Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
N8QA5o2CZi.exe

Overview

General Information

Sample name:N8QA5o2CZi.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:dc3cd559dd94bb52d90c2e90fb8cc37db5894463ca25548d03c6d44bfbd9ad9e
Analysis ID:1446956
MD5:b33c05213c53b0e36b2b0bb2138a6dec
SHA1:49dd25a065ab5d5ca671ef9f2729d99b430e479e
SHA256:dc3cd559dd94bb52d90c2e90fb8cc37db5894463ca25548d03c6d44bfbd9ad9e
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
PE file has nameless sections
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • N8QA5o2CZi.exe (PID: 6432 cmdline: "C:\Users\user\Desktop\N8QA5o2CZi.exe" MD5: B33C05213C53B0E36B2B0BB2138A6DEC)
    • WerFault.exe (PID: 7072 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: N8QA5o2CZi.exeAvira: detected
Source: N8QA5o2CZi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: N8QA5o2CZi.exeString found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
Source: N8QA5o2CZi.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
Source: N8QA5o2CZi.exeString found in binary or memory: http://pki-ocsp.symauth.com0
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\N8QA5o2CZi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 232
Source: N8QA5o2CZi.exeStatic PE information: No import functions for PE file found
Source: N8QA5o2CZi.exe, 00000000.00000000.2063815579.0000000000A16000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameenigma.exeD$ vs N8QA5o2CZi.exe
Source: N8QA5o2CZi.exeBinary or memory string: OriginalFilenameenigma.exeD$ vs N8QA5o2CZi.exe
Source: N8QA5o2CZi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: N8QA5o2CZi.exeStatic PE information: Section: ZLIB complexity 0.9996995192307693
Source: N8QA5o2CZi.exeStatic PE information: Section: ZLIB complexity 0.9974724264705882
Source: classification engineClassification label: mal52.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6432
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\649e782c-4ff6-4f97-9ec5-7dfc2ae378efJump to behavior
Source: C:\Users\user\Desktop\N8QA5o2CZi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\N8QA5o2CZi.exe "C:\Users\user\Desktop\N8QA5o2CZi.exe"
Source: C:\Users\user\Desktop\N8QA5o2CZi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 232
Source: C:\Users\user\Desktop\N8QA5o2CZi.exeSection loaded: apphelp.dllJump to behavior
Source: N8QA5o2CZi.exeStatic file information: File size 2614784 > 1048576
Source: N8QA5o2CZi.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x226c00
Source: initial sampleStatic PE information: section where entry point is pointing to: .data
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name:
Source: N8QA5o2CZi.exeStatic PE information: section name: entropy: 7.995570049895089
Source: N8QA5o2CZi.exeStatic PE information: section name: entropy: 7.9839454948531365
Source: N8QA5o2CZi.exeStatic PE information: section name: entropy: 7.9256707926764856
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\N8QA5o2CZi.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
2
Software Packing
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1446956 Sample: N8QA5o2CZi Startdate: 24/05/2024 Architecture: WINDOWS Score: 52 10 Antivirus / Scanner detection for submitted sample 2->10 12 PE file has nameless sections 2->12 6 N8QA5o2CZi.exe 2->6         started        process3 process4 8 WerFault.exe 19 16 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
N8QA5o2CZi.exe100%AviraTR/Crypt.ZPACK.Gen2
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr0%URL Reputationsafe
http://pki-ocsp.symauth.com00%URL Reputationsafe
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl070%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.crN8QA5o2CZi.exefalse
  • URL Reputation: safe
unknown
http://pki-ocsp.symauth.com0N8QA5o2CZi.exefalse
  • URL Reputation: safe
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07N8QA5o2CZi.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1446956
Start date and time:2024-05-24 05:25:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 57s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:N8QA5o2CZi.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original Sample Name:dc3cd559dd94bb52d90c2e90fb8cc37db5894463ca25548d03c6d44bfbd9ad9e
Detection:MAL
Classification:mal52.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.65.92
  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • VT rate limit hit for: N8QA5o2CZi.exe
TimeTypeDescription
23:26:10API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6406405727113718
Encrypted:false
SSDEEP:96:IegFaxpWHs7gqqpCq/9lQXIDcQvc6QcEVcw3cE/H+HbHg6ZAX/d5FMT2SlPkpXmC:5gc+HygA0BU/AjEzuiFSZ24IO8y4
MD5:BF347C75B8C82B1C68DE0C4C375F322F
SHA1:29435C55B8D1BDA8A3B7F7D4A490CBCAC7BA7233
SHA-256:BD2DD03419BCE4939AB265CF9259C031C58CF54D02219F38602D03A8B052544D
SHA-512:A7524F0DAECB81B88F9F300E6B09CE581B3831ABC105649352477D57E4FDBD8BABBC03450CB4A09350DA8EBC79BB9B7BF19F3F0E3E9854D8917260677E2B9F4A
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.0.9.9.4.7.6.3.5.5.6.1.3.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.0.9.9.4.7.6.3.8.0.6.1.2.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.e.9.c.4.1.6.9.-.3.9.9.2.-.4.d.f.2.-.a.d.f.1.-.4.4.3.e.4.8.6.e.4.b.c.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.3.3.3.0.e.2.0.-.0.3.d.c.-.4.3.7.e.-.b.0.4.2.-.6.8.1.c.3.f.0.8.a.6.1.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.8.Q.A.5.o.2.C.Z.i...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.e.n.i.g.m.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.2.0.-.0.0.0.1.-.0.0.1.5.-.f.0.1.3.-.1.0.1.b.8.a.a.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.0.c.1.5.c.5.c.3.c.5.c.7.7.1.5.0.c.8.b.c.1.e.a.6.b.7.6.d.c.c.4.0.0.0.0.0.9.0.4.!.0.0.0.0.4.9.d.d.2.5.a.0.6.5.a.b.5.d.5.c.a.6.7.1.e.f.9.f.2.7.2.9.d.9.9.b.4.3.0.e.4.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri May 24 03:26:03 2024, 0x1205a4 type
Category:dropped
Size (bytes):19228
Entropy (8bit):2.090852720477205
Encrypted:false
SSDEEP:96:5C84k25i6dCrQi7n9VYtWsRO90rKVkjS68LWx4WqmcuWIkWItoI4ggbh:XNGCrQO9CtWsRfggbh
MD5:A9E13AF858FA52B0B20A16D5A307E536
SHA1:EED49FFB251C798D14F1388D32D4001364201BB5
SHA-256:EA496572414907AA6F7B2FF7065B7B0F5B5247E26617DC7091FEFCFEF51837FD
SHA-512:C109F841B90225AA2CBB050EBED70362BF2C56E897791B0E201A6492080BBE28BE54609625CCD75DB72929FC52F2B6801628C434CCB6E36E4FE0727914AC5786
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Pf............4...............<.......T...............T.......8...........T................A......................................................................................................eJ......L.......GenuineIntel............T....... .....Pf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8308
Entropy (8bit):3.69610312695637
Encrypted:false
SSDEEP:192:R6l7wVeJUU6q076Y2DuSU9b3gmfScprp89b5YsfBzm:R6lXJ/6q076YjSU9b3gmfS/5LfY
MD5:7F5360716FA5D6123A4786C7195F1F41
SHA1:8505069C3D5BDFCE484ADAE8088B5F1EA677B35F
SHA-256:40EA545C27AE364A48B1A25C331BA9100689A6DFDD5D0927D6A3C49709A5D059
SHA-512:6EC14108609B6F478C7AAC811999484D0867F658D8778879C9D4CB9C531DEF6651F7951BCAC201873F8BBB20047D66DFF0390DC49F47DF02EEE34CE4D75DAE8A
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.3.2.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4645
Entropy (8bit):4.47566632901084
Encrypted:false
SSDEEP:48:cvIwWl8zsWJg77aI9XC9WpW8VYdPYm8M4J3LYdFVF+q8lgUmRkbvResHd:uIjfsI7dCM7VRJ70kwRYJesHd
MD5:8E7EA786C869D9C658B7AF775F901D71
SHA1:A757BF36833C0713CDC50AD9B137CB15E725E056
SHA-256:967DFBAB2852F079057E76C009707999A78B4919A9A2545B65AB51AB92F9ED0E
SHA-512:2A6AE9D8B173A455C4034546676D6B5B7BDFFF62A311C04174E24C55E91C0EFC8FB0114CEDA1479D0D39440FC2A200838B2CC63173441073F90274BA87366710
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="336628" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.468768602077101
Encrypted:false
SSDEEP:6144:rzZfpi6ceLPx9skLmb0fLZWSP3aJG8nAgeiJRMMhA2zX4WABluuN7jDH5S:HZHtLZWOKnMM6bFpVj4
MD5:CD928B522B256ECB8C4DE9F177870F37
SHA1:BE5A1F0157D235BF35EE2CBD9BDD441F39DF7E39
SHA-256:AC292B174B97FEBD1BC0B9ED159F7DAA3614B4EECEC56DFCBBB08082C59FC1D4
SHA-512:93D6F605BCEA39B69422245B842852CE01A75448041EB60B5327E8481127694C5778384C306B297F7438B6E6F4BAB9A10EC7A018CFACFD6E41A3C97C0F4C9BFE
Malicious:false
Reputation:low
Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.yA...................................................................................................................................................................................................................................................................................................................................................V/........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.969767476455621
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:N8QA5o2CZi.exe
File size:2'614'784 bytes
MD5:b33c05213c53b0e36b2b0bb2138a6dec
SHA1:49dd25a065ab5d5ca671ef9f2729d99b430e479e
SHA256:dc3cd559dd94bb52d90c2e90fb8cc37db5894463ca25548d03c6d44bfbd9ad9e
SHA512:5eb244141bbc05c722419732df3abc346d8ff7f6163015b2d6706028a4f2c305edd85badce076f47ac6582e02e281c6488007a2a0414c5f89a8f8d98ad2e905d
SSDEEP:49152:l9wy1zb37wq+3GQQvFOsAMSgcCNvQE5qh4OLzooa2ZgEPmBTI7pJLOjq5:Iy1/7wq+36FBLNvQvm9n2Zm1wp9Om
TLSH:D9C52281C3C651E2E9EBECB0C7694510B8949E5D053F3DB98A91FCA51D772F3B4222CA
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;^f.h^f.h^f.h1..hPf.h1.2h.f.hW..h[f.hW..hNf.h...i]f.h^f.h%f.h1.3huf.h1..h_f.hRich^f.h................PE..L.....Gf...........
Icon Hash:a592a1a0a1a1b131
Entrypoint:0x1001a58
Entrypoint Section:.data
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
Time Stamp:0x6647AE82 [Fri May 17 19:22:42 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:
Instruction
mov dl, ACh
jmp 00007FE0F4E9AEDEh
sbb bl, ch
mov word ptr [esi+ebx*4], ds
mov ebx, CE7BB5AAh
push es
adc al, 69h
lodsd
jbe 00007FE0F4E9AEF3h
pop eax
cwde
leave
sbb al, 86h
push esp
daa
mov dl, 98h
inc esp
adc al, F6h
daa
sub al, 12h
dec ebp
mov dl, 45h
retf 1458h
jmp 00007FE0F4E9AECDh
sub eax, 387E679Dh
mov ebp, edx
cli
mov edx, AF28EB3Ch
sbb eax, 153328D1h
pop ds
cmp eax, FBAEB592h
pop edi
in al, dx
daa
pop eax
sbb edi, dword ptr [esi+esi*8-01FE8D3Bh]
jnl 00007FE0F4E9AEF5h
xor al, 3Eh
adc eax, 9428546Eh
dec ecx
movsd
push ss
Programming Language:
  • [ASM] VS2010 build 30319
  • [ C ] VS2010 build 30319
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [C++] VS2010 build 30319
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x9f00200xcb3.data
IMAGE_DIRECTORY_ENTRY_IMPORT0x9f0cd40x2b0.data
IMAGE_DIRECTORY_ENTRY_RESOURCE0x2460000x10d08.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x9f00000xc.data
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x10000x210000xd0007085e8bc50a933f066377bec258f05e5False0.9996995192307693data7.995570049895089IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x220000xc0000x440090d9f80a9d70ad73e861a49657148515False0.9974724264705882data7.9839454948531365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x2e0000x2130000x6002c994bbe8585edac16fd09361a94d077unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x2410000x50000x26002b34648d0a78409d69d35e6a548635f0False0.9787212171052632OpenPGP Secret Key7.9256707926764856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x2460000x10d080x10e00444bcca9ac780c4aa0ba2db751f9d414False0.041333912037037034data3.862317912934636IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x2570000x7960000x328002ea36b2cc01426c06bd1db9d571fbae9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.data0x9ed0000x2270000x226c009e76837f33b0a533f88814a6c9d02c4funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x2461040x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.033789778776765644
RT_GROUP_ICON0x25692c0x14data1.15
RT_VERSION0x2569400x3c8dataEnglishUnited States0.43491735537190085
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:23:26:03
Start date:23/05/2024
Path:C:\Users\user\Desktop\N8QA5o2CZi.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\N8QA5o2CZi.exe"
Imagebase:0x7d0000
File size:2'614'784 bytes
MD5 hash:B33C05213C53B0E36B2B0BB2138A6DEC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:23:26:03
Start date:23/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 232
Imagebase:0x9b0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly