Loading ...

Play interactive tourEdit tour

Windows Analysis Report ZM80M76Nwv.exe

Overview

General Information

Sample Name:ZM80M76Nwv.exe
Analysis ID:528754
MD5:3c93f57536f15046b52f4340edba42da
SHA1:a7b4f2c0390ebc7c4b7aa5bbfbb60503aba08955
SHA256:493ea8db7e8d8554d3f3c1dcbcf661dc5027892b02d262dfdcb58372e257191b
Tags:exeRedLineStealer
Infos:

Most interesting Screenshot:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file has nameless sections
Machine Learning detection for sample
Uses 32bit PE files
AV process strings found (often used to terminate AV products)
PE file does not import any functions
One or more processes crash
PE file contains an invalid checksum
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
PE file contains sections with non-standard names
Detected potential crypto function
PE file overlay found

Classification

Process Tree

  • System is w10x64
  • ZM80M76Nwv.exe (PID: 1316 cmdline: "C:\Users\user\Desktop\ZM80M76Nwv.exe" MD5: 3C93F57536F15046B52F4340EDBA42DA)
    • WerFault.exe (PID: 3024 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 208 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: ZM80M76Nwv.exeVirustotal: Detection: 35%Perma Link
Machine Learning detection for sampleShow sources
Source: ZM80M76Nwv.exeJoe Sandbox ML: detected
Source: ZM80M76Nwv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000005.00000002.319420895.0000000002E32000.00000004.00000001.sdmp
Source: Binary string: kernel32.pdb source: WerFault.exe
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net

System Summary:

barindex
PE file has nameless sectionsShow sources
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: ZM80M76Nwv.exeStatic PE information: No import functions for PE file found
Source: C:\Users\user\Desktop\ZM80M76Nwv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 208
Source: C:\Windows\SysWOW64\WerFault.exeCode function: 5_2_02E3E4485_2_02E3E448
Source: ZM80M76Nwv.exeStatic PE information: Data appended to the last section found
Source: ZM80M76Nwv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
Source: ZM80M76Nwv.exeStatic PE information: Section: ZLIB complexity 1.00051229508
Source: ZM80M76Nwv.exeStatic PE information: Section: ZLIB complexity 1.0107421875
Source: ZM80M76Nwv.exeVirustotal: Detection: 35%
Source: C:\Users\user\Desktop\ZM80M76Nwv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\ZM80M76Nwv.exe "C:\Users\user\Desktop\ZM80M76Nwv.exe"
Source: C:\Users\user\Desktop\ZM80M76Nwv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 208
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1316
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A67.tmpJump to behavior
Source: classification engineClassification label: mal56.winEXE@2/6@0/0
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: ZM80M76Nwv.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x3dc000
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000005.00000002.319420895.0000000002E32000.00000004.00000001.sdmp
Source: Binary string: kernel32.pdb source: WerFault.exe
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000005.00000003.309886506.00000000052C1000.00000004.00000001.sdmp
Source: ZM80M76Nwv.exeStatic PE information: real checksum: 0x42a356 should be: 0x39e83
Source: C:\Windows\SysWOW64\WerFault.exeCode function: 5_2_02E3E87A pushad ; ret 5_2_02E3E87C
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name:
Source: ZM80M76Nwv.exeStatic PE information: section name: .AqWcUFG
Source: ZM80M76Nwv.exeStatic PE information: section name: .adata
Source: initial sampleStatic PE information: section name: entropy: 7.99401104881
Source: initial sampleStatic PE information: section name: entropy: 7.78065343968
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.5.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: VMware7,1
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.me
Source: Amcache.hve.5.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: C:\Users\user\Desktop\ZM80M76Nwv.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.5.dr, Amcache.hve.LOG1.5.drBinary or memory string: c:\users\user\desktop\procexp.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.dr, Amcache.hve.LOG1.5.drBinary or memory string: procexp.exe

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery21Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsSoftware Packing2LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
ZM80M76Nwv.exe36%VirustotalBrowse
ZM80M76Nwv.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.5.drfalse
    high

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:528754
    Start date:25.11.2021
    Start time:18:41:32
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 32s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:ZM80M76Nwv.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:24
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal56.winEXE@2/6@0/0
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 100% (good quality ratio 100%)
    • Quality average: 68.5%
    • Quality standard deviation: 31.5%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 92.122.145.220, 52.182.143.212
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ZM80M76Nwv.exe_16b24cad3a6a942c6be01f412bd01d9b9f91c865_350d898a_0b3f7a75\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6258743708536602
    Encrypted:false
    SSDEEP:96:SoFUlGrJUltJhDsoL7DsNfBpXIQcQvc6QcEDMcw3Dj+HbHg6ZAXGng5FMTPSkvPQ:PulGrqli/tHBUZMXAjE/u7s2S274It0
    MD5:19408E6E9A097D01C1408A5B214C378F
    SHA1:D1CCDAED4435B2B852BC79E5A0A4BB624664D284
    SHA-256:A8559ED8829B7499B8F538B7E0043CB4980914F30A156F20FC6A4CA5032C5668
    SHA-512:3AAF13C9AD312EEA17D7878286E98C39BF752D75945268154C220D4D99D429314B0113E16FE1A8567F5293499088910B6A92F7E5B24852A02D9084175D7934BF
    Malicious:true
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.2.3.6.8.1.5.8.2.4.4.2.4.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.2.3.6.8.1.6.0.9.9.4.2.3.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.8.7.7.d.6.0.a.-.a.3.b.2.-.4.1.4.2.-.8.3.a.6.-.9.4.d.c.2.6.b.e.5.6.e.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.d.0.e.6.d.3.7.-.d.3.d.c.-.4.6.c.6.-.9.4.d.7.-.5.9.6.0.f.5.a.d.f.0.a.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.Z.M.8.0.M.7.6.N.w.v...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.2.4.-.0.0.0.1.-.0.0.1.c.-.0.d.5.2.-.4.a.4.4.6.f.e.2.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.3.6.5.7.2.b.b.6.2.4.6.4.8.3.c.3.b.7.7.1.0.e.7.1.6.7.4.c.d.5.4.0.0.0.0.f.f.f.f.!.0.0.0.0.a.7.b.4.f.2.c.0.3.9.0.e.b.c.7.c.4.b.7.a.a.5.b.b.f.b.b.6.0.5.0.3.a.b.a.0.8.9.5.5.!.Z.M.8.0.M.7.6.N.w.v...e.x.e.....T.a.r.g.e.t.A.p.p.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A67.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Nov 26 02:42:38 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):18276
    Entropy (8bit):2.1601715702588473
    Encrypted:false
    SSDEEP:96:5+8ic8//8TKyKk8i7k7yXsE711pP46o9WInWIX4IxI82sIm:zi38O/HOlXsG1w6obI8Nd
    MD5:AA07C4322ED29AAC22E3EC3E318B2E8B
    SHA1:83F73A121B5DC65AF15725B27B0F6ED654A8002F
    SHA-256:83A38AE6518192230E8912A628E41EEB405F3875B57419B64718D1D6C2C538C9
    SHA-512:2247064BB0E9ACE9798FC3C13621B2771CBD966F9EBDCDC118A3ABC4392CBF71EF537FD55B5BC0599D1FD7B4C1632A32463E664AC0B019BD0664DC782FE96EC6
    Malicious:false
    Reputation:low
    Preview: MDMP....... ........I.a............4........... ...<.......d...............T.......8...........T................>..........\...........H....................................................................U...........B..............GenuineIntelW...........T.......$....I.a.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C8B.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8294
    Entropy (8bit):3.6987375138268868
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNio66x1WG6YFuSUARgmfQSjCprH89bglsf1Am:RrlsNil6x1WG6YsSUARgmfQSjg+fn
    MD5:F7C108B5E2078F71E7BF26CE678AA29C
    SHA1:ED98E1F5C7165B1DDD4844C2953C62C77FDFC567
    SHA-256:33E61ABB54F4A0C385CD1359889F8E8BF728E6312519BB7AF3A9DB870E365DEC
    SHA-512:FD30FEA3B93AF7DFB4E598143AB83CB14CFC148E5BADF868918E9DFF9B737C41043034359059104BA5FC6A20531340ACFAC4670E044300359BAEC37E60790A4F
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.1.6.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E80.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4568
    Entropy (8bit):4.4670051098294765
    Encrypted:false
    SSDEEP:48:cvIwSD8zsXJgtWI9WIWSC8BB8fm8M4Js5TlFh+q8RbmxWR5taKgd:uITf5NhSN8JM3IaKgd
    MD5:D96FC25ABD017BB81E1242EFF22422B1
    SHA1:055C3EF36EC0FEEFD33472A2A27047037A78D5DF
    SHA-256:70328CF19D05D4465E132A8EE394ACF3FCE8A18D807466846DE58612800AB29C
    SHA-512:F3E452389A9A7F08CD653D66E4711278B61B8A13A5202EE839D504981233B78CBFABA34EBDA2BF5173E69B24FD5D49DC564760B8B8C6A1F7D23A750E7B27EA94
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1270793" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
    C:\Windows\appcompat\Programs\Amcache.hve
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1572864
    Entropy (8bit):4.273308087069104
    Encrypted:false
    SSDEEP:12288:DakSJ7FNIgRjl+RL2npEK81nIpmRiphu4SYXbyA+5N/fiWsF+Bq3C:ekSJ7FNIgRjl+RBE
    MD5:C8CE14535E2682B31019BA8E0276D461
    SHA1:6BB8647EA8659D8DBFEB0D895E842B3F528AEBC6
    SHA-256:0DE0C60006456CC2CC0633BBBAF11BDE968F8CA1F253D2A84569CDEA6E4B5B77
    SHA-512:C673FC446426598673AC773434BA55A267423FCCCAE7563758318BB277429D433E3942D36BBFEB8663A7BF5A32E1BAAF6AB8B78BBF7B39E0966497BD5EFFB956
    Malicious:false
    Reputation:low
    Preview: regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmz..Eo...............................................................................................................................................................................................................................................................................................................................................U...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Windows\appcompat\Programs\Amcache.hve.LOG1
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):24576
    Entropy (8bit):3.9937708026732737
    Encrypted:false
    SSDEEP:384:ciZ65Rftx1XPJ4X0sFFn37koPBqXHSeq5QMVyi6+/Dl4Lk4rZd1DoXznEFZVpJ:TZkRftx1/J4XRFF37hBqXyeq5QMVyi63
    MD5:9954518259FF27EC7245FFE962F4302A
    SHA1:DEF4FC7A27E2C1B41863668744FF1DD4120215BF
    SHA-256:BE4D5726CB994C30CBB74F00477E7ADAA6525EBB3F8AA4F89C20A0CE04A27154
    SHA-512:C9439E17357A35710D13F9C30DCA80B99B9B59C7725EFF6C3F849C4DAB6DC6F5E56A907D8CE39E86895CBC9F74F288BE7606FB0DD0EA809A63B4F54F05B1F846
    Malicious:false
    Reputation:low
    Preview: regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmz..Eo...............................................................................................................................................................................................................................................................................................................................................S...HvLE.^......Y..............z..F...5;#...........0................... ..hbin................p.\..,..........nk,....Eo....... ........................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ....Eo....... ........................... .......Z.......................Root........lf......Root....nk ....Eo....................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.997292727076848
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:ZM80M76Nwv.exe
    File size:236703
    MD5:3c93f57536f15046b52f4340edba42da
    SHA1:a7b4f2c0390ebc7c4b7aa5bbfbb60503aba08955
    SHA256:493ea8db7e8d8554d3f3c1dcbcf661dc5027892b02d262dfdcb58372e257191b
    SHA512:ef0370f11683092dd06e96b387e031a2966a90d3aad94fd161442af23350b05244cf69798d3eda425b010ba66207675cf41726cd99a489c625da359dfaee7793
    SSDEEP:6144:SOIiujNUOuPzzt0z6IVI0mEoP/RYjwYbylp:S0uvGyuGmzPSjwYbylp
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....0.a.................4...........P.......P....@..........................po.....V.B....................................

    File Icon

    Icon Hash:00828e8e8686b000

    Static PE Info

    General

    Entrypoint:0x425000
    Entrypoint Section:
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
    DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
    Time Stamp:0x61993087 [Sat Nov 20 17:29:43 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:

    Entrypoint Preview

    Instruction
    push 00AAB001h
    call 00007FF6A0ECE7F6h
    ret
    ret
    sub dword ptr [edi-5Ch], edx
    sub esp, 7Ah
    lds eax, fword ptr [eax]
    jnbe 00007FF6A0ECE79Eh
    and esi, dword ptr [edx+1F2EE19Ch]
    mov ch, BBh
    dec esi
    cmp edi, edi
    push ss
    pop eax
    jecxz 00007FF6A0ECE7F0h
    jnc 00007FF6A0ECE840h
    mov esp, D092331Ah
    in eax, dx
    pop ds
    int3
    cmp byte ptr [ecx-5Eh], dh
    push ds
    shr byte ptr [ebx-6174F0A8h], FFFFFFA8h
    insb
    out 44h, eax
    mov al, 6Ah
    inc dh
    and eax, 7D091FFAh
    scasb
    jno 00007FF6A0ECE7D7h
    test eax, 6008DB81h
    popfd
    loop 00007FF6A0ECE829h
    or cl, FFFFFF88h
    cmpsb
    mov byte ptr [04D15535h], al
    sub eax, DFE4C75Ah

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x6abc7c0x194.AqWcUFG
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6aa0000x5b9.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x100000

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    0x10000x21fc20x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    0x230000x13060x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    0x250000xf0000x7a00False1.00051229508data7.99401104881IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    0x340000x20000x400False1.0107421875data7.78065343968IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    0x360000x26966a0x0unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    0x2a00000x40a0000x3dc000unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x6aa0000x10000x600False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .AqWcUFG0x6ab0000x4b0000x4aa00False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .adata0x6f60000x10000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:18:42:34
    Start date:25/11/2021
    Path:C:\Users\user\Desktop\ZM80M76Nwv.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\ZM80M76Nwv.exe"
    Imagebase:0x400000
    File size:236703 bytes
    MD5 hash:3C93F57536F15046B52F4340EDBA42DA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    General

    Start time:18:42:36
    Start date:25/11/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 208
    Imagebase:0xb10000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >

      Executed Functions

      Non-executed Functions

      Memory Dump Source
      • Source File: 00000005.00000002.319420895.0000000002E32000.00000004.00000001.sdmp, Offset: 02E32000, based on PE: false
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cb0e638a506915109cb3e0f84fdde3eb61967557d297d75b287b93be4fec3cb6
      • Instruction ID: b8f15963d6a850c68a9ab8fc521217782aef66346143557e0048f46525509639
      • Opcode Fuzzy Hash: cb0e638a506915109cb3e0f84fdde3eb61967557d297d75b287b93be4fec3cb6
      • Instruction Fuzzy Hash: A8A179AA88E3C16FD3138F3448A95A27F71EE1751574E90EFC9C2CF0A3E109590AC766
      Uniqueness

      Uniqueness Score: -1.00%