Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
X3wHy1PMMl.exe

Overview

General Information

Sample name:X3wHy1PMMl.exe
renamed because original name is a hash value
Original sample name:da4655775934e9f037256aae8677e31907cc3814d381ae0c52c5ccc68cf36a2b.bin.exe
Analysis ID:1447788
MD5:48ce1bd3cbe33ce89d634155c6b278de
SHA1:305f1962fa566ea5eea7fdba60aa01e643bd8120
SHA256:da4655775934e9f037256aae8677e31907cc3814d381ae0c52c5ccc68cf36a2b
Tags:exeprg
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • X3wHy1PMMl.exe (PID: 6220 cmdline: "C:\Users\user\Desktop\X3wHy1PMMl.exe" MD5: 48CE1BD3CBE33CE89D634155C6B278DE)
    • WerFault.exe (PID: 2200 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5752 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 236 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: X3wHy1PMMl.exeAvira: detected
Source: X3wHy1PMMl.exeVirustotal: Detection: 71%Perma Link
Source: X3wHy1PMMl.exeReversingLabs: Detection: 79%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 68.8% probability
Source: X3wHy1PMMl.exeJoe Sandbox ML: detected
Source: X3wHy1PMMl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\X3wHy1PMMl.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 228
Source: X3wHy1PMMl.exeStatic PE information: No import functions for PE file found
Source: X3wHy1PMMl.exe, 00000000.00000000.1998112139.0000000000424000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJlZFbrPf54 vs X3wHy1PMMl.exe
Source: X3wHy1PMMl.exeBinary or memory string: OriginalFilenameJlZFbrPf54 vs X3wHy1PMMl.exe
Source: X3wHy1PMMl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@3/9@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6220
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d02b63ac-77f5-4d7f-b972-85595c8dbb4aJump to behavior
Source: C:\Users\user\Desktop\X3wHy1PMMl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: X3wHy1PMMl.exeVirustotal: Detection: 71%
Source: X3wHy1PMMl.exeReversingLabs: Detection: 79%
Source: unknownProcess created: C:\Users\user\Desktop\X3wHy1PMMl.exe "C:\Users\user\Desktop\X3wHy1PMMl.exe"
Source: C:\Users\user\Desktop\X3wHy1PMMl.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 228
Source: C:\Users\user\Desktop\X3wHy1PMMl.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 236
Source: C:\Users\user\Desktop\X3wHy1PMMl.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .mripyh
Source: X3wHy1PMMl.exeStatic PE information: section name: .ruv
Source: X3wHy1PMMl.exeStatic PE information: section name: .mripyh
Source: X3wHy1PMMl.exeStatic PE information: section name: .hel
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\X3wHy1PMMl.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
X3wHy1PMMl.exe72%VirustotalBrowse
X3wHy1PMMl.exe79%ReversingLabsWin32.Trojan.Zeus
X3wHy1PMMl.exe100%AviraTR/Crypt.XPACK.Gen
X3wHy1PMMl.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447788
Start date and time:2024-05-27 03:02:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:X3wHy1PMMl.exe
renamed because original name is a hash value
Original Sample Name:da4655775934e9f037256aae8677e31907cc3814d381ae0c52c5ccc68cf36a2b.bin.exe
Detection:MAL
Classification:mal64.winEXE@3/9@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 5
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.89.179.12
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target X3wHy1PMMl.exe, PID 6220 because there are no executed function
TimeTypeDescription
21:03:14API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6332591995751987
Encrypted:false
SSDEEP:96:sd3tFmYURnC0as9hgf7Vf8QXIDcQvc6QcEVcw3cE/3+HbHg6ZAX/d5FMT2SlPkp7:sdt/ufaV0BU/QjEzuiFSZ24IO8bm
MD5:D1B43AD1F8727DD3C7E68998666F1C3C
SHA1:F75C71F9F1BB3E3930C23712F44DD08E8FCFE033
SHA-256:A6F25EA2E78F574128D90FBD7A761D9397DA692EDF8CDA24FC61EA9904EBBE14
SHA-512:82A33FE985329478FFD317321DE4B31E6FE546089F78054D9CCC877C89FF2F257C273B497D822D37928BE705282B4327F002EE107FC50D1DAC69779A7ECA8F75
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.4.5.3.7.6.8.5.9.8.7.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.2.4.5.3.7.7.0.9.4.2.4.2.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.e.f.5.4.4.f.d.-.0.f.3.a.-.4.5.a.5.-.b.b.2.7.-.c.9.a.5.2.0.d.1.a.7.f.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.7.9.8.0.3.3.-.d.e.d.5.-.4.7.c.0.-.9.1.e.c.-.5.0.3.a.1.c.a.6.0.5.1.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.X.3.w.H.y.1.P.M.M.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.4.c.-.0.0.0.1.-.0.0.1.4.-.2.9.4.c.-.e.e.9.b.d.1.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.2.7.e.a.5.3.a.3.e.b.2.f.2.5.a.c.9.2.0.e.2.3.d.3.3.a.3.2.2.5.e.0.0.0.0.f.f.f.f.!.0.0.0.0.3.0.5.f.1.9.6.2.f.a.5.6.6.e.a.5.e.e.a.7.f.d.b.a.6.0.a.a.0.1.e.6.4.3.b.d.8.1.2.0.!.X.3.w.H.y.1.P.M.M.l...e.x.e.....T.a.r.g.e.t.A.p.p.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6293882341005114
Encrypted:false
SSDEEP:96:R47URnC03s9hgf7dwSZQXIDcQGc6McE+cw3/y+HbHg6ZAX/d5FMT2SlPkpXmTAk4:RSuf3S0oIEfjEzuiFSZ24IO8Om
MD5:321342D276F0EE62DB97271B4A60A10C
SHA1:42FB79A5241EB86782E45D5D9D20CF5BB28675FF
SHA-256:D58A3D690FBEE460862F0F527BE0B7663F1FD89B180A5AF64581D77AA65B62FB
SHA-512:8CD35FC563592336B0E62A0B8E2CA6C00A854176C5811046127B5B622C9CF60B21B033D406CA29D6C940CA2F7FF724475668AE71B947A2E61B9B4EAA9AC2C676
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.4.5.3.7.6.3.3.4.2.8.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.4.3.6.9.c.a.b.-.e.b.0.3.-.4.b.3.f.-.8.3.7.5.-.3.6.4.5.1.f.3.f.5.4.a.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.a.b.a.8.7.9.6.-.a.0.e.e.-.4.c.a.6.-.8.3.e.f.-.0.2.d.a.8.5.e.e.7.c.0.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.X.3.w.H.y.1.P.M.M.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.4.c.-.0.0.0.1.-.0.0.1.4.-.2.9.4.c.-.e.e.9.b.d.1.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.2.7.e.a.5.3.a.3.e.b.2.f.2.5.a.c.9.2.0.e.2.3.d.3.3.a.3.2.2.5.e.0.0.0.0.f.f.f.f.!.0.0.0.0.3.0.5.f.1.9.6.2.f.a.5.6.6.e.a.5.e.e.a.7.f.d.b.a.6.0.a.a.0.1.e.6.4.3.b.d.8.1.2.0.!.X.3.w.H.y.1.P.M.M.l...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.6././.0.5././.0.5.:.2.0.:.0.5.:.4.4.!.0.!.X.3.w.H.y.1.P.M.M.l...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 01:02:56 2024, 0x1205a4 type
Category:dropped
Size (bytes):18036
Entropy (8bit):1.9428666078929435
Encrypted:false
SSDEEP:96:5f86QON5P9lAksMyi7nZO5dMf94BgSxaawPTvWIkWIc0IQ2lN4:2YA1O6d09CxtwPTQ2lN4
MD5:E65938A93EC2F740E6A33AFBCBB2D30C
SHA1:ED39140F60A07F9E95A808F7FF228B6808F8DD97
SHA-256:D62CFB9F297766C0EF57717C47662278A91C874EF3E8A572B5815D2B9A515B32
SHA-512:7A715566C76ED3BA6A6A9AC1E6B416BBAF3E0EB992E87A83CABBB22AAF9E9B719B4426F461E624E44BCF1BCDFC0D9124CF299BDEA6E36150BB1979F940F8A6FC
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Sf............4...............<.......d...............T.......8...........T...........p....=......................................................................................................eJ......L.......GenuineIntel............T.......L.....Sf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8350
Entropy (8bit):3.695982612507614
Encrypted:false
SSDEEP:192:R6l7wVeJXS6Jh6YEIESU9E+gmf8KpNt89bWk1flym:R6lXJi6Jh6YELSU9E+gmf8jWOfx
MD5:9A7E221A6FF68EA9F0245884A83A4402
SHA1:F8F08752C9BCDCC600600B89AC5F16E8E8934AB1
SHA-256:F4B895339359E455C26F2F0960542826D854B0A3FFD0CB93DBDDB1FD1222AC59
SHA-512:6B73F178C1FBC335C88835896D0127E01D6B813108E4F6F97AF7E90CE114CE1DF687BEE1A6DC5F1890769477BA0FB6128640D9D907AA5FE3E5A3BA252CD6EFB0
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.2.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4680
Entropy (8bit):4.451401504551752
Encrypted:false
SSDEEP:48:cvIwWl8zs+Jg77aI9tyWpW8VYTYm8M4JhWFrBe+q8veZq7Hd:uIjf0I7DT7VjJGUK+q7Hd
MD5:A1562B5EE03112922539E2B4960527DB
SHA1:D6931D529D174B775829E54205AD526B03873447
SHA-256:54E78C6776FE059A0B7D854895A038578D6C645655EDDD79F633F108DBF9E631
SHA-512:AF4BA49ABD027D92BEC1C42C6E1652DCE4DF71C1B0B1F55816880C566DAA8713D00857FEAC3CCFDE3439B0DC502582CF40C8DB2E5039712C165E92B054148516
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="340805" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 01:02:56 2024, 0x1205a4 type
Category:dropped
Size (bytes):18760
Entropy (8bit):2.012826727216249
Encrypted:false
SSDEEP:96:5f8IQ0N5PQ8t4rizMyi7nZKdMf94fvHBg3DwP0KvWIkWI/0IYm8u+ry:2A+i3O4d09sezwPF5m8Pry
MD5:761B381BC1B86B0EACB0816A944CBF87
SHA1:6DE5FE118E2A8EB7807F0EAD7DD14ABF24AC6380
SHA-256:C9226B04E66BE644DB6197E954A2FC1E008C9CD22D70D507A13A7189E56D7260
SHA-512:8862BF47B2A4A260BB32E14D4368375C69D42163F399011D2263326F9B3BA40464C4727D436DE3D82AED5DBE6A8F79734632CC21193991DFF7812E70F07F4C35
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Sf............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T.......L.....Sf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8290
Entropy (8bit):3.6986346154071144
Encrypted:false
SSDEEP:192:R6l7wVeJXX6JQo6YEIcSU9BDgmffBprw89bWksf0ym:R6lXJn6JQo6YEjSU9BDgmffhWXfA
MD5:16968A5AA17D408EAEB1B258FB68EF6F
SHA1:36A4E541710CCE6EBD22308898F906ECD8853AD3
SHA-256:46305E0F15FA506BBF0EEB9EE299D0A07783B79CF507CF23EF7A52B65B1F4786
SHA-512:1B5910804D45C65047A2A2CB9FE11C6496C972B688B1A645DE1A20FDA62076C2806C3E48F4D5179382802FA786E1B6AC11157C68135454A447E85F9C8855AFF1
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.2.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4579
Entropy (8bit):4.466365659064374
Encrypted:false
SSDEEP:48:cvIwWl8zs+Jg77aI9tyWpW8VYY6PYm8M4JhlFZ8L+q8yoq72d:uIjf0I7DT7V96SJvcYq72d
MD5:070AFCC825FC42D8D10772DEEA3D60DF
SHA1:F486A684D454B5C021525118C321E73726F9A097
SHA-256:BEADDC68F30351E2623681B5F6C65DC5C4DBE1CEE004FA6D82A7F724CCD3B979
SHA-512:64CA07A8053A5ECD306BB8EC8CF0931883DAD0726727ECD3CCFA3C505F4D08F955112D9353AFCECC64F2C010680CEAC260D4D8FBDA865F5454E5C4AC5445E441
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="340805" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.421565248486009
Encrypted:false
SSDEEP:6144:+Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN50uhiTw:dvloTMW+EZMM6DFyf03w
MD5:0C98456ACBDE51B34FE5A03ABFF9CDB5
SHA1:ACA12DEAC1EC7E505B2923C7D8CF2C8E8516209C
SHA-256:0681668FFCDDCCE9AFED691DA2BBB8EF58E9969AA80125DAE6C49FF10F7F31CA
SHA-512:CD5A0B23C8F2F26CDAC6B849581B8B4442FB7F7FFC80E3FF61F95F3E8B0F1B54F46D404643F1C20E869A0ED4E39F2AAA425C5DAC77A5F63B7D8052378AE59894
Malicious:false
Reputation:low
Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....................................................................................................................................................................................................................................................................................................................................................j..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.616394356982641
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:X3wHy1PMMl.exe
File size:50'176 bytes
MD5:48ce1bd3cbe33ce89d634155c6b278de
SHA1:305f1962fa566ea5eea7fdba60aa01e643bd8120
SHA256:da4655775934e9f037256aae8677e31907cc3814d381ae0c52c5ccc68cf36a2b
SHA512:77efeb300859784c9bf84fc6b158070a63487b2f6eabd423069acc57df32a80e472bb77ab23a485cb7c556801f71821ca4f0794607d0976e79b51438ac8e901c
SSDEEP:1536:X77suYoawerVIW7ckH61DBBSjBNYpFdxwkMIF:cwermCIJ/wewHI
TLSH:31338D8376D0FCB3D972093267A46F76A3BFEC314E275D078724099919358838627A8F
File Content Preview:MZ......................@...................................p.......main......6.`...`...`....O..`...-............................(:...P3..P3..P3..C3..P3`wqv..P3............................................................................^}f}(@..]..~J.E.7.6
Icon Hash:00928e8e8686b000
Entrypoint:0x410321
Entrypoint Section:.mripyh
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x445BB018 [Fri May 5 20:05:44 2006 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:
Instruction
add byte ptr [eax], al
add bl, bh
je 00007FE1A94BD2B2h
add byte ptr [ebp+00h], ah
add dword ptr [ecx], eax
daa
jne 00007FE1A94BD2B2h
add byte ptr [edi], bh
add byte ptr [eax], al
add al, ah
jne 00007FE1A94BD2B2h
add byte ptr [ebx], bh
add byte ptr [eax], al
add byte ptr [esi], al
jbe 00007FE1A94BD2B2h
add byte ptr [eax+eax], bh
add byte ptr [ecx], al
jbe 00007FE1A94BD2B3h
add byte ptr [00000000h], bh
add byte ptr [eax], al
add byte ptr [esi], bh
add byte ptr [ecx], al
add dword ptr [esi+76h], edx
inc eax
add byte ptr [eax+00h], al
add byte ptr [eax], al
lea esi, dword ptr [esi+40h]
add byte ptr [ecx+00h], al
add byte ptr [eax], al
mov cl, 76h
inc eax
add byte ptr [edx+00h], al
add dword ptr [ecx], eax
sal byte ptr [esi+40h], cl
add byte ptr [edi+00h], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
cmp dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
cmp al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
dec eax
add byte ptr [ecx], al
add ebp, esi
jbe 00007FE1A94BD2B2h
add byte ptr [ecx+00h], cl
add dword ptr [ecx], eax
cmc
jbe 00007FE1A94BD2B2h
add byte ptr [edx+00h], cl
add dword ptr [ecx], eax
cmc
jbe 00007FE1A94BD2B2h
add byte ptr [ebx+00h], cl
add dword ptr [ecx], eax
cmc
jbe 00007FE1A94BD2B2h
add byte ptr [esp+ebp], ah
inc eax
add byte ptr [eax], bl
sub al, 40h
add byte ptr [esp+ebp], cl
inc eax
add byte ptr [eax], al
sub al, 40h
add al, dh
sub eax, dword ptr [eax+00h]
loopne 00007FE1A94BD29Dh
inc eax
add al, dl
sub eax, dword ptr [eax+00h]
enter 402Bh, 00h
mov esp, A400402Bh
sub eax, dword ptr [eax+00h]
mov word ptr [ebx], gs
inc eax
add byte ptr [ebx+ebp+40h], dh
add byte ptr [ebx+ebp+40h], bl
add byte ptr [ebx+ebp+40h], al
add byte ptr [ebx+ebp], cl
inc eax
add ah, dl
sub al, byte ptr [eax+00h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11e8.hel
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.ruv0x10000xe50e0x9c00f3d0d2f956e17124980fc3486631200bFalse0.6396985176282052data6.6934444059000855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.mripyh0x100000x13490x8005e2a8a2af65c9f8b8b24b1f7a9c5baa8False0.40087890625data3.857753917563349IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.hel0x120000x120000x18006c1315ed8f3e358cc3637818b77a623fFalse0.6868489583333334GLS_BINARY_LSB_FIRST6.141759193168048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x240000x10000x400ecba31bbb49a29391bdde09f41160307False0.396484375data2.7116237328946085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:21:02:55
Start date:26/05/2024
Path:C:\Users\user\Desktop\X3wHy1PMMl.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\X3wHy1PMMl.exe"
Imagebase:0x400000
File size:50'176 bytes
MD5 hash:48CE1BD3CBE33CE89D634155C6B278DE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:21:02:56
Start date:26/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 228
Imagebase:0xaa0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:21:02:56
Start date:26/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 236
Imagebase:0xaa0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2179449932.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2179466314.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_X3wHy1PMMl.jbxd
    Similarity
    • API ID:
    • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
    • API String ID: 0-737691513
    • Opcode ID: 92ad40e12b5b9ca83e613088c96eb3170092a6257b6ab957ef2f7efa235b5116
    • Instruction ID: 4b9e0dc5a47fc770aedcef85d17b1e0fca7c52fc0c7d3ac56b664f5d562be6e9
    • Opcode Fuzzy Hash: 92ad40e12b5b9ca83e613088c96eb3170092a6257b6ab957ef2f7efa235b5116
    • Instruction Fuzzy Hash: 12D12271904306BAEB206B65CC4AFAF7EA8EF05354F10413BF641B52E2E77D89408B59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2179449932.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2179466314.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_X3wHy1PMMl.jbxd
    Similarity
    • API ID:
    • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll$D@$D@
    • API String ID: 0-3681558261
    • Opcode ID: dcffd30e4b0cfeb4b80cef083ec5b24645cfdc2d3f3a1acdd043da09b868c6c2
    • Instruction ID: 60ee9d50529d9df15cd2a3da8577dcf5633852abb6617781469f1f1128f32956
    • Opcode Fuzzy Hash: dcffd30e4b0cfeb4b80cef083ec5b24645cfdc2d3f3a1acdd043da09b868c6c2
    • Instruction Fuzzy Hash: 62C138B1E00609EFDB11DFA4C884AEFBBB9EF48304F14856AE401B7291D6399D45CF64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2179449932.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2179466314.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_X3wHy1PMMl.jbxd
    Similarity
    • API ID:
    • String ID: GetProcAddress$LoadLibraryA$Start Page$rsldps$software\microsoft\internet explorer\main
    • API String ID: 0-2928055629
    • Opcode ID: 05ef10f8dd0f4dfe0d43b3ad8746fc093c7f95163fd550942adb61598678d054
    • Instruction ID: 8557da7d7b0b91f9a9a278d3c1a389e7055539f1350d86f004240418f53f6a4e
    • Opcode Fuzzy Hash: 05ef10f8dd0f4dfe0d43b3ad8746fc093c7f95163fd550942adb61598678d054
    • Instruction Fuzzy Hash: DB51D8B1C00114BBDB10BBA69C82DAF7BA8EF45314F14457BFA04B22D2D73D5A5086AD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2179449932.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2179466314.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_X3wHy1PMMl.jbxd
    Similarity
    • API ID:
    • String ID: +[@$+[@$,$LLAH
    • API String ID: 0-2472503589
    • Opcode ID: cc4e49e9d1ea4b579ba4a651cc857b4e0cbc5d878ced4c6113a39ed1e53f598f
    • Instruction ID: ee61e99acda51c86a40c9a03ca0249e3dc979ee20e06e54da60ab79af239ea2d
    • Opcode Fuzzy Hash: cc4e49e9d1ea4b579ba4a651cc857b4e0cbc5d878ced4c6113a39ed1e53f598f
    • Instruction Fuzzy Hash: 9F8174B2940208BFDB10AFA1DC49EDB7BBCAB44704F10463BF611F21A1D7789654CBA9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2179449932.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2179466314.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2179478785.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_X3wHy1PMMl.jbxd
    Similarity
    • API ID:
    • String ID: *<input *value="$*<option selected$*<select $/
    • API String ID: 0-2404899240
    • Opcode ID: ef1a3a5739e78b1ba6ef1151291cf3afb4fda8275bc2e08cc8c1b1c81568a829
    • Instruction ID: 0074f75a3481265826c672ca4a3d8534fa1babf630769fc6125dfb1a8e74d136
    • Opcode Fuzzy Hash: ef1a3a5739e78b1ba6ef1151291cf3afb4fda8275bc2e08cc8c1b1c81568a829
    • Instruction Fuzzy Hash: A461C171D08109AFDF119B94CC85BEE7B79EF04304F1480BAE505B7292E6786E45CBA9