Loading ...

Play interactive tourEdit tour

Windows Analysis Report 1.2.javaw.exe.22e0000.2.exe

Overview

General Information

Sample Name:1.2.javaw.exe.22e0000.2.exe
Analysis ID:537742
MD5:c47bfe4e43d258b87c6cece9de90c89f
SHA1:eb2c417a29d2f08e37d63f3b75cdc61b42855e91
SHA256:f4d742d82698f532e0215832cb484619a4e84547d8a1ca8dc8f2e9f791a6f27d
Infos:

Most interesting Screenshot:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Creates autostart registry keys to launch java
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
AV process strings found (often used to terminate AV products)
PE file does not import any functions
One or more processes crash
Contains functionality to read the PEB
Checks if the current process is being debugged
PE file contains sections with non-standard names
Detected potential crypto function

Classification

Process Tree

  • System is w10x64
  • 1.2.javaw.exe.22e0000.2.exe (PID: 6984 cmdline: "C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exe" MD5: C47BFE4E43D258B87C6CECE9DE90C89F)
    • WerFault.exe (PID: 2060 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6984 -s 212 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: 1.2.javaw.exe.22e0000.2.exeAvira: detected
Machine Learning detection for sampleShow sources
Source: 1.2.javaw.exe.22e0000.2.exeJoe Sandbox ML: detected
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.296664816.0000000002ADF000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.296789212.0000000002ACA000.00000004.00000001.sdmp
Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000008.00000002.309035111.0000000000522000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp
Source: Binary string: upwntdll.pdb source: WerFault.exe, 00000008.00000003.299094342.0000000002AD8000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.296865453.0000000002AD7000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.297018256.0000000002AD7000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.297417397.0000000002AD8000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp
Source: Binary string: upwntdll.pdbk$ source: WerFault.exe, 00000008.00000003.305141001.0000000002AD8000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.306277726.0000000002AD8000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.304726906.0000000002AD8000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp
Source: WerFault.exe, 00000008.00000002.309889564.0000000002ABB000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.307712711.0000000002ABB000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: 1.2.javaw.exe.22e0000.2.exe, 00000001.00000000.292131293.000000000279A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: No import functions for PE file found
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6984 -s 212
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeCode function: 1_2_022E19B0
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeCode function: 1_2_022E8D70
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeCode function: 1_2_022E37F0
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeCode function: 1_2_022E50C0
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: Section: .data ZLIB complexity 1.021484375
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER78B9.tmpJump to behavior
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: classification engineClassification label: mal56.winEXE@2/6@0/0
Source: unknownProcess created: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exe "C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exe"
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6984 -s 212
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6984
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.296664816.0000000002ADF000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.296789212.0000000002ACA000.00000004.00000001.sdmp
Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000008.00000002.309035111.0000000000522000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp
Source: Binary string: upwntdll.pdb source: WerFault.exe, 00000008.00000003.299094342.0000000002AD8000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.296865453.0000000002AD7000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.297018256.0000000002AD7000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.297417397.0000000002AD8000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp
Source: Binary string: upwntdll.pdbk$ source: WerFault.exe, 00000008.00000003.305141001.0000000002AD8000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.306277726.0000000002AD8000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.304726906.0000000002AD8000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000008.00000003.299137006.0000000004BE1000.00000004.00000001.sdmp
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: 1.2.javaw.exe.22e0000.2.exeStatic PE information: section name: .teslaX

Boot Survival:

barindex
Creates autostart registry keys to launch javaShow sources
Source: C:\Windows\SysWOW64\WerFault.exeRegistry value created or modified: \REGISTRY\A\{5f6f2660-b4f2-a4df-7d05-86d67e169743}\Root\InventoryApplicationFile\1.2.javaw.exe.22|d0d8f4f4 LowerCaseLongPath c:\users\user\desktop\1.2.javaw.exe.22e0000.2.exeJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeRegistry value created or modified: \REGISTRY\A\{5f6f2660-b4f2-a4df-7d05-86d67e169743}\Root\InventoryApplicationFile\1.2.javaw.exe.22|d0d8f4f4 LongPathHash 1.2.javaw.exe.22|d0d8f4f4Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeRegistry value created or modified: \REGISTRY\A\{5f6f2660-b4f2-a4df-7d05-86d67e169743}\Root\InventoryApplicationFile\1.2.javaw.exe.22|d0d8f4f4 Name 1.2.javaw.exe.22e0000.2.exeJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.8.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: VMware7,1
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: WerFault.exe, 00000008.00000002.309873948.0000000002AA3000.00000004.00000001.sdmp, WerFault.exe, 00000008.00000003.307778902.0000000002AA1000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.me
Source: Amcache.hve.8.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeCode function: 1_2_022E3E40 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exeProcess queried: DebugPort
Source: Amcache.hve.LOG1.8.dr, Amcache.hve.8.drBinary or memory string: c:\users\user\desktop\procexp.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.LOG1.8.dr, Amcache.hve.8.drBinary or memory string: procexp.exe

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection1Virtualization/Sandbox Evasion1Input Capture1Security Software Discovery21Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Software Packing1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
1.2.javaw.exe.22e0000.2.exe100%AviraTR/Crypt.XPACK.Gen
1.2.javaw.exe.22e0000.2.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
1.2.1.2.javaw.exe.22e0000.2.exe.22e0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.0.1.2.javaw.exe.22e0000.2.exe.22e0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.0.1.2.javaw.exe.22e0000.2.exe.22e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
1.0.1.2.javaw.exe.22e0000.2.exe.22e0000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.8.drfalse
    high

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:537742
    Start date:10.12.2021
    Start time:12:15:12
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 39s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:1.2.javaw.exe.22e0000.2.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:26
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal56.winEXE@2/6@0/0
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 94.7% (good quality ratio 47.4%)
    • Quality average: 36.5%
    • Quality standard deviation: 41.2%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com
    • Execution Graph export aborted for target 1.2.javaw.exe.22e0000.2.exe, PID 6984 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1.2.javaw.exe.22_e816a0737e58b9c4a7ce791273f8931c044f28_358f4505_09668aab\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6387115446126613
    Encrypted:false
    SSDEEP:192:4nlgLpUmqHBUZMXW1xjE/u7svS274ItJ6H:+yQBUZMXIjE/u7svX4ItE
    MD5:259D7D09E351671F850950A54F800028
    SHA1:8163D0665B803B97847B84CF528E4E9ED55BBA1F
    SHA-256:073CFD100EC7746447AD2EB1CC08A7D9899BF378ECC7B85BE52EAE01CBB96826
    SHA-512:665EB00CC8653950101549C144E409E4BED71E19164682B37459E60CC06C9A7C8C14DDFD59CF2CFC0A230DFEED79A61EF78FCB5F58170387EAE1E71F7349259A
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.3.6.4.0.9.7.3.0.8.4.1.3.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.3.6.4.0.9.7.6.3.8.1.0.0.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.5.e.3.1.8.a.2.-.7.8.b.b.-.4.3.6.7.-.b.3.2.2.-.2.a.0.a.a.e.e.6.f.5.d.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.d.4.f.e.9.6.3.-.c.d.c.2.-.4.c.1.e.-.8.8.d.6.-.7.3.1.d.5.a.e.e.5.b.7.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1...2...j.a.v.a.w...e.x.e...2.2.e.0.0.0.0...2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.4.8.-.0.0.0.1.-.0.0.1.c.-.e.e.9.0.-.4.7.c.4.0.2.e.e.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.c.4.9.c.8.6.c.a.b.9.5.e.7.6.6.2.d.e.d.8.0.3.a.3.f.1.0.6.b.3.f.0.0.0.0.f.f.f.f.!.0.0.0.0.e.b.2.c.4.1.7.a.2.9.d.2.f.0.8.e.3.7.d.6.3.f.3.b.7.5.c.d.c.6.1.b.4.2.8.5.5.e.9.1.!.1...2...j.a.v.a.w...e.x.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER78B9.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Dec 10 20:16:13 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):18362
    Entropy (8bit):2.343903676364738
    Encrypted:false
    SSDEEP:96:5y8iT8Q/VrODryOCxYyoi7kj9zCHubLBE/1Tk2flR2WntEWInWIX4I4ChWO9OY:niXVruryOCubOKzRLYlMWtBChWOoY
    MD5:EB0B539902398955A64EF6B0E07C3BAA
    SHA1:FD3BD62651A5166D74603F07C6AA1DFA680F510E
    SHA-256:2DD148793BA664BE56E3C5B2EB1DFC64796FF3E0E9B90556FCC844883F9ED593
    SHA-512:E42FE9230E408F4035816CBDE921509C712DBA0A0FC97F27FC6950EB2DB2856A3A1EE068F81EEC75E8F173DC046CEA018840785DF73C591724EAD058F4B5CA67
    Malicious:false
    Reputation:low
    Preview: MDMP....... ..........a............4........... ...<.......d...............T.......8...........T................>..........\...........H....................................................................U...........B..............GenuineIntelW...........T.......H......a.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B79.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8356
    Entropy (8bit):3.698609452578638
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiAkD60bv6YFASUUogmfgKbS5Cpr489bR5sfhbm:RrlsNiH646YCSUUogmfhS0RSfA
    MD5:216914B0B00EC2009D396AAAA7FFB323
    SHA1:F5F1BCEA1FD05CCCDF9E88EF7FD2504F0F372DA5
    SHA-256:0B0C307B0EFCDFB64C1CBEF95D904E66410A97C58BA088543A7DFAFA4CD976BD
    SHA-512:F1D563E56EB0A92F7A5C7BEA0081F4D39243AF20F91581A0D1D450220E485426712175A1B76F81B3FCD88DE52FB5355FAC0893FE4C7BCB268B3ACE608B27337B
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.8.4.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E68.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4654
    Entropy (8bit):4.469771708373248
    Encrypted:false
    SSDEEP:48:cvIwSD8zssJgtWI9HKzoWSC8B5y/8fm8M4Jij2mFoi+q8mWcc9osUd:uITfqFNSNGkJNiq9osUd
    MD5:C5A829051FB453E06999223896F7EAE8
    SHA1:49FDB57106FB64C6D32550E577BEC8A7A21A7FA4
    SHA-256:F52D469D5312316C025D55E6C2150CBED4C1BEA42E85D8020635372BCC0E85F9
    SHA-512:C45D9D45DE5953F1FF5DFB45A81A9B37775A37ADE198E8A20A66A8CFCE7C7C87A993510A530911B3C4D0D5009CF6D89328B8EF21266E07F0391D00461601E36E
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1292006" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
    C:\Windows\appcompat\Programs\Amcache.hve
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1572864
    Entropy (8bit):4.275800585591826
    Encrypted:false
    SSDEEP:12288:vvsTovxSsEMRpXQDqJzAeuJgpN1sSxkbTHJsuRdNo4s6fThgDuxSy:HsTovxSsEMRpXQ3E
    MD5:31FA34FBB33900F29147D20EF0DA77C0
    SHA1:E70D0DADA92800498655AFD85A7BE4E3A01964CE
    SHA-256:9BD63165253885AB98F8592689B127D2766FAA9E490A3ECB50E7086D1497A60D
    SHA-512:C52B3E0D58FD8E4656AB43DAF33B0121C8EA2B150ED6B098E38A7F1388DE15638C2F025F3F321D63A62814343A9B574B3BCAF9F6DAB17935A14E674214BF50FF
    Malicious:false
    Reputation:low
    Preview: regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm..r...................................................................................................................................................................................................................................................................................................................................................v.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Windows\appcompat\Programs\Amcache.hve.LOG1
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):24576
    Entropy (8bit):4.0023138344330675
    Encrypted:false
    SSDEEP:384:wJYX5Rftx1OPJ4XxZFFnQ7k9PBqXeSeq5QMVyiy+/1l4Lk4iZd1DoXzn+a8deV:wYJRftx10J4XTFFQ7KBqXleq5QMVyiy1
    MD5:C21D8691ED58E0FEA9BCF34504847DA0
    SHA1:69B0F3CAE2893150E8C21FE86AACAA0867C8F9A5
    SHA-256:986ADE1932FF0E7C06D04589D3222CC247E5345EFDE167682F2188D1DA7272B7
    SHA-512:C67FB1DA7DA1B3ADC6EAD421986CC53B7C19E995254B42E3140DF04B72A9C2DCDBF5FD486E383F31F46AD37E4F18CABF2A1AEB7AF705EB95A8DA5183D6861DD0
    Malicious:false
    Reputation:low
    Preview: regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm..r...................................................................................................................................................................................................................................................................................................................................................v.HvLE.^......Y...........C)..F..I!.5..J.j.........0................... ..hbin................p.\..,..........nk,...u..................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ...u......... ........................... .......Z.......................Root........lf......Root....nk ...u......................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):5.916588118656297
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:1.2.javaw.exe.22e0000.2.exe
    File size:58880
    MD5:c47bfe4e43d258b87c6cece9de90c89f
    SHA1:eb2c417a29d2f08e37d63f3b75cdc61b42855e91
    SHA256:f4d742d82698f532e0215832cb484619a4e84547d8a1ca8dc8f2e9f791a6f27d
    SHA512:e5fe932fc3245c68f846450db94459d69f992009667e2d9cc6e0ac520723ba9da558698948d596d18512afdfa554ce61dddafa1d0941cc7f3ab94b066885f57b
    SSDEEP:768:kg9fMhjuf6B6vgjloxr9EIz2y9Vn/uS4POG1GY5GMxzdAjNxc:klhiCB6gjyBEs3h4WG1lUMld4Nxc
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;.z.h.z.h.z.h...i.z.h...i.z.h...h.z.h.z.h.z.h=..i.z.h=..h.z.h=..i.z.hRich.z.h........................PE..L.....ga...........

    File Icon

    Icon Hash:00828e8e8686b000

    Static PE Info

    General

    Entrypoint:0x22e4a40
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x22e0000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
    DLL Characteristics:GUARD_CF, NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE
    Time Stamp:0x616701A9 [Wed Oct 13 15:56:25 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:

    Entrypoint Preview

    Instruction
    push 40000001h
    push dword ptr [ebp-0Ch]
    lea eax, dword ptr [ebp-00000210h]
    push eax
    call dword ptr [0040A074h]
    test eax, eax
    jne 00007FBB94D63111h
    push esi
    push eax
    call dword ptr [0040A184h]
    push eax
    call dword ptr [0040A188h]
    push 00000000h
    push 00000080h
    push 00000004h
    push 00000000h
    push 00000000h
    push C0000000h
    push 0040C028h
    call dword ptr [0040A1A0h]
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007FBB94D63176h
    push 00000000h
    lea ecx, dword ptr [ebp-000000C0h]
    push ecx
    push dword ptr [ebp-000000B8h]
    push dword ptr [ebp-000000BCh]
    push eax
    call dword ptr [0040A140h]
    push 0040A7C8h
    push 0040A81Ch
    push esi
    push 0040A830h
    push 0040A7C8h
    lea eax, dword ptr [ebp-00000310h]
    push 0040A844h
    push eax
    call dword ptr [0040A1D8h]
    add esp, 1Ch
    lea eax, dword ptr [ebp-00000310h]
    push eax
    call dword ptr [0040A09Ch]
    push 00000000h
    lea ecx, dword ptr [ebp-000000C0h]
    push ecx
    push eax
    lea eax, dword ptr [ebp-00000310h]
    push eax
    push dword ptr [ebp-1Ch]
    call dword ptr [0040A140h]
    mov eax, dword ptr [ebp-1Ch]
    push eax
    call dword ptr [0040A0D0h]

    Rich Headers

    Programming Language:
    • [IMP] VS2008 SP1 build 30729

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xa0.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x5d0.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xaba00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xa0000x1e0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x8f5f0x9000False0.487820095486data6.55103014538IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0xa0000x17400x1800False0.583821614583data5.73452393233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xc0000x9ec0x200False1.021484375data7.55445028361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .teslaX0xd0000x2e700x3000False0.223551432292data2.49418691917IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
    .rsrc0x100000x1e00x200False0.291015625data1.76481887066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x110000x5d00x600False0.303385416667data3.43918740047IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:12:16:08
    Start date:10/12/2021
    Path:C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\1.2.javaw.exe.22e0000.2.exe"
    Imagebase:0x22e0000
    File size:58880 bytes
    MD5 hash:C47BFE4E43D258B87C6CECE9DE90C89F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    General

    Start time:12:16:10
    Start date:10/12/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6984 -s 212
    Imagebase:0x890000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >