Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
usCyF4QZGn.exe

Overview

General Information

Sample name:usCyF4QZGn.exe
renamed because original name is a hash value
Original sample name:3064aef872e09fa434ff61d66c2db930.bin.exe
Analysis ID:1447599
MD5:3064aef872e09fa434ff61d66c2db930
SHA1:b9ed60f0b267c8a56c904752c03abeb4fc76cb92
SHA256:88cccaca80ef790f867c988dfe8ed74cedf55bf83cf776498ce2a43df69d8e17
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

  • System is w10x64
  • usCyF4QZGn.exe (PID: 5440 cmdline: "C:\Users\user\Desktop\usCyF4QZGn.exe" MD5: 3064AEF872E09FA434FF61D66C2DB930)
    • WerFault.exe (PID: 4352 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 236 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: usCyF4QZGn.exeAvira: detected
Source: usCyF4QZGn.exeReversingLabs: Detection: 92%
Source: usCyF4QZGn.exeVirustotal: Detection: 80%Perma Link
Source: usCyF4QZGn.exeJoe Sandbox ML: detected
Source: usCyF4QZGn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\usCyF4QZGn.exeCode function: 0_2_0040971D0_2_0040971D
Source: C:\Users\user\Desktop\usCyF4QZGn.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 236
Source: usCyF4QZGn.exeStatic PE information: No import functions for PE file found
Source: usCyF4QZGn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5440
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7d1212ee-2771-4f1a-b2df-51548f73e30cJump to behavior
Source: C:\Users\user\Desktop\usCyF4QZGn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: usCyF4QZGn.exeReversingLabs: Detection: 92%
Source: usCyF4QZGn.exeVirustotal: Detection: 80%
Source: unknownProcess created: C:\Users\user\Desktop\usCyF4QZGn.exe "C:\Users\user\Desktop\usCyF4QZGn.exe"
Source: C:\Users\user\Desktop\usCyF4QZGn.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 236
Source: C:\Users\user\Desktop\usCyF4QZGn.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .wzwr
Source: usCyF4QZGn.exeStatic PE information: section name: .bgxez
Source: usCyF4QZGn.exeStatic PE information: section name: .wzwr
Source: usCyF4QZGn.exeStatic PE information: section name: .lcpad
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\usCyF4QZGn.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\usCyF4QZGn.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
usCyF4QZGn.exe92%ReversingLabsWin32.Trojan.Zeus
usCyF4QZGn.exe81%VirustotalBrowse
usCyF4QZGn.exe100%AviraTR/Crypt.XPACK.Gen
usCyF4QZGn.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447599
Start date and time:2024-05-26 02:31:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:usCyF4QZGn.exe
renamed because original name is a hash value
Original Sample Name:3064aef872e09fa434ff61d66c2db930.bin.exe
Detection:MAL
Classification:mal60.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.65.92
  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target usCyF4QZGn.exe, PID 5440 because there are no executed function
TimeTypeDescription
20:32:19API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6392105161977033
Encrypted:false
SSDEEP:96:vzUvFqKWDaUsphp1yLFS3QXIDcQyc6fkcEIcw3dlcw+HbHg6ZAX/d5FMT2SlPkpG:OCDaUZ0soCLcxjEzuiFwZ24IO8+
MD5:AF4D2E5C4AC2DFD5C42AF6B8BD3B2671
SHA1:E41443122192A6DFD0FE9975D19D81770D03F76C
SHA-256:CA4DF5A486CDB96212260DD21F50D3E44FE9384177A054EEADFC8BC092025C20
SHA-512:93B308A9E6B8588375A7D917D41CACBA0AA661584F95AAA4643F0DA7C0FC4629A388BE0A354941D5FC8E3C6259EFA826793799EC735A391F0DAAA7D6060070FD
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.1.5.7.1.2.1.2.5.4.3.6.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.1.5.7.1.2.1.5.5.1.2.4.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.0.e.9.0.7.9.2.-.8.0.d.e.-.4.f.2.6.-.8.8.1.6.-.3.0.4.7.c.d.b.2.8.3.a.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.5.f.6.7.7.0.f.-.f.3.9.3.-.4.8.e.1.-.9.6.5.3.-.2.f.0.8.8.5.8.a.c.d.c.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.u.s.C.y.F.4.Q.Z.G.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.4.0.-.0.0.0.1.-.0.0.1.4.-.7.3.a.f.-.b.8.1.f.0.4.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.2.a.f.6.d.9.d.e.f.6.f.5.3.c.c.9.4.f.d.8.a.8.7.4.1.a.e.6.b.1.1.0.0.0.0.f.f.f.f.!.0.0.0.0.b.9.e.d.6.0.f.0.b.2.6.7.c.8.a.5.6.c.9.0.4.7.5.2.c.0.3.a.b.e.b.4.f.c.7.6.c.b.9.2.!.u.s.C.y.F.4.Q.Z.G.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun May 26 00:32:01 2024, 0x1205a4 type
Category:dropped
Size (bytes):18188
Entropy (8bit):2.0628829390493193
Encrypted:false
SSDEEP:96:5H8MBN5PswZWi7pyd4f46tYFvWIkWIKFJIQNSAVA:m5FOWR6taFhNtV
MD5:27C6C355EFCA6358880900D4CA31676E
SHA1:BA47CF1E2CDEBD15D75B2DD0B77F701D9E471883
SHA-256:798AB61D5CB024217ECB726B54C4B2EDD75678954140B72E97DFC0010BA7CF79
SHA-512:D7FBAE549FDFBB7D0C4B4C98990FA06DC5F177AC4A2B34E5EBFE80E12B361B91B7C43E01ECDEF552EB9C63580EE542F72D41EC14060D7AD50A612CD974478DEA
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Rf............4...............<.......d...............T.......8...........T...........p....=......................................................................................................eJ......L.......GenuineIntel............T.......@.....Rf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8356
Entropy (8bit):3.690971692333868
Encrypted:false
SSDEEP:192:R6l7wVeJA26OQ6YEIoSUN6gmfCJmmockprj89bfrsfJ1m:R6lXJJ6OQ6YEHSUN6gmfCJmv2fwfi
MD5:31F008DC04F23C7602D157259D23D7A4
SHA1:FE7B11C183E654B9454BAD9C91CAB1D4CA0BC345
SHA-256:5626D5C44AAE75223519C9DD8F15DC1D54372F5986C642C81540027237FE9C12
SHA-512:900F76A5DC88298CC7A2455E84541066D0E4E8F338754AF3A68271B5BC34C176D819210A0748AE3275FB18ACCECCF40D945B420F78D9E1884AB984BC153BE7D6
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.4.4.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4686
Entropy (8bit):4.456231785628501
Encrypted:false
SSDEEP:48:cvIwWl8zsvJg77aI9FjyWpW8VYCXvYm8M4JeV6F5I+q8vvVnDbEPenFwhQd:uIjfRI7nT7V6JQwIKdnEP6FwhQd
MD5:696FD806074F2D48694B81F8049A15EE
SHA1:F5BBC8B2F04E82BC72702BB1B7B5C4DCDE81F8B5
SHA-256:63C3A66F2E9961F06E34120B0C8F99CDD22D7EFD6EA790152153496790C9D204
SHA-512:D60C78B894EC0C4649A7D58559609F3858649E6F1EA5CEA4AF3B469A2AE94B48178E058139425BF5227111DEAD2B4EAB3193E408205FED6A208BF4DA0CE9443C
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="339334" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.421598245105538
Encrypted:false
SSDEEP:6144:hSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:4vloTMW+EZMM6DFyX03w
MD5:B0F1488FC9D0ABCB1654BD4C37E6187C
SHA1:6210A068A2D312DCCCDB598F187F4C4F57CF5ACC
SHA-256:8A4A4CC0E9BF9BC8B3AF35415AF02A3285E5493A89D4402E801F06E6B14A896A
SHA-512:1EBC88520DCC78A4490FD6536F463A39FFC11E080238186EE868223348754CD154ED1A035D0C61AD8ADA80B0968944EE82D9A5812F078F7EF3C0CA7F3AD3D8E8
Malicious:false
Reputation:low
Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&....................................................................................................................................................................................................................................................................................................................................................r.+........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.758293825568193
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Sybase iAnywhere database files (19/3) 0.00%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:usCyF4QZGn.exe
File size:44'544 bytes
MD5:3064aef872e09fa434ff61d66c2db930
SHA1:b9ed60f0b267c8a56c904752c03abeb4fc76cb92
SHA256:88cccaca80ef790f867c988dfe8ed74cedf55bf83cf776498ce2a43df69d8e17
SHA512:b812dbe1216c8aedba49ccb5eeabfb5bc68fcc7bda5b14dcfeff35794d7af74d41143ac0c6da263b17f5347e4165d45b9034ce561e229ea70b8e6cff62b9f1c3
SSDEEP:768:vY+OvuxEi74MUs8bC6IVl4fyTLhPxUUhjAR9gXFfKEVxX4V4bsg9ovN:vYnvuuzMULJLfyTV5WrAN4V4bDoV
TLSH:18137B8777D1A8F3DD5000722379B76A6BAEDD335024A987C7A84DC120725E3963BE1B
File Content Preview:MZ..................................................................tst1......6.....`...`....O..............^}f}(@.{G.V.P...E.....0...+.^}f}(@.._.RKP....YLs.]@...t.f%..z.......b1..6.8.Jy...}..2....E....<.PE..L...`..@..............%.............,..........
Icon Hash:00928e8e8686b000
Entrypoint:0x40f72c
Entrypoint Section:.wzwr
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x40A7C260 [Sun May 16 19:34:56 2004 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:
Instruction
xor eax, eax
mov edx, DFDCFB62h
xor edi, edi
mov ebx, 0040F765h
cmp eax, 00000000h
jne 00007FF0B526A8C4h
sub byte ptr [ebx], dl
inc ebx
shr edx, 08h
inc edi
cmp edi, 04h
jne 00007FF0B526A8CCh
mov edx, DFDCFB62h
mov edi, 00000000h
cmp ebx, 0040FA67h
jc 00007FF0B526A89Fh
inc eax
cmp eax, 00002715h
jbe 00007FF0B526A88Bh
nop
nop
nop
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
and ecx, ecx
mov ecx, DFDCFB62h
cmp ecx, dword ptr [esp]
je 00007FF0B526AA52h
mov edi, 00000000h
mov ebx, 0040F765h
add ebx, 32h
mov edx, dword ptr [esp]
inc ebx
cmp ebx, 0040FA67h
jne 00007FF0B526A8B6h
inc edi
cmp edi, 00015F90h
jne 00007FF0B526A8A5h
xor eax, eax
sbb bl, bh
or al, 00h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1188.lcpad
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.bgxez0x10000xdb810x8c0064daba0a693537b0f51eaa64cd08f1e0False0.6436383928571429data6.704229765289651IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.wzwr0xf0000x13400xc00cabbc2327ed965b04593346403b4cc6cFalse0.560546875data5.273171528939147IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.lcpad0x110000x110000x1200a1ba6ae49de02745722ed7539fa4aa9dFalse0.8198784722222222data6.650644823530544IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
TimestampSource PortDest PortSource IPDest IP
May 26, 2024 02:32:22.179924965 CEST53564241.1.1.1192.168.2.5

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:20:32:00
Start date:25/05/2024
Path:C:\Users\user\Desktop\usCyF4QZGn.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\usCyF4QZGn.exe"
Imagebase:0x400000
File size:44'544 bytes
MD5 hash:3064AEF872E09FA434FF61D66C2DB930
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:20:32:01
Start date:25/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 236
Imagebase:0x5c0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.2221372455.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2221400919.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2221422747.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_usCyF4QZGn.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction ID: 69f26d5aa5d96b5452832479d11c5d5c43512d3a1fb26e635d941fbf87bf064b
    • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction Fuzzy Hash: 95817F73D1552ADBDB14CE58C4406ADB7B1EB86324F2982AADC56BB3C2C334AD41CBC4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2221372455.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2221400919.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2221422747.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_usCyF4QZGn.jbxd
    Similarity
    • API ID:
    • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
    • API String ID: 0-737691513
    • Opcode ID: c72bc94e70dbdaa6c7b6e45edbd8f6f0a90484319418eb5941946b4bf98b31ab
    • Instruction ID: a2b6c6329966749bd2fe83194d81166975e1b845ccf7325cc7aeed30409c7d5d
    • Opcode Fuzzy Hash: c72bc94e70dbdaa6c7b6e45edbd8f6f0a90484319418eb5941946b4bf98b31ab
    • Instruction Fuzzy Hash: C2D1F571E083067AFF206B65CD46FAF7AA8AF01304F10407BF904B52D2EB7D9945876A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2221372455.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2221400919.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2221422747.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_usCyF4QZGn.jbxd
    Similarity
    • API ID:
    • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
    • API String ID: 0-1780237566
    • Opcode ID: b5e463f709a3cb013b893f95329ddc77f1b50dff00bafc00aca941a2ca1f666d
    • Instruction ID: 697941cf6ca1310f95cfa30b553c56595fecf7f3d5f69b6e6de87b3b7abd4f63
    • Opcode Fuzzy Hash: b5e463f709a3cb013b893f95329ddc77f1b50dff00bafc00aca941a2ca1f666d
    • Instruction Fuzzy Hash: 4C5183B2500205BADB11ABA5DC42FFF37ACEB49704F08443FB955F71D2EA7899048B65
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2221372455.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2221400919.000000000040F000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2221422747.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_usCyF4QZGn.jbxd
    Similarity
    • API ID:
    • String ID: 2$1$K$O
    • API String ID: 0-1927329319
    • Opcode ID: a816568a18f79cf8fdfcc27fb31a7bb82ee5615bc7bcf9b6e03c78de878534f3
    • Instruction ID: 8ab1d6e66578a9add4bbd1a42679747cb37529999caf42c16f4c582b028a3a07
    • Opcode Fuzzy Hash: a816568a18f79cf8fdfcc27fb31a7bb82ee5615bc7bcf9b6e03c78de878534f3
    • Instruction Fuzzy Hash: 0FF05470900109FEDF20DB90EA45ADE7BB8AF11344F040072F901F61D1D7B8D959DB98