Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qbVhybtzOG.exe

Overview

General Information

Sample name:qbVhybtzOG.exe
renamed because original name is a hash value
Original sample name:afc8afc8cf5e261af6001df196a43038.bin.exe
Analysis ID:1447598
MD5:afc8afc8cf5e261af6001df196a43038
SHA1:f2e2103d1d687b8c5bb2759d1d2bda98bc8d5e2a
SHA256:33ac176455137bb97a4982fd4793efb0914e6d5621e947b7e5d0f701132d4bd0
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

  • System is w10x64
  • qbVhybtzOG.exe (PID: 7016 cmdline: "C:\Users\user\Desktop\qbVhybtzOG.exe" MD5: AFC8AFC8CF5E261AF6001DF196A43038)
    • WerFault.exe (PID: 7152 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7016 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: qbVhybtzOG.exeAvira: detected
Source: qbVhybtzOG.exeReversingLabs: Detection: 81%
Source: qbVhybtzOG.exeVirustotal: Detection: 70%Perma Link
Source: qbVhybtzOG.exeJoe Sandbox ML: detected
Source: qbVhybtzOG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\qbVhybtzOG.exeCode function: 0_2_0040A29E0_2_0040A29E
Source: C:\Users\user\Desktop\qbVhybtzOG.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7016 -s 232
Source: qbVhybtzOG.exeStatic PE information: No import functions for PE file found
Source: qbVhybtzOG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7016
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7e6a3e14-86f1-44dd-a871-7d7fc49a3deaJump to behavior
Source: C:\Users\user\Desktop\qbVhybtzOG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: qbVhybtzOG.exeReversingLabs: Detection: 81%
Source: qbVhybtzOG.exeVirustotal: Detection: 70%
Source: unknownProcess created: C:\Users\user\Desktop\qbVhybtzOG.exe "C:\Users\user\Desktop\qbVhybtzOG.exe"
Source: C:\Users\user\Desktop\qbVhybtzOG.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7016 -s 232
Source: C:\Users\user\Desktop\qbVhybtzOG.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .stirkj
Source: qbVhybtzOG.exeStatic PE information: section name: .mtqxyn
Source: qbVhybtzOG.exeStatic PE information: section name: .stirkj
Source: qbVhybtzOG.exeStatic PE information: section name: .qbelid
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\qbVhybtzOG.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
qbVhybtzOG.exe82%ReversingLabsWin32.Trojan.Zeus
qbVhybtzOG.exe70%VirustotalBrowse
qbVhybtzOG.exe100%AviraTR/Crypt.XPACK.Gen
qbVhybtzOG.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447598
Start date and time:2024-05-26 02:30:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:qbVhybtzOG.exe
renamed because original name is a hash value
Original Sample Name:afc8afc8cf5e261af6001df196a43038.bin.exe
Detection:MAL
Classification:mal60.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 104.208.16.94
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
  • Execution Graph export aborted for target qbVhybtzOG.exe, PID 7016 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
20:31:20API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6332675682991193
Encrypted:false
SSDEEP:96:qTvFsq59Rsdhz/7OfYQXIDcQvc6QcEVcw3cE/P+HbHg6ZAX/d5FMT2SlPkpXmTAM:evp59R50BU/IjEzuiFLZ24IO8X
MD5:3729E5AB9B2E6C6C1CC948212D841E1C
SHA1:AC0506F408F2C711E868E66F98B9F9DE78F7E87B
SHA-256:DF50894B78CFB042190A2F6CB4266A288AF7245F498BD324B06D6A3F7816B520
SHA-512:79A7212BE3F8081A528C58F927BDAC092452FEFC66E0CC7317EACC1C00D7FA60867D59CE28DE68E7DF9E5F42C6285DDAB45799D978CBB2823336014872DC85BD
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.1.5.7.0.5.6.8.9.6.1.5.5.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.1.5.7.0.5.7.2.0.8.6.5.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.7.3.c.6.3.a.-.c.a.b.2.-.4.8.a.1.-.8.d.5.a.-.f.d.0.2.1.d.7.9.a.6.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.9.a.4.c.a.4.-.3.a.d.1.-.4.d.b.d.-.8.c.5.5.-.6.9.a.0.f.0.1.a.f.b.b.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.q.b.V.h.y.b.t.z.O.G...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.6.8.-.0.0.0.1.-.0.0.1.4.-.2.8.2.5.-.6.1.f.9.0.3.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.a.8.0.0.9.3.3.9.7.b.a.2.6.9.9.f.b.d.c.3.6.d.d.4.6.4.e.3.7.2.0.0.0.0.f.f.f.f.!.0.0.0.0.f.2.e.2.1.0.3.d.1.d.6.8.7.b.8.c.5.b.b.2.7.5.9.d.1.d.2.b.d.a.9.8.b.c.8.d.5.e.2.a.!.q.b.V.h.y.b.t.z.O.G...e.x.e.....T.a.r.g.e.t.A.p.p.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun May 26 00:30:56 2024, 0x1205a4 type
Category:dropped
Size (bytes):18760
Entropy (8bit):1.9939886016444521
Encrypted:false
SSDEEP:96:5J8Lp6CQRUn59MSi7nOMvqTy7FLcNzwEWIkWI/0I478uOpy3:8csn5FOSCFLCj78/py
MD5:261208FEAF609793C3EE08808806CE35
SHA1:8D7B5C0A9E01F9C18C557684B6855482194AE81E
SHA-256:1E82A7031D315E15938FEC5438C810E3D0EF56A1FBB1B5AD8E817AB904E8B5FE
SHA-512:D3AEACA3590E60E04E3579E86E53B3831AA64F7FC805462C72015F703891A714D6A5F5D0E71E8BD410AE9A7BE173C28FD14BC1B86FFB58216779AC516AD5A377
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Rf............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T.......h.....Rf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8282
Entropy (8bit):3.6988107583710317
Encrypted:false
SSDEEP:192:R6l7wVeJhT6JZ6Y9ZSU9yEgmfjRpr+89bXcsfQR9m:R6lXJF6JZ6YzSU9yEgmfj7XvfQi
MD5:81BDD536EF3EE7FD732BC2FDA29AEAAE
SHA1:A35360A8ECACB86C9A487F247A2991C715F77B67
SHA-256:C8D9DE6DD1B26C682F79A532EEAA621229C176C98946292F8FFC80E95295045A
SHA-512:067E72105E56FDC1CEE9516CA02780077611F773B56300B0E9C6A10468CEB6BD000EBB7692568850BEB9DEE644D7A4F46AA3B3B953B28A22667D44F2F3A43B36
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.1.6.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4579
Entropy (8bit):4.472937543202665
Encrypted:false
SSDEEP:48:cvIwWl8zsWJg77aI9bYWpW8VYCxYm8M4JS2Fd+q8g88PkEkd:uIjfsI7RR7VoJhu8PkEkd
MD5:79E040021214457C9FA7FA674F813509
SHA1:597129FB3C8B1ECBEABEFB32F3CD8F8F167098B1
SHA-256:CE02D1983A528EF871A1F7780260512AD529134776282D097F5B5D4B1E2718A6
SHA-512:D71F2CC4E4A75D819C6FE03D5C8DE7527B5C1C9359F12E2AC1BD0507B1989F82529082F01B3179A63E8D056EA4E7BC77D93F875C115591F110B0D55A35EBA818
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="339333" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465472480384856
Encrypted:false
SSDEEP:6144:3IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNUdwBCswSby:4XD94+WlLZMM6YFH2+y
MD5:D0A62BC56B06BDCA98222A810AD6A2C2
SHA1:DEA107EA880E648CC7BFC1AFD49C320F7F36290A
SHA-256:047D32778E4E16FEDBE46ED6FB1AE20AB64A7C0A981926E9E31835DE4A80B206
SHA-512:665D4C06822D2582E0B26B5579DD8394D26C1CFB94585EE229AFFB8573310108E57CE546FB3FD20632B23D815466546153F2C6A48AEB5D3D46EB150E392FC5D2
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.C...................................................................................................................................................................................................................................................................................................................................................v..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.748200223927152
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Sybase iAnywhere database files (19/3) 0.00%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:qbVhybtzOG.exe
File size:47'104 bytes
MD5:afc8afc8cf5e261af6001df196a43038
SHA1:f2e2103d1d687b8c5bb2759d1d2bda98bc8d5e2a
SHA256:33ac176455137bb97a4982fd4793efb0914e6d5621e947b7e5d0f701132d4bd0
SHA512:ec74cbbd6bb2d5583bf9799d8b4b1d14524096d65e3ec1a8fadafc56909a31bd545c21008e7cf546380cd6a5ce08f0dd4fe032a88e41035fd7148716d5fe0669
SSDEEP:768:Tn6XvuyWatMUoxin98V1yfBKxqvdDRhHvr4jFwJQfkg9y6WTY8wyMfcQ0YZCVWaR:Tn6vuxUQi9kyoxqVrERwJjd6ufw1fcQU
TLSH:DD238D2665D6DDF2CD2140712BE8BB36637FE8332915AD8FD31049841865ED2D12BB8F
File Content Preview:MZ..........................................................$.................6.`...`...`....O..`...........%lXt.sS.^}f}(@.._.RKP.'j.....P....3F......{n. .b......G...........S.-X.Z.l.......T.6=(g..<+^../R.$s.M........`......]..J..K..0O....&m......N...B..#
Icon Hash:90cececece8e8eb0
Entrypoint:0x4102db
Entrypoint Section:.stirkj
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x3BC4374A [Wed Oct 10 11:55:54 2001 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:
Instruction
add byte ptr [eax+0000410Ch], ch
add byte ptr [ecx+00h], al
push eax
dec eax
or eax, 40111C00h
add byte ptr [eax], dh
or al, 41h
add byte ptr [eax+01h], bl
inc ecx
add byte ptr [eax+54h], ah
or eax, 40111000h
add byte ptr [eax+0Dh], al
inc ecx
add byte ptr [eax-57FFBEFFh], ch
push esp
or eax, 40110000h
add byte ptr [eax+6800410Bh], bh
add byte ptr [ecx+00h], al
xor byte ptr [ebp+0Dh], dl
add ah, dh
adc byte ptr [eax+00h], al
and byte ptr [ebx], cl
inc ecx
add byte ptr [eax], ah
add al, byte ptr [ecx+00h]
mov byte ptr [esi+0Dh], dl
add ah, ah
adc byte ptr [eax+00h], al
enter 410Ch, 00h
lodsb
add al, byte ptr [ecx+00h]
cmp byte ptr [edi+0Dh], dl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edx+00h], al
add dword ptr [ecx], eax
mov esp, 43004073h
add byte ptr [ecx], al
add eax, ebx
jnc 00007F362D0B24B2h
add byte ptr [eax+00h], al
add dword ptr [ecx], eax
clc
jnc 00007F362D0B24B2h
add byte ptr [ecx+00h], al
add dword ptr [ecx], eax
adc al, 74h
inc eax
add byte ptr [eax+eax+00h], ah
add byte ptr [esp+esi*2], dh
inc eax
add byte ptr [ebp+00h], ah
add byte ptr [eax], al
xor al, 74h
inc eax
add byte ptr [ebx+00h], ah
add dword ptr [ecx], eax
pushad
je 00007F362D0B24B2h
add byte ptr [edi], bh
add byte ptr [eax], al
add byte ptr [ecx], bl
jne 00007F362D0B24B2h
add byte ptr [ebx], bh
add byte ptr [eax], al
add byte ptr [003C0040h+esi*2], ch
add byte ptr [ecx], al
jne 00007F362D0B24B3h
add byte ptr [00000000h], bh
add byte ptr [eax], al
add byte ptr [esi], bh
add byte ptr [ecx], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x12c8.qbelid
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.mtqxyn0x10000xed700x9800cff2da771c712fcab9d52625d35b7cf1False0.6417043585526315data6.72828017031269IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.stirkj0x100000x14000x800ff279d0e3f35fd936a16fc0aab1b6298False0.38916015625data3.645925974349383IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.qbelid0x120000x130000x1400dd8f300756d2aed4a75ead5e8f6643c6False0.779296875data6.54276430575008IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
TimestampSource PortDest PortSource IPDest IP
May 26, 2024 02:31:44.313091040 CEST5358284162.159.36.2192.168.2.4
May 26, 2024 02:31:44.855031013 CEST53527791.1.1.1192.168.2.4

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:20:30:56
Start date:25/05/2024
Path:C:\Users\user\Desktop\qbVhybtzOG.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\qbVhybtzOG.exe"
Imagebase:0x400000
File size:47'104 bytes
MD5 hash:AFC8AFC8CF5E261AF6001DF196A43038
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:20:30:56
Start date:25/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7016 -s 232
Imagebase:0xc10000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.1879618405.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1879643066.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1879666418.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_qbVhybtzOG.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction ID: 059657115f90dfac27c346e8d8971d8426a84f5c392e9afb714c30ca12234013
    • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction Fuzzy Hash: 4981B236D1562ADBDB14CE58C4402ADB7B1EB85324F2542AADC12BB3C1C378AD52DBC6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1879618405.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1879643066.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1879666418.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_qbVhybtzOG.jbxd
    Similarity
    • API ID:
    • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
    • API String ID: 0-737691513
    • Opcode ID: acf1a9c869debdeffa2f368a7d5c031a4c88027153e13e722018914760d2aa3c
    • Instruction ID: 5dbbfa79514bc1b53a7babed0e3d37e554d12e48d8da17c1a61d3c5a2fa94567
    • Opcode Fuzzy Hash: acf1a9c869debdeffa2f368a7d5c031a4c88027153e13e722018914760d2aa3c
    • Instruction Fuzzy Hash: D0D10971A04306BAEF206BA5DD46FAF7AA89F01344F14403FF544B52D2EBBD9980876D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1879618405.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1879643066.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1879666418.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_qbVhybtzOG.jbxd
    Similarity
    • API ID:
    • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
    • API String ID: 0-1780237566
    • Opcode ID: 0af5218e522a22190186b4b1299611b50fcb06a3b59d26fe9dc3718662f555b3
    • Instruction ID: b5888876affb44e524da7697899bf29ddc8bee3ee74997fbb5e14d454ff8cfdf
    • Opcode Fuzzy Hash: 0af5218e522a22190186b4b1299611b50fcb06a3b59d26fe9dc3718662f555b3
    • Instruction Fuzzy Hash: 2C5193B2540208BEDB01EBA5DC42EFB37ACAB56704F08443EF511F71D2E6799E0487A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1879618405.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1879643066.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1879666418.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_qbVhybtzOG.jbxd
    Similarity
    • API ID:
    • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
    • API String ID: 0-471104514
    • Opcode ID: 574285a71513e85b1752ed2fa26c99e5269e9ecb1f61d6f4faa7ffa6f4ae24d6
    • Instruction ID: 593b71e52de59ee516d77164e068d584d83c3cdfa792d0047e9cbdcfdf1f2009
    • Opcode Fuzzy Hash: 574285a71513e85b1752ed2fa26c99e5269e9ecb1f61d6f4faa7ffa6f4ae24d6
    • Instruction Fuzzy Hash: 76C12DB1E00209AFDF10DFA4C884AEFBBB9EF88304F14846AE545B7291D7799D45CB64