Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jnKkMBihOm.exe

Overview

General Information

Sample name:jnKkMBihOm.exe
renamed because original name is a hash value
Original sample name:254334d29a4f93cb1458208d1f9433c4e968ad7cec27c52004ec72da44ed4227.bin.exe
Analysis ID:1447787
MD5:5b1b35d6cbca658eb9e80ce00a1769b2
SHA1:58c9f62c1cc4a9415b8937de70214f3ca8af5f29
SHA256:254334d29a4f93cb1458208d1f9433c4e968ad7cec27c52004ec72da44ed4227
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

  • System is w10x64
  • jnKkMBihOm.exe (PID: 6260 cmdline: "C:\Users\user\Desktop\jnKkMBihOm.exe" MD5: 5B1B35D6CBCA658EB9E80CE00A1769B2)
    • WerFault.exe (PID: 5016 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6260 -s 328 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: jnKkMBihOm.exeAvira: detected
Source: jnKkMBihOm.exeReversingLabs: Detection: 91%
Source: jnKkMBihOm.exeVirustotal: Detection: 75%Perma Link
Source: jnKkMBihOm.exeJoe Sandbox ML: detected
Source: jnKkMBihOm.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\jnKkMBihOm.exeCode function: 0_2_004092610_2_00409261
Source: C:\Users\user\Desktop\jnKkMBihOm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6260 -s 328
Source: jnKkMBihOm.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6260
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\91de5f70-87e6-4c3a-81ec-fce470582539Jump to behavior
Source: C:\Users\user\Desktop\jnKkMBihOm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: jnKkMBihOm.exeReversingLabs: Detection: 91%
Source: jnKkMBihOm.exeVirustotal: Detection: 75%
Source: unknownProcess created: C:\Users\user\Desktop\jnKkMBihOm.exe "C:\Users\user\Desktop\jnKkMBihOm.exe"
Source: C:\Users\user\Desktop\jnKkMBihOm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6260 -s 328
Source: C:\Users\user\Desktop\jnKkMBihOm.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .pir
Source: jnKkMBihOm.exeStatic PE information: section name: .hmtqv
Source: jnKkMBihOm.exeStatic PE information: section name: .fkt
Source: jnKkMBihOm.exeStatic PE information: section name: .hct
Source: jnKkMBihOm.exeStatic PE information: section name: .pir
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\jnKkMBihOm.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
jnKkMBihOm.exe92%ReversingLabsWin32.Trojan.Zeus
jnKkMBihOm.exe76%VirustotalBrowse
jnKkMBihOm.exe100%AviraTR/Crypt.XPACK.Gen
jnKkMBihOm.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447787
Start date and time:2024-05-27 03:02:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:jnKkMBihOm.exe
renamed because original name is a hash value
Original Sample Name:254334d29a4f93cb1458208d1f9433c4e968ad7cec27c52004ec72da44ed4227.bin.exe
Detection:MAL
Classification:mal60.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.65.92
  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target jnKkMBihOm.exe, PID 6260 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
21:03:04API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6907739187634065
Encrypted:false
SSDEEP:192:su+CtJpKa68ck4s50BU/MUojvqzuiFSZ24IO8I7k:h+8WBU/ojizuiFSY4IO83
MD5:5FB4F8EAC4D694FFD360D07ECC342AF6
SHA1:E88D2450EBB3A84EEED8D8EFF42C2C37D347334E
SHA-256:9ED5F5650CC12692DD7862A093F7A989876504AD76591DAFE6DB8687C3F18514
SHA-512:A66931BE2CFF45E371B67C19CC41133C3F09802E83DC89C37CE690BEE22C4752102D706FF91A5EAFC77D7E48FD553878F9396124A621719339DBBE792C3507E7
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.4.5.3.7.2.1.3.4.1.1.6.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.2.4.5.3.7.2.4.4.6.6.1.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.8.e.6.c.1.5.2.-.0.b.d.c.-.4.e.a.6.-.9.6.d.6.-.4.0.d.7.d.d.6.3.b.9.5.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.d.2.a.3.5.6.-.b.8.3.e.-.4.e.a.4.-.8.6.5.4.-.1.e.9.a.f.d.f.c.d.3.4.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.j.n.K.k.M.B.i.h.O.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.7.4.-.0.0.0.1.-.0.0.1.4.-.7.2.9.2.-.4.4.9.9.d.1.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.c.7.d.a.2.e.2.5.3.0.2.2.7.c.3.6.d.2.5.c.f.9.c.d.3.2.2.2.f.0.a.0.0.0.0.f.f.f.f.!.0.0.0.0.5.8.c.9.f.6.2.c.1.c.c.4.a.9.4.1.5.b.8.9.3.7.d.e.7.0.2.1.4.f.3.c.a.8.a.f.5.f.2.9.!.j.n.K.k.M.B.i.h.O.m...e.x.e.....T.a.r.g.e.t.A.p.p.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 01:02:52 2024, 0x1205a4 type
Category:dropped
Size (bytes):32458
Entropy (8bit):1.8566389289201126
Encrypted:false
SSDEEP:96:5L8KHlK6eUn88r59HlozDwi7WblSHjfiqDmCNmKvFLfizwNWINWIKlbmMxnGyemn:yKFfryDwORjqqDmCNmKvFLq/ZnGyeOv
MD5:CE9D15C7A61D119D59D45AA93871D6A6
SHA1:39E666795435A7166EF9D240DC6275A20428E37E
SHA-256:0FBD93FC84096B2CF4BED9113E0CBAD71B3A1666B034D5995ED03A28B823D688
SHA-512:070E23CA9B9CDE2C6D912513FE57B02E0ADE5D10E13A65847CDB8662AA8ABD18B7786FC675F11B620B98B45018730CF604FCAD254CB3221F09D3C2563EC836FC
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Sf....................................................T.......8...........T...........X...rq......................t...............................................................................eJ..............GenuineIntel............T.......t.....Sf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8294
Entropy (8bit):3.6971486363190817
Encrypted:false
SSDEEP:192:R6l7wVeJTnf6m6Y9hSU9XPgmfiPgyprr89byvsftomm:R6lXJr6m6YrSU9/gmfnbyUftg
MD5:ED3BC5E81766AFDE6CF5BAB667F83797
SHA1:62E352E70F2CDB1259EF6A062DB4C981E3E82901
SHA-256:52ADF2C24CDF623ED427A689283235AC40E7E9A0FA90D475886E356A692CA6DD
SHA-512:2BE079A3C772B8583E2E78622BEEDAC9B9505558D3F78537DB962F6DE4D093C13B9CAF7AFFC7FEF6B46E778C82CE436D9B45CB97AEC40733DEE228AA53EFAA4E
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.6.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4579
Entropy (8bit):4.467986658901456
Encrypted:false
SSDEEP:48:cvIwWl8zs+Jg77aI9O5WpW8VYDYm8M4JOM9FmW+q8kN5hsQbU4Vd:uIjf0I7cI7VXJVOWf5hsWPVd
MD5:902AA7C4ABF14C191CED222A700DFF79
SHA1:E2CED2D901E0A7C933C88FFDD4C726FDE32B000E
SHA-256:62FF60018503CBFCC79E2EE8FDCB102049405DF216F68F75653173AAAABE9F3C
SHA-512:195DF688BCFA55700E25EF6F421CECF3C24311B5488EB1E28F838487A3990D48117E2D223BDEA4E8B43BB4F4647C0B430DF6A1576BE7CE22FA957325589AA0DF
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="340805" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465455868395016
Encrypted:false
SSDEEP:6144:BIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNhdwBCswSbx:CXD94+WlLZMM6YFHD+x
MD5:2163D6E148FAF9EDFCFD115A0BE61D60
SHA1:4252E7020FEAF356D971DD5DD58A2D073CD02BDA
SHA-256:C37BDA5867B441F55D734A0B2FFF1D9F78F9D7A822F9421B51FE746B7B57AD01
SHA-512:E836648C53580E3D1D583497E4A3CB06843384F2E0A86CB5331E181C7A1EB99B11EC2BE9523D3685657385BFAB3EB28CE3325ABCC9C20C2159071F0725B682E3
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.780628305641499
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.98%
  • DOS Executable Generic (2002/1) 0.02%
File name:jnKkMBihOm.exe
File size:42'496 bytes
MD5:5b1b35d6cbca658eb9e80ce00a1769b2
SHA1:58c9f62c1cc4a9415b8937de70214f3ca8af5f29
SHA256:254334d29a4f93cb1458208d1f9433c4e968ad7cec27c52004ec72da44ed4227
SHA512:505d0ccf71433b31840ce05e9a9a7e409d2d1ee6260431f0e0debdbe7effceaac3e28a756b1e2a8eb977a458a2f71ce7f40692ed6118c265ffef1c71fe1a4e63
SSDEEP:768:AY+jvRwHqTHYGU3PmluLeBZfqM3h7Nua6+MpxBwbds4Zg+PZwB:AYWvRPLYGKauSBQcS+wjwbdZo
TLSH:BD138ED96BE1C8F3DCD100702A69976627BEDE3240658D47C76C89D039319E3A12FE6B
File Content Preview:MZ................6.`...`...`....O..`....'......................^}f}(@.K.G.M.O.Z.Z._..-.).....#....{...^}f}(@..NzV.Q.S.FW5.;`i.+B.._..P.J....9.{R.\....#Z...>...b....qpsj.4'N.8.rm|O.A..zU.w^..k.=.......%T.nyX.PE..L...q..E.....................&......}0...0.
Icon Hash:90cececece8e8eb0
Entrypoint:0x41307d
Entrypoint Section:.pir
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x4510AD71 [Wed Sep 20 02:54:41 2006 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:1286385b579bc499db79191c63f69d22
Instruction
mov edi, 0000000Ah
xor ebx, ebx
mov eax, 00000000h
xor eax, eax
mov edi, 00000000h
mov ebx, edi
mov ebx, 00000001h
mov ebx, 004130C8h
xor edi, ebx
mov edi, 00413004h
mov edi, 004132D6h
inc byte ptr [ebx]
inc ebx
xor edx, edx
cmp ebx, 004132D6h
jne 00007FEFA4B994E5h
inc eax
mov ecx, 00000000h
xor ecx, eax
xor ecx, ecx
cmp eax, 0001AB13h
jne 00007FEFA4B994B7h
xor ebx, edi
nop
nop
nop
mov eax, dword ptr [esp]
xor ax, ax
push 0000FFFFh
push 5D7574B6h
push 71E40722h
push 15F8EF80h
push D66358ECh
mov edi, esp
cmp word ptr [eax], 5A4Dh
jne 00007FEFA4B99505h
mov edx, dword ptr [eax+3Ch]
cmp edx, 00001000h
jnbe 00007FEFA4B994FAh
cmp word ptr [eax+edx], 4550h
je 00007FEFA4B994F9h
sub eax, 00010000h
jmp 00007FEFA4B994D1h
push eax
mov esi, dword ptr [eax+edx+78h]
add esi, eax
add esi, 18h
xchg eax, ebx
lodsd
push eax
lodsd
push eax
lodsd
push eax
add eax, ebx
push eax
lodsd
push eax
mov ebp, esp
mov ecx, dword ptr [ebp+10h]
xor edx, edx
mov esi, dword ptr [ebp+04h]
mov esi, dword ptr [esi]
add esi, ebx
xor eax, eax
push eax
ror eax, 07h
xor dword ptr [esp], eax
lodsb
test al, al
jne 00007FEFA4B994E7h
pop eax
push edi
cmp dword ptr [edi], 0000FFFFh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x130180x74.pir
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x113c.hct
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.hmtqv0x10000xd5750x8800e928674e77aed02afda334f945167393False0.6435259650735294data6.7081111068024235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.fkt0xf0000x13040x400608f61f4881483bf6bfedc5c0c26a348False0.4970703125data3.8588711807249534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.hct0x110000x116a0x1200de78b26cf1a810534ef4dff31bf2aebcFalse0.8070746527777778data6.5857414639902405IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pir0x130000xf0000x400fb8c695fe763ee78d6ea7875d0943be6False0.8173828125data6.269391730966701IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
shell32.dllSHBrowseForFolderW, SHFileOperationW
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:21:02:51
Start date:26/05/2024
Path:C:\Users\user\Desktop\jnKkMBihOm.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\jnKkMBihOm.exe"
Imagebase:0x400000
File size:42'496 bytes
MD5 hash:5B1B35D6CBCA658EB9E80CE00A1769B2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:21:02:51
Start date:26/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6260 -s 328
Imagebase:0x690000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.1759908089.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1759892884.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1759927388.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1759944078.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1759957038.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_jnKkMBihOm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction ID: 9cb20e4be3012314390b608bf530e826836383d1b3523278580289f747f1cfac
    • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction Fuzzy Hash: BF818372D0952ADBDF14CE58C4406AEB7B1EB85324F1542AADC52BB3C2C338AD42DBC5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1759908089.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1759892884.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1759927388.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1759944078.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1759957038.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_jnKkMBihOm.jbxd
    Similarity
    • API ID:
    • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
    • API String ID: 0-1780237566
    • Opcode ID: 088afcfed5fc1dbe4f17afd226ab5fc3f97d9bf1a661a27fa7f27897b77fbee9
    • Instruction ID: def32320ae19ad3a8c223c0342bb1300283e8ddc332d441be4d5524051d8c340
    • Opcode Fuzzy Hash: 088afcfed5fc1dbe4f17afd226ab5fc3f97d9bf1a661a27fa7f27897b77fbee9
    • Instruction Fuzzy Hash: 9A51A2B26002157EDB01EFA5DD46EFB37ACAB15704F04083FB994F3191EA7895049BB8