Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
olPUTAxpzu.exe

Overview

General Information

Sample Name:olPUTAxpzu.exe
Analysis ID:612097
MD5:8a0e3e9d2d00b456539face1b95f5e49
SHA1:a3e08ca002b4046da36c1d05f079db9ccba567ff
SHA256:1e9a3a5e2e8da03cb6949e0aa8c169c3e095a7144ac74d87a74450faa83f027d
Tags:32exetrojan
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Hides threads from debuggers
Tries to detect sandboxes and other dynamic analysis tools (window names)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Machine Learning detection for sample
PE file contains section with special chars
Sample file is different than original file name gathered from version info
One or more processes crash
PE file contains an invalid checksum
PE file contains strange resources
Checks if the current process is being debugged
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Launches processes in debugging mode, may be used to hinder debugging
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections

Classification

  • System is w10x64
  • olPUTAxpzu.exe (PID: 6200 cmdline: "C:\Users\user\Desktop\olPUTAxpzu.exe" MD5: 8A0E3E9D2D00B456539FACE1B95F5E49)
    • WerFault.exe (PID: 6644 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 6776 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: olPUTAxpzu.exeAvira: detected
Source: olPUTAxpzu.exeVirustotal: Detection: 50%Perma Link
Source: olPUTAxpzu.exeReversingLabs: Detection: 61%
Source: olPUTAxpzu.exeJoe Sandbox ML: detected
Source: Binary string: PresentationFramework.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.pdbT source: WER7448.tmp.dmp.7.dr
Source: Binary string: sBase.pdbX source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdbRSDSD source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: [ .pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: WindowsBase.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: WindowsBase.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: (Psf8C:\Windows\WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Configuration.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xml.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: symbols\dll\WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdbRSDS~J source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.291324703.0000000000CA4000.00000004.00000020.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000002.313020359.0000000000CA4000.00000004.00000020.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275874108.0000000000CA4000.00000004.00000020.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xaml.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: mscorlib.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xaml.ni.pdbRSDS| source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.Aero2.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationCore.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xaml.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.Aero2.ni.pdbRSDSl source: WER7448.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.Aero2.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Core.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: WindowsBase.pdbwsBase.pdbpdbase.pdbSIL\WindowsBase\v4.0_4.0.0.0__31bf3856ad364e35\WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: Z:\Oreans Projects\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: olPUTAxpzu.exe, 00000000.00000002.314558433.00000000016EA000.00000040.00000001.01000000.00000003.sdmp, olPUTAxpzu.exe, 00000000.00000000.292688684.00000000016EA000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationCore.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/Login.xaml
Source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/bhicon.png
Source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/Login.xaml
Source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/bhicon.png
Source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/login.baml
Source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bhicon.png
Source: olPUTAxpzu.exeString found in binary or memory: http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07
Source: olPUTAxpzu.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
Source: olPUTAxpzu.exeString found in binary or memory: http://pki-ocsp.symauth.com0
Source: olPUTAxpzu.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: olPUTAxpzu.exeString found in binary or memory: http://s.symcd.com06
Source: olPUTAxpzu.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: olPUTAxpzu.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: olPUTAxpzu.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/Driver/Driver1.8_x64.sys
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/Online/get_online_users.php?username=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/Online/set_online_status.php?username=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/info/cheat_status.php?hack_id=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_authentification_new.php?username=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_cheat_info_ex.php?index=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_get_cheats.php?username=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_statut_new.php
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_version.php
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/notification.txt
Source: olPUTAxpzu.exeString found in binary or memory: https://brutal-hax.net/
Source: olPUTAxpzu.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: olPUTAxpzu.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: olPUTAxpzu.exeString found in binary or memory: https://d.symcb.com/rpa0.
Source: olPUTAxpzu.exeString found in binary or memory: https://discord.gg/brutal-hax
Source: olPUTAxpzu.exeString found in binary or memory: https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/

System Summary

barindex
Source: olPUTAxpzu.exeStatic PE information: section name:
Source: olPUTAxpzu.exeStatic PE information: section name:
Source: olPUTAxpzu.exeStatic PE information: section name:
Source: olPUTAxpzu.exe, 00000000.00000000.277455806.00000000016C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBHLoaderNew.exe8 vs olPUTAxpzu.exe
Source: olPUTAxpzu.exe, 00000000.00000000.292666429.00000000016E0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBHLoaderNew.exe8 vs olPUTAxpzu.exe
Source: olPUTAxpzu.exeBinary or memory string: OriginalFilenameBHLoaderNew.exe8 vs olPUTAxpzu.exe
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
Source: olPUTAxpzu.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: olPUTAxpzu.exeStatic PE information: Section: ZLIB complexity 0.997523986382
Source: olPUTAxpzu.exeStatic PE information: Section: ZLIB complexity 1.53333333333
Source: olPUTAxpzu.exeStatic PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
Source: olPUTAxpzu.exeVirustotal: Detection: 50%
Source: olPUTAxpzu.exeReversingLabs: Detection: 61%
Source: C:\Users\user\Desktop\olPUTAxpzu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\olPUTAxpzu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: unknownProcess created: C:\Users\user\Desktop\olPUTAxpzu.exe "C:\Users\user\Desktop\olPUTAxpzu.exe"
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
Source: C:\Users\user\Desktop\olPUTAxpzu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5FDD51E2-A9D0-44CE-8C8D-162BA0C591A0}\InprocServer32
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6200
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER7448.tmpJump to behavior
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_statut_new.php
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_authentification_new.php?username=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_version.php
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_get_cheats.php?username=
Source: olPUTAxpzu.exeString found in binary or memory: https://api.brutal-hax.net/loader_cheat_info_ex.php?index=
Source: classification engineClassification label: mal80.evad.winEXE@5/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\olPUTAxpzu.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: olPUTAxpzu.exeStatic file information: File size 9184276 > 1048576
Source: olPUTAxpzu.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x58b200
Source: olPUTAxpzu.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x313400
Source: Binary string: PresentationFramework.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.pdbT source: WER7448.tmp.dmp.7.dr
Source: Binary string: sBase.pdbX source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdbRSDSD source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: [ .pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: WindowsBase.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: WindowsBase.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: (Psf8C:\Windows\WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Configuration.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xml.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: symbols\dll\WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdbRSDS~J source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.291324703.0000000000CA4000.00000004.00000020.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000002.313020359.0000000000CA4000.00000004.00000020.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275874108.0000000000CA4000.00000004.00000020.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xaml.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: mscorlib.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xaml.ni.pdbRSDS| source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.Aero2.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationCore.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Xaml.pdb source: olPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.Aero2.ni.pdbRSDSl source: WER7448.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.Aero2.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.Core.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: WindowsBase.pdbwsBase.pdbpdbase.pdbSIL\WindowsBase\v4.0_4.0.0.0__31bf3856ad364e35\WindowsBase.pdb source: olPUTAxpzu.exe, 00000000.00000002.312077698.0000000000938000.00000004.00000010.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.275456598.0000000000938000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: Z:\Oreans Projects\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: olPUTAxpzu.exe, 00000000.00000002.314558433.00000000016EA000.00000040.00000001.01000000.00000003.sdmp, olPUTAxpzu.exe, 00000000.00000000.292688684.00000000016EA000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationFramework.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: PresentationCore.pdb source: WER7448.tmp.dmp.7.dr
Source: Binary string: System.ni.pdb source: WER7448.tmp.dmp.7.dr
Source: olPUTAxpzu.exeStatic PE information: real checksum: 0x8c502e should be: 0x8c35cf
Source: olPUTAxpzu.exeStatic PE information: section name:
Source: olPUTAxpzu.exeStatic PE information: section name:
Source: olPUTAxpzu.exeStatic PE information: section name:
Source: olPUTAxpzu.exeStatic PE information: section name: .imports
Source: olPUTAxpzu.exeStatic PE information: section name: .themida
Source: olPUTAxpzu.exeStatic PE information: section name: .boot
Source: olPUTAxpzu.exeStatic PE information: section name: .taggant
Source: olPUTAxpzu.exeStatic PE information: 0xA8C7FB17 [Thu Sep 25 01:17:11 2059 UTC]
Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
Source: initial sampleStatic PE information: section name: .taggant entropy: 6.83505846314
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\olPUTAxpzu.exeSystem information queried: FirmwareTableInformation
Source: C:\Users\user\Desktop\olPUTAxpzu.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\Desktop\olPUTAxpzu.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Users\user\Desktop\olPUTAxpzu.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Users\user\Desktop\olPUTAxpzu.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Users\user\Desktop\olPUTAxpzu.exeSystem information queried: ModuleInformation

Anti Debugging

barindex
Source: C:\Users\user\Desktop\olPUTAxpzu.exeThread information set: HideFromDebugger
Source: C:\Users\user\Desktop\olPUTAxpzu.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\olPUTAxpzu.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\olPUTAxpzu.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\olPUTAxpzu.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\olPUTAxpzu.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\olPUTAxpzu.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess queried: DebugObjectHandle
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
Source: C:\Users\user\Desktop\olPUTAxpzu.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\olPUTAxpzu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
Source: C:\Users\user\Desktop\olPUTAxpzu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
Path Interception11
Process Injection
32
Virtualization/Sandbox Evasion
OS Credential Dumping42
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Disable or Modify Tools
LSASS Memory32
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
Process Injection
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common2
Obfuscated Files or Information
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
olPUTAxpzu.exe50%VirustotalBrowse
olPUTAxpzu.exe62%ReversingLabsWin32.Trojan.Emotet
olPUTAxpzu.exe100%AviraHEUR/AGEN.1211770
olPUTAxpzu.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.brutal-hax.net/notification.txt0%Avira URL Cloudsafe
https://api.brutal-hax.net/Online/get_online_users.php?username=0%Avira URL Cloudsafe
https://api.brutal-hax.net/loader_authentification_new.php?username=0%Avira URL Cloudsafe
https://api.brutal-hax.net/loader_statut_new.php0%Avira URL Cloudsafe
http://pki-ocsp.symauth.com00%URL Reputationsafe
https://api.brutal-hax.net/Driver/Driver1.8_x64.sys0%Avira URL Cloudsafe
https://discord.gg/brutal-hax0%Avira URL Cloudsafe
http://foo/bhicon.png0%Avira URL Cloudsafe
http://defaultcontainer/Login.xaml0%Avira URL Cloudsafe
https://api.brutal-hax.net/loader_cheat_info_ex.php?index=0%Avira URL Cloudsafe
https://api.brutal-hax.net/loader_get_cheats.php?username=0%Avira URL Cloudsafe
https://brutal-hax.net/0%Avira URL Cloudsafe
http://defaultcontainer/bhicon.png0%Avira URL Cloudsafe
http://foo/bar/bhicon.png0%Avira URL Cloudsafe
https://api.brutal-hax.net/loader_version.php0%Avira URL Cloudsafe
http://foo/bar/login.baml0%Avira URL Cloudsafe
https://api.brutal-hax.net/Online/set_online_status.php?username=0%Avira URL Cloudsafe
https://api.brutal-hax.net/info/cheat_status.php?hack_id=0%Avira URL Cloudsafe
http://foo/Login.xaml0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://api.brutal-hax.net/notification.txtolPUTAxpzu.exefalse
  • Avira URL Cloud: safe
unknown
https://api.brutal-hax.net/Online/get_online_users.php?username=olPUTAxpzu.exefalse
  • Avira URL Cloud: safe
unknown
https://api.brutal-hax.net/loader_authentification_new.php?username=olPUTAxpzu.exefalse
  • Avira URL Cloud: safe
unknown
https://api.brutal-hax.net/loader_statut_new.phpolPUTAxpzu.exefalse
  • Avira URL Cloud: safe
unknown
https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/olPUTAxpzu.exefalse
    high
    http://pki-ocsp.symauth.com0olPUTAxpzu.exefalse
    • URL Reputation: safe
    unknown
    https://api.brutal-hax.net/Driver/Driver1.8_x64.sysolPUTAxpzu.exefalse
    • Avira URL Cloud: safe
    unknown
    https://discord.gg/brutal-haxolPUTAxpzu.exefalse
    • Avira URL Cloud: safe
    unknown
    http://foo/bhicon.pngolPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    http://defaultcontainer/Login.xamlolPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    https://api.brutal-hax.net/loader_cheat_info_ex.php?index=olPUTAxpzu.exefalse
    • Avira URL Cloud: safe
    unknown
    http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crolPUTAxpzu.exefalse
      high
      https://api.brutal-hax.net/loader_get_cheats.php?username=olPUTAxpzu.exefalse
      • Avira URL Cloud: safe
      unknown
      https://brutal-hax.net/olPUTAxpzu.exefalse
      • Avira URL Cloud: safe
      unknown
      http://defaultcontainer/bhicon.pngolPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://foo/bar/bhicon.pngolPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      https://api.brutal-hax.net/loader_version.phpolPUTAxpzu.exefalse
      • Avira URL Cloud: safe
      unknown
      http://foo/bar/login.bamlolPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      https://api.brutal-hax.net/Online/set_online_status.php?username=olPUTAxpzu.exefalse
      • Avira URL Cloud: safe
      unknown
      https://api.brutal-hax.net/info/cheat_status.php?hack_id=olPUTAxpzu.exefalse
      • Avira URL Cloud: safe
      unknown
      http://foo/Login.xamlolPUTAxpzu.exe, 00000000.00000002.318900716.0000000003BA1000.00000004.00000800.00020000.00000000.sdmp, olPUTAxpzu.exe, 00000000.00000000.295892013.0000000003BA1000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07olPUTAxpzu.exefalse
        high
        No contacted IP infos
        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:612097
        Start date and time: 20/04/202215:15:332022-04-20 15:15:33 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 45s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:olPUTAxpzu.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:31
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal80.evad.winEXE@5/4@0/0
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Adjust boot time
        • Enable AMSI
        • Sleeps bigger than 120000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 20.42.65.92
        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
        • Execution Graph export aborted for target olPUTAxpzu.exe, PID 6200 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):1.1850838898801865
        Encrypted:false
        SSDEEP:192:4w4MQwkegQjHBUZMXAjAJRIlYDNgH/u7szS274It1z:ztvjBUZMXAj/jH/u7szX4It1
        MD5:BD6685535B5226C37AAD3732C658DFF1
        SHA1:32D804218D5B61C65B15B80C9B53F0F8F56CACCB
        SHA-256:7D2F4BA8B171830ABC25A2DDBEB8789135FC83D094E06F46E3A58891FA0A1918
        SHA-512:5A5CA6138A46A745EEEB422B84BFC33F77F4E73768E59F1F758EF164D4D5ECED5F840CD7F94CF9E61B320402873852210D404E1B9138E16A49FFB3CE997C97E5
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.4.9.3.4.2.2.6.8.1.0.8.3.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.4.9.3.4.2.3.0.5.6.0.7.9.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.a.2.b.c.7.3.3.-.2.6.f.f.-.4.2.a.4.-.9.9.1.9.-.f.e.c.a.f.3.1.f.1.1.c.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.a.4.9.0.9.6.-.3.8.9.7.-.4.9.9.1.-.b.5.4.b.-.7.9.9.e.f.b.2.3.1.0.8.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.o.l.P.U.T.A.x.p.z.u...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.H.L.o.a.d.e.r.N.e.w...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.3.8.-.0.0.0.1.-.0.0.1.c.-.d.6.0.1.-.f.1.e.1.b.8.5.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.1.4.0.f.e.a.1.4.1.b.9.7.2.5.4.d.0.d.b.2.e.f.8.2.d.5.6.2.7.3.3.0.0.0.0.0.0.0.0.!.0.0.0.0.a.3.e.0.8.c.a.0.0.2.b.4.0.4.6.d.a.3.6.c.1.d.0.5.f.0.7.9.d.b.9.c.c.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Wed Apr 20 13:17:08 2022, 0x1205a4 type
        Category:dropped
        Size (bytes):326486
        Entropy (8bit):4.8953049797729715
        Encrypted:false
        SSDEEP:6144:oWkVlK2jf5dtBOBj0jpvwYR2cBmTjmj0l9RpDz0Nfi:AHUB+JylP1
        MD5:634D852419BA16B587083BE0F5A77F27
        SHA1:F1A09C4673B8A10AC4BF54BF0B30867F8E6E31E0
        SHA-256:1A640D47B226F126DED3166CC1C23E0D42DB12C2F52C647871EA809DB896B42A
        SHA-512:685E5E0F086ED47F6E81CC67687F67D653D70A9BD56445DA7E9B41EBF79DBEA6D77E5CFF05A9DEBE9FE1A1BD607D92668640DEDEC59AE75DBCD047DC53435A5F
        Malicious:false
        Reputation:low
        Preview:MDMP....... .........`b............T...............\.......4L...D..........T.......8...........T............2..~............"...........$...................................................................U...........B......x%......GenuineIntelW...........T.......8.....`b.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
        Category:dropped
        Size (bytes):8436
        Entropy (8bit):3.700375948158607
        Encrypted:false
        SSDEEP:192:Rrl7r3GLNiBy6P6Y47SUycINGgmfZAhSm+prRZ89bjpsfhqhm:RrlsNik6P6YESUycLgmf6hSzWjCfj
        MD5:D947C4596F2FF26F9DB53BE24073E6A7
        SHA1:921C3C08B670571B86121FBF373424A8A0E24F65
        SHA-256:C72A231B106234AB7F86E14CB570D42D4041729B83C1CB451926E9493EC8549E
        SHA-512:F1BD08D6A4803FE078C34574B95F3E2BCD37CEF29FC7028D68ABE6DF9BB5A53A8A631F51656CEDCC6BDD2D69D045FD911D18926F925D825B300E15818BFCABA0
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.0.0.<./.P.i.d.>.......
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4789
        Entropy (8bit):4.5259131608322045
        Encrypted:false
        SSDEEP:48:cvIwSD8zs8JgtWI9jkJkWgc8sqYj/8fm8M4J5vFBk+q8vRiby+n/d:uITf6vJ9grsqYAJJkKwbyS/d
        MD5:3E89A887DF247E266DC4974299D088B6
        SHA1:DA5FE60EBE91C1DB1AB3C03AE795FFA382EED3DC
        SHA-256:81780725A73520AE2862ACBFC6279236133172A2F7A45A74A6B96B0EC895E6FE
        SHA-512:DBD4C1CEA4BEFEF63F48D8EDC36809A79DEB46FFF2DCB611251C27B7E6D3E3D8D25FD836CB9E535B5A843033013FE129328F3CD6CE70F041827F4FEFB941D5DC
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1480227" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.977228853039723
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:olPUTAxpzu.exe
        File size:9184276
        MD5:8a0e3e9d2d00b456539face1b95f5e49
        SHA1:a3e08ca002b4046da36c1d05f079db9ccba567ff
        SHA256:1e9a3a5e2e8da03cb6949e0aa8c169c3e095a7144ac74d87a74450faa83f027d
        SHA512:d35530bdfa27a2164221ee042a040184c61a05caf631b0545e414dbd12925031c682933e509220aa68f05243f06a70e74188b29a707d1cac5e5178db92f537b7
        SSDEEP:196608:k1E3uOIPaV+mW+8w7802hv0ZFoj7J0U53jSXINWe/jgz:XVma6+8Ku0bwJ0U5zIIFji
        TLSH:5696334A2631A528C3DA3F30AEA7C37326764C1FD5223D4A259AFDEF71674C4E825319
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...X..........@... ....X...@.. ...............................P....`................................
        Icon Hash:a6d2d4d294b6b200
        Entrypoint:0x1224000
        Entrypoint Section:.taggant
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, HIGH_ENTROPY_VA
        Time Stamp:0xA8C7FB17 [Thu Sep 25 01:17:11 2059 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:4328f7206db519cd4e82283211d98e83
        Instruction
        jmp 00007F3310DE3A4Ah
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x5ac03a0x50.imports
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ae0000x1ba68.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        0x20000x58c0000x58b200unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        0x58e0000x1ba6c0x5859False0.997523986382data7.94073553338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        0x5aa0000xc0xfFalse1.53333333333data3.90689059561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .imports0x5ac0000x20000x200False0.16796875data1.14864242974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0x5ae0000x1bc000x1bc00False0.199394707207data3.11295029714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .themida0x5ca0000x5460000x0unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .boot0xb100000x3134000x313400unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .taggant0xe240000x22000x2014False0.596931320019DOS executable (COM)6.83505846314IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x5ae1a00x21eePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
        RT_ICON0x5b03a00x10828dBase III DBT, version number 0, next free block index 40
        RT_ICON0x5c0bd80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
        RT_ICON0x5c4e100x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
        RT_ICON0x5c73c80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
        RT_ICON0x5c84800x468GLS_BINARY_LSB_FIRST
        RT_GROUP_ICON0x5c88f80x5adata
        RT_VERSION0x5c89640x32cdata
        RT_MANIFEST0x5c8ca00xdc7XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminatorsEnglishUnited States
        DLLImport
        kernel32.dllGetModuleHandleA
        mscoree.dll_CorExeMain
        DescriptionData
        Translation0x0000 0x04b0
        LegalCopyrightCopyright 2022
        Assembly Version1.0.0.0
        InternalNameBHLoaderNew.exe
        FileVersion1.0.0.0
        CompanyName
        LegalTrademarks
        Comments
        ProductNameBHLoaderNew
        ProductVersion1.0.0.0
        FileDescriptionBHLoaderNew
        OriginalFilenameBHLoaderNew.exe
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Target ID:0
        Start time:15:16:45
        Start date:20/04/2022
        Path:C:\Users\user\Desktop\olPUTAxpzu.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\olPUTAxpzu.exe"
        Imagebase:0x1120000
        File size:9184276 bytes
        MD5 hash:8A0E3E9D2D00B456539FACE1B95F5E49
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:low

        Target ID:7
        Start time:15:17:04
        Start date:20/04/2022
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
        Imagebase:0x90000
        File size:434592 bytes
        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:high

        Target ID:9
        Start time:15:17:06
        Start date:20/04/2022
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
        Imagebase:0x90000
        File size:434592 bytes
        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        No disassembly