE00897077152FCC3165F29115C55B02E0DE3B31D6247D5F24F25631B15DBDC9FBD
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.8.0.0.9.4.4.1.7.0.5.0.2.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.8.0.0.9.4.4.2.2.5.1.9.5.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.a.1.6.3.d.7.-.9.a.9.1.-.4.a.6.a.-.9.d.7.5.-.3.f.a.c.1.b.8.d.9.7.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.b.5.c.2.0.9.-.b.b.5.0.-.4.6.9.c.-.8.c.f.0.-.1.4.f.e.5.4.6.0.0.8.d.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.a.c.t.u.r.a.s. .P.a.g.a.d.a.s. .A.l. .V.e.n.c.i.m.i.e.n.t.o...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.G.R.F.T.N.I.N.G...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.8.-.0.0.0.1.-.0.0.1.7.-.a.1.e.1.-.9.d.b.a.d.7.5.f.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.2.e.9.0.d.e.3.b.2.2.c.3.8.1.3.0.2.7.1.1.4.8.7.a.2.3.3.c.3.1.6.0.0.0.0.3.0.0.4.!.0.0.0.0.0.2.6.b.3.b.6.b.a.f.a.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Facturas Pagadas_e1b59d2026da206526c3718df9ca6d5772b50_380e93cd_15f7655d\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):11526
    Entropy (8bit):3.7729071083685213
    Encrypted:false
    SSDEEP:192:4G7zwgC+0HDOgHTja0I/u7sXS274ItSBC:b7zwgCNDHHTjO/u7sXX4ItSw
    MD5:A29547129D5A2CB01A0ACB99A9CDC563
    SHA1:C9AFB5880D3BCA7B7F8D44895DAAECCA6FA30BA5
    SHA-256:35C3B671447641B38440405ABA08AC6B6296BE017A0CE7F9A1D4E394B0C86DB7
    SHA-512:2C3199487863F9191D8BAF336C42F5368241DB588D030449C51DC287E757519F231481CE60D0B5652DBC15CFA3CB07455A38F7D8EC64737FB85BA51635627963
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.8.0.0.9.4.3.1.1.2.6.9.2.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.8.0.0.9.4.3.1.7.2.0.6.7.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.2.0.e.6.a.7.7.-.8.6.f.8.-.4.d.c.7.-.9.0.d.1.-.4.e.7.5.0.c.9.9.9.b.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.0.8.1.8.8.c.-.0.a.6.5.-.4.5.b.1.-.a.1.6.0.-.1.a.0.4.f.9.2.2.d.0.4.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.a.c.t.u.r.a.s. .P.a.g.a.d.a.s. .A.l. .V.e.n.c.i.m.i.e.n.t.o...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.G.R.F.T.N.I.N.G...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.8.-.0.0.0.1.-.0.0.1.7.-.a.1.e.1.-.9.d.b.a.d.7.5.f.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.2.e.9.0.d.e.3.b.2.2.c.3.8.1.3.0.2.7.1.1.4.8.7.a.2.3.3.c.3.1.6.0.0.0.0.3.0.0.4.!.0.0.0.0.0.2.6.b.3.b.6.b.a.f.a.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C35.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Sat Jun 12 22:10:31 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):45970
    Entropy (8bit):2.4100728525187844
    Encrypted:false
    SSDEEP:192:yOh/DVldZ7UACdPlSlCyaLbHT1yn/X2iZs2wbGVfZNMdk3/bS5JdUwa0IkM:LdLLdCdPl1yIcej9/dqDStS0+
    MD5:1631B17E646B5ABB302115F47F42516A
    SHA1:6B9FA3B6E2E47306B33C4622A993A43446ACF02E
    SHA-256:635BAF95212741218C99B5A61B6E547E1DB55CC61C49A900BAE3751D9049964B
    SHA-512:8E83BFF4B35A75032CD9F5FE5273A51FFF4AA62A99D8623AF97D86D471935712CBCC40B2FCDF115B1DAFE52BDE5B1F44CE722B110394F45A717B06C7FDA27B49
    Malicious:false
    Reputation:low
    Preview: MDMP....... ........0.`...................U...........B..............GenuineIntelW...........T............0.`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D8E.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8386
    Entropy (8bit):3.693798672862176
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiZu6IDP6YSySUqFgmfo0vFSBiCprV89btMsfpvm:RrlsNiA6IDP6YXSUqFgmfo0NSOtffM
    MD5:6E948DEB4BF5FCA5846D52C14CEB2F19
    SHA1:98419967C462534BCBD83F4D5992DCFBFD2018B3
    SHA-256:E78B92EC4695D4C464298740C0A83F09392971B5A99D945FE41D2AC318F3841D
    SHA-512:04D3A57C5D51C87FDEBB41DC9D24A49D9369D199F704FE0985A6090D1367CBE6E755DA739EAD1E561E8F1A5AE523E58A4CBFD47B28071E067A09A8C7F44AD5C9
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.4.0.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E2B.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4741
    Entropy (8bit):4.490976525072211
    Encrypted:false
    SSDEEP:48:cvIwSD8zsKJgtWI9NpWSC8Bws8fm8M4JXT7/SIFK0C+q8a7lIGCzX3XqPd:uITfYuYSNeJutEHSd
    MD5:5C690A8607E83CF1AC15D11729446481
    SHA1:C1E5152E057B266A70454F0D541FE284F165CE74
    SHA-256:A712512A506D92FC2E5EA1BF56026954E8D67CF61AD60C1CDAA6AED6527858F2
    SHA-512:CA694FD5649DBAB675DCC0B6167867DB16867EDB91607C5B98E29FDC66B954F49D3780A33F9563EBCB2C2ED50F7C7445BB4E62CE5C6600AC460A6DEA67B0EB73
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1031481" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER8587.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Sat Jun 12 22:10:41 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):46862
    Entropy (8bit):2.140785403689248
    Encrypted:false
    SSDEEP:192:sOhCRR2dm20T1yn/72Zhw8mz2EUlSAqzF8ZUU2JSY:BM2opcKZfu7GSDzMJY
    MD5:740B80A74D73165741D221C663BF2747
    SHA1:F9CA62EE3CCA562211EC55E79D567EBB8FD44A22
    SHA-256:4A265581BA51892FC94B803C6E776FF2B2E3FD5004B6E5E7E07FEA1A8F8B8AEC
    SHA-512:5462DC6E03F806A9D063BFA3B7C007C6BBAB750036E861DAF29A248C5D570F09F66C7B503998D015F69572747B0CE24EBDE4DC8443CB39298494C8F6A540D570
    Malicious:false
    Reputation:low
    Preview: MDMP....... ........0.`...................U...........B..............GenuineIntelW...........T............0.`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER86B1.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8394
    Entropy (8bit):3.6980242405197026
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiZf6ID9o6YSfSU8Ajgmfo0jFSeCpDi89bBMsfsrm:RrlsNih6ID9o6Y6SU8Ajgmfo05SlBffN
    MD5:F922260DAAF05B490EB120AEF46E81FE
    SHA1:47DA4C10A2B4B214357A85DC16824168DB99251C
    SHA-256:839A6D242FE912CC16F82DF24F0D0214F1F0E20D7816B49B9FAEA715A575A93A
    SHA-512:A619DF416750571E521ABA7F5621A7A8E94239FF26DD07B034C65C37F1B5B06E518D8483EAF160004188C0E670B15D1E59208E208863530EC5C9E227E96F6120
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.4.0.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER874F.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4741
    Entropy (8bit):4.493586948294421
    Encrypted:false
    SSDEEP:48:cvIwSD8zsKJgtWI9NpWSC8BZ8fm8M4JXT7/SWFlL+q8a7l2GCzX3XqPd:uITfYuYSN4J3vEHSd
    MD5:E02DDF099C74EDBE4B94FCE2858DFE5D
    SHA1:050B6AA8F3393539E468BD039BA4C76DFF46D763
    SHA-256:93E8E1A1BED1CE09C3229858CCE21C853F7F958E1B6A29063875123220844AA6
    SHA-512:63BD92AAA8079571025B78252D1A3002482EDCB79EEEAA3E50FA7D0A104BB22E39F647C16904392FBD51247BBC3DA2669BCFC7EAD6494BE27B3773FA310487C2
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1031481" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):4.463887810480926
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.15%
    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Facturas Pagadas Al Vencimiento.exe
    File size:135168
    MD5:c8d357afda8635441bc5838244ca0029
    SHA1:026b3b6bafa462c763860afeb21b3cfe05aeb600
    SHA256:94bfbe95a21d987080ac95825abde8cf1aa7955fa711c8daeea32ba18590979d
    SHA512:0630394ea500b46626aeb13033d6d6c213c79f1d7babc187e3bc62e4dc43272b57863fe1cdd33d83312866374801f47b4975f2631c44c96aa23f48150b8498bd
    SSDEEP:1536:8r2A295OAR92knLfapZm5sXu0dtyb/vxG8A:9A295OAR9ffUb+3m
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...hO.`.....................0....................@................

    File Icon

    Icon Hash:20047c7c70f0e004

    Static PE Info

    General

    Entrypoint:0x4014bc
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x60BD4F68 [Sun Jun 6 22:42:48 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:54ea68151857c1f30c42224007018bf1

    Entrypoint Preview

    Instruction
    push 00401764h
    call 00007F53D0B73E05h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xor byte ptr [eax], al
    add byte ptr [eax], al
    dec eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add ch, ah
    leave
    cmp al, 4Fh
    push esi
    arpl word ptr [ebp-32207EBAh], bp
    cmp dword ptr fs:[esi+0000B89Ah], esp
    add byte ptr [eax], al
    add byte ptr [eax], al
    add dword ptr [eax], eax
    add byte ptr [eax], al
    inc edx
    add byte ptr [esi], al
    push eax
    add dword ptr [ecx], 61h
    outsd
    jo 00007F53D0B73E86h
    imul esi, dword ptr [esi+66h], 646C726Fh
    jc 00007F53D0B73E77h
    outsb
    jnc 00007F53D0B73E13h
    add byte ptr [eax], al
    pushad
    jle 00007F53D0B73E2Eh
    add eax, dword ptr [eax]
    add byte ptr [eax], al
    add bh, bh
    int3
    xor dword ptr [eax], eax
    or ah, dl
    xchg eax, ebp
    sub bl, al
    jne 00007F53D0B73DC5h
    jnp 00007F53D0B73E59h
    call far 4E1Ch : 67233F9Ch
    out dx, eax
    daa
    sahf
    stosb
    jmp far AE85h : 4982311Ah
    dec ebp
    xchg eax, esp
    pop esp
    push cs
    push es
    or dword ptr [edx], edi
    dec edi
    lodsd
    xor ebx, dword ptr [ecx-48EE309Ah]
    or al, 00h
    stosb
    add byte ptr [eax-2Dh], ah
    xchg eax, ebx
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xchg eax, ebp
    add dword ptr [eax], eax
    add byte ptr [edi+00h], cl
    add byte ptr [eax], al
    add byte ptr [ebx], cl
    add byte ptr [edi+ecx*2+52h], dl
    push ebx
    dec ecx
    dec edi
    inc edi
    push edx
    inc ecx
    push eax
    dec eax

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1e6040x28.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x9b8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x14c.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1db780x1e000False0.337109375data4.7219788122IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .data0x1f0000x12300x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x210000x9b80x1000False0.178466796875data2.11818351755IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x218880x130data
    RT_ICON0x215a00x2e8data
    RT_ICON0x214780x128GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x214480x30data
    RT_VERSION0x211500x2f8dataSesotho (Sutu)South Africa

    Imports

    DLLImport
    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaUI1Str, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

    Version Infos

    DescriptionData
    Translation0x0430 0x04b0
    LegalCopyrightTera data
    InternalNameGRFTNING
    FileVersion1.00
    CompanyNameTera data
    LegalTrademarksTera data
    CommentsTera data
    ProductNameTera data
    ProductVersion1.00
    FileDescriptionTera data
    OriginalFilenameGRFTNING.exe

    Possible Origin

    Language of compilation systemCountry where language is spokenMap
    Sesotho (Sutu)South Africa

    Network Behavior

    Network Port Distribution

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jun 12, 2021 15:10:12.102142096 CEST5754453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:12.160832882 CEST53575448.8.8.8192.168.2.3
    Jun 12, 2021 15:10:12.318170071 CEST5598453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:12.369839907 CEST53559848.8.8.8192.168.2.3
    Jun 12, 2021 15:10:12.452097893 CEST6418553192.168.2.38.8.8.8
    Jun 12, 2021 15:10:12.512283087 CEST53641858.8.8.8192.168.2.3
    Jun 12, 2021 15:10:13.467622995 CEST6511053192.168.2.38.8.8.8
    Jun 12, 2021 15:10:13.520572901 CEST53651108.8.8.8192.168.2.3
    Jun 12, 2021 15:10:14.403872013 CEST5836153192.168.2.38.8.8.8
    Jun 12, 2021 15:10:14.454022884 CEST53583618.8.8.8192.168.2.3
    Jun 12, 2021 15:10:15.351442099 CEST6349253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:15.406727076 CEST53634928.8.8.8192.168.2.3
    Jun 12, 2021 15:10:16.326603889 CEST6083153192.168.2.38.8.8.8
    Jun 12, 2021 15:10:16.382205009 CEST53608318.8.8.8192.168.2.3
    Jun 12, 2021 15:10:17.639139891 CEST6010053192.168.2.38.8.8.8
    Jun 12, 2021 15:10:17.692406893 CEST53601008.8.8.8192.168.2.3
    Jun 12, 2021 15:10:18.781671047 CEST5319553192.168.2.38.8.8.8
    Jun 12, 2021 15:10:18.831770897 CEST53531958.8.8.8192.168.2.3
    Jun 12, 2021 15:10:20.404968977 CEST5014153192.168.2.38.8.8.8
    Jun 12, 2021 15:10:20.457632065 CEST53501418.8.8.8192.168.2.3
    Jun 12, 2021 15:10:22.030080080 CEST5302353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:22.080522060 CEST53530238.8.8.8192.168.2.3
    Jun 12, 2021 15:10:22.960958004 CEST4956353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:23.013819933 CEST53495638.8.8.8192.168.2.3
    Jun 12, 2021 15:10:25.462291002 CEST5135253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:25.513123035 CEST53513528.8.8.8192.168.2.3
    Jun 12, 2021 15:10:26.380023956 CEST5934953192.168.2.38.8.8.8
    Jun 12, 2021 15:10:26.430704117 CEST53593498.8.8.8192.168.2.3
    Jun 12, 2021 15:10:27.581918955 CEST5708453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:27.633286953 CEST53570848.8.8.8192.168.2.3
    Jun 12, 2021 15:10:28.657243013 CEST5882353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:28.716032982 CEST53588238.8.8.8192.168.2.3
    Jun 12, 2021 15:10:29.591808081 CEST5756853192.168.2.38.8.8.8
    Jun 12, 2021 15:10:29.650279045 CEST53575688.8.8.8192.168.2.3
    Jun 12, 2021 15:10:30.867782116 CEST5054053192.168.2.38.8.8.8
    Jun 12, 2021 15:10:30.920933008 CEST53505408.8.8.8192.168.2.3
    Jun 12, 2021 15:10:31.782145977 CEST5436653192.168.2.38.8.8.8
    Jun 12, 2021 15:10:31.815999985 CEST5303453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:31.832814932 CEST53543668.8.8.8192.168.2.3
    Jun 12, 2021 15:10:31.868969917 CEST53530348.8.8.8192.168.2.3
    Jun 12, 2021 15:10:32.765168905 CEST5776253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:32.816920042 CEST53577628.8.8.8192.168.2.3
    Jun 12, 2021 15:10:42.059823990 CEST5543553192.168.2.38.8.8.8
    Jun 12, 2021 15:10:42.110271931 CEST53554358.8.8.8192.168.2.3
    Jun 12, 2021 15:10:46.943970919 CEST5071353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:47.005245924 CEST53507138.8.8.8192.168.2.3
    Jun 12, 2021 15:10:51.072354078 CEST5613253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:51.147378922 CEST53561328.8.8.8192.168.2.3
    Jun 12, 2021 15:11:05.160324097 CEST5898753192.168.2.38.8.8.8
    Jun 12, 2021 15:11:05.229918957 CEST53589878.8.8.8192.168.2.3
    Jun 12, 2021 15:11:08.037477970 CEST5657953192.168.2.38.8.8.8
    Jun 12, 2021 15:11:08.096488953 CEST53565798.8.8.8192.168.2.3
    Jun 12, 2021 15:11:17.419631004 CEST6063353192.168.2.38.8.8.8
    Jun 12, 2021 15:11:17.483326912 CEST53606338.8.8.8192.168.2.3
    Jun 12, 2021 15:11:47.839689970 CEST6129253192.168.2.38.8.8.8
    Jun 12, 2021 15:11:47.909065008 CEST53612928.8.8.8192.168.2.3
    Jun 12, 2021 15:11:48.306693077 CEST6361953192.168.2.38.8.8.8
    Jun 12, 2021 15:11:48.376354933 CEST53636198.8.8.8192.168.2.3
    Jun 12, 2021 15:12:12.693031073 CEST6493853192.168.2.38.8.8.8
    Jun 12, 2021 15:12:12.753371954 CEST53649388.8.8.8192.168.2.3

    Code Manipulations

    Statistics

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:15:10:18
    Start date:12/06/2021
    Path:C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe'
    Imagebase:0x400000
    File size:135168 bytes
    MD5 hash:C8D357AFDA8635441BC5838244CA0029
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:low

    General

    Start time:15:10:30
    Start date:12/06/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Imagebase:0x180000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:high

    General

    Start time:15:10:41
    Start date:12/06/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Imagebase:0x180000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >