Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XYYECgVGek.exe

Overview

General Information

Sample name:XYYECgVGek.exe
renamed because original name is a hash value
Original sample name:284f7bc4d18ca5d943269a375e81249dc5cdbfc4428382e196df552d50a6d2a2.bin.exe
Analysis ID:1447790
MD5:5fc65066299949ecffb04af69c37fd19
SHA1:8afe51f2a78fa8e0619226d903aea2dee6bf0067
SHA256:284f7bc4d18ca5d943269a375e81249dc5cdbfc4428382e196df552d50a6d2a2
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

  • System is w10x64
  • XYYECgVGek.exe (PID: 6812 cmdline: "C:\Users\user\Desktop\XYYECgVGek.exe" MD5: 5FC65066299949ECFFB04AF69C37FD19)
    • WerFault.exe (PID: 6652 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 328 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: XYYECgVGek.exeAvira: detected
Source: XYYECgVGek.exeReversingLabs: Detection: 91%
Source: XYYECgVGek.exeVirustotal: Detection: 79%Perma Link
Source: XYYECgVGek.exeJoe Sandbox ML: detected
Source: XYYECgVGek.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\XYYECgVGek.exeCode function: 0_2_004093310_2_00409331
Source: C:\Users\user\Desktop\XYYECgVGek.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 328
Source: XYYECgVGek.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6812
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a72ca411-8734-4d24-8dde-c257036956b4Jump to behavior
Source: C:\Users\user\Desktop\XYYECgVGek.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: XYYECgVGek.exeReversingLabs: Detection: 91%
Source: XYYECgVGek.exeVirustotal: Detection: 79%
Source: unknownProcess created: C:\Users\user\Desktop\XYYECgVGek.exe "C:\Users\user\Desktop\XYYECgVGek.exe"
Source: C:\Users\user\Desktop\XYYECgVGek.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 328
Source: C:\Users\user\Desktop\XYYECgVGek.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .bqn
Source: XYYECgVGek.exeStatic PE information: section name: .bmz
Source: XYYECgVGek.exeStatic PE information: section name: .ylyrul
Source: XYYECgVGek.exeStatic PE information: section name: .fwp
Source: XYYECgVGek.exeStatic PE information: section name: .bqn
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\XYYECgVGek.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
XYYECgVGek.exe92%ReversingLabsWin32.Trojan.Zeus
XYYECgVGek.exe80%VirustotalBrowse
XYYECgVGek.exe100%AviraTR/Crypt.XPACK.Gen
XYYECgVGek.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447790
Start date and time:2024-05-27 03:03:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:22
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:XYYECgVGek.exe
renamed because original name is a hash value
Original Sample Name:284f7bc4d18ca5d943269a375e81249dc5cdbfc4428382e196df552d50a6d2a2.bin.exe
Detection:MAL
Classification:mal60.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 3
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.168.117.173
  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, 6.d.a.8.b.e.f.b.0.0.0.0.0.0.0.0.4.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target XYYECgVGek.exe, PID 6812 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
21:04:19API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6934809829317575
Encrypted:false
SSDEEP:96:sy3CFIlSsbhkJ7xfSQXIDcQvc6QcEVcw3cE/9P9+HbHg/LZHLnxZOyWZAX/d5FMK:sSCIS70BU/wjvqzuiFcZ24IO8Co
MD5:B5A30707E460CA6B06FAA5A84588EA27
SHA1:EDA8D606C423E90FE8A54345269D5079BBC8B260
SHA-256:6C8FD2A0FE81B53B9378D040CCA1CD22465E3F0C7284D2A8C31933E52D1B55C7
SHA-512:8B9AFA3D668CD38F0A0437F25105062DCADFDD6756EAA674EC9F0C25A79AF0CCE87BBDF0F4A1759739A285D7907253C8440A2AE61D042A89A76822E47298A149
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.4.5.4.4.4.3.9.7.7.1.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.2.4.5.4.4.4.8.6.6.4.7.4.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.e.6.3.5.8.d.4.-.c.3.2.7.-.4.8.e.a.-.9.3.a.5.-.4.6.d.5.9.5.a.9.6.7.4.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.f.9.1.4.3.3.-.5.e.e.6.-.4.c.0.5.-.8.2.3.e.-.0.6.2.b.1.e.9.7.3.9.c.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.X.Y.Y.E.C.g.V.G.e.k...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.9.c.-.0.0.0.1.-.0.0.1.4.-.3.5.5.0.-.e.7.c.3.d.1.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.e.1.8.e.b.7.1.2.a.0.c.9.0.7.6.c.d.0.6.9.a.2.c.6.d.a.9.1.9.a.5.0.0.0.0.f.f.f.f.!.0.0.0.0.8.a.f.e.5.1.f.2.a.7.8.f.a.8.e.0.6.1.9.2.2.6.d.9.0.3.a.e.a.2.d.e.e.6.b.f.0.0.6.7.!.X.Y.Y.E.C.g.V.G.e.k...e.x.e.....T.a.r.g.e.t.A.p.p.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 01:04:04 2024, 0x1205a4 type
Category:dropped
Size (bytes):32546
Entropy (8bit):1.8597452819586235
Encrypted:false
SSDEEP:96:5i8pyIiyuKGA8gk0tRT+ri7Wrad1jXYpfGSZdED1SiI3K2k9c4rSVfWIkWI6MIMx:vTSNrOnjX0GSZiD1Sigu9can3GZK26
MD5:35FA130992EECC92433000A5F642436F
SHA1:BF607D350D660186E0A884BE0C2ED27C5F430F0F
SHA-256:E54C27F1FAC37B77AED7EE950BA6A468A8E2D6725D98802D110EF132B4020111
SHA-512:C8B2C0239878D622B104D67146E02DBC321770FDFED71755FBA6A8C10446FD3A17EB0B9FB6235CD355AED424A1B92AEB3A5407ABA80AF1D1EC695595B64FF171
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Sf....................................................T.......8...........T...........X....q......................t...............................................................................eJ..............GenuineIntel............T.............Sf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8298
Entropy (8bit):3.7024124591069727
Encrypted:false
SSDEEP:192:R6l7wVeJqL6p6YNXSU9X+gmfhf/+pr789bX3sfp9m:R6lXJW6p6YNSU9X+gmfhf/3X8fq
MD5:701D650A6EDADF4B660A3E07A99B1E5E
SHA1:70BE49B0F2ADCE8AAA948882B219A7362E11CF33
SHA-256:90ECE0013A4FB9674B707ABFB9A4E8B04799F0BC1865897B958A1CEE8902E600
SHA-512:14022B901EFB2F10D176726137F5470AED6F981AE8A3D7CE688630477DA88705AD2ACA636F8D3D75CD3DC95C50D9D03877388FDDB5CCE3E08CE66D69C5145342
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.1.2.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4579
Entropy (8bit):4.474979825480684
Encrypted:false
SSDEEP:48:cvIwWl8zszJg77aI9sPWpW8VYAYm8M4JxfvEMFFF9No+q8oaaNQhSiH8d:uIjfNI7ye7VkJxfMMFXoBaIQhSiH8d
MD5:125A60D105FA91606D5078822F5150A1
SHA1:1CCBFDB48512CACC77C4754FE537241E93FC9F25
SHA-256:748AA9BDAC8CBEF0414BEF055F910BD7FB053EC3F24E83E5F2CD542C3771DAC2
SHA-512:F4D09C828DCE9E1CC022D65003D84C75146F7D0367E0F9D31A42E5F2A798F841A73B4FC5A87788FEF4E067A7B0CBD3A56D8D0EC76411E60F16076545D33C50AA
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="340806" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.416672865959419
Encrypted:false
SSDEEP:6144:4cifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNi5+:ti58oSWIZBk2MM6AFBco
MD5:A47F0BA1470C30B8C309DEB9056D675F
SHA1:7637137D79B9C122C969C0CB4DE55AAA0B17D962
SHA-256:B554938403210501BF05E38713F1D02FBCA51E7038AC39C47E286E166F2430D2
SHA-512:8FBC42E51A11C18FBA89A07DD97DDF002A0F7279652D6CE2B2B007E193A3C833B5DB0BE43F8CFFB0EDCA90F45AFA32D4226390C3E355AB580E9DFE69B8FC2336
Malicious:false
Reputation:low
Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmJ..................................................................................................................................................................................................................................................................................................................................................=..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.767990952000876
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.98%
  • DOS Executable Generic (2002/1) 0.02%
File name:XYYECgVGek.exe
File size:42'496 bytes
MD5:5fc65066299949ecffb04af69c37fd19
SHA1:8afe51f2a78fa8e0619226d903aea2dee6bf0067
SHA256:284f7bc4d18ca5d943269a375e81249dc5cdbfc4428382e196df552d50a6d2a2
SHA512:ee03784f7135933d9f54413c210e8abadca4bb783bb04918f9bc7746b7f0bf23aea3a997b37163c92ab1299670afe4c63b96c139852e9f235d4017a4b1ce94ae
SSDEEP:768:RY+jvRwHqTH4uFU74LuVuLeBZfqM8hDNGa6+lTVBwbdsmpyQl7:RYWvRPL4uFnSuSBQVa+9/wbdhy47
TLSH:A2138EDA77E1C4F3DC9100702A69976A23EEDE3240658D47C36C499429719D3A12FE6B
File Content Preview:MZ................6.`............O...'... ......................^}f}(@.M.G.R.R.U.`.\4.<g..(...#.^}f}(@.._.RKP.......V..C..D..)H.....f......G...;...ova..PE..L....t.8..............b;.....&.......0...0........@.......................... .....................
Icon Hash:00928e8e8686b000
Entrypoint:0x413088
Entrypoint Section:.bqn
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x38C474C4 [Tue Mar 7 03:17:24 2000 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:b2702c7b457c1af08a6c90258b7c66c7
Instruction
mov edi, 00000027h
xor ebx, ebx
inc edi
mov eax, 00000000h
xor eax, eax
mov edi, 00000000h
mov ebx, edi
mov ebx, 000000C4h
mov ebx, 004130D4h
xor edi, ebx
mov edi, 000000D6h
mov edi, 004132E2h
inc byte ptr [ebx]
inc ebx
xor edx, edx
cmp ebx, 004132E2h
jne 00007F89F8C687C5h
inc eax
mov ecx, 00000000h
xor ecx, eax
xor ecx, ecx
cmp eax, 00019AD0h
jne 00007F89F8C68797h
xor ebx, edi
nop
nop
nop
mov eax, dword ptr [esp]
xor ax, ax
push 0000FFFFh
push 5D7574B6h
push 71E40722h
push 15F8EF80h
push D66358ECh
mov edi, esp
cmp word ptr [eax], 5A4Dh
jne 00007F89F8C687E5h
mov edx, dword ptr [eax+3Ch]
cmp edx, 00001000h
jnbe 00007F89F8C687DAh
cmp word ptr [eax+edx], 4550h
je 00007F89F8C687D9h
sub eax, 00010000h
jmp 00007F89F8C687B1h
push eax
mov esi, dword ptr [eax+edx+78h]
add esi, eax
add esi, 18h
xchg eax, ebx
lodsd
push eax
lodsd
push eax
lodsd
push eax
add eax, ebx
push eax
lodsd
push eax
mov ebp, esp
mov ecx, dword ptr [ebp+10h]
xor edx, edx
mov esi, dword ptr [ebp+04h]
mov esi, dword ptr [esi]
add esi, ebx
xor eax, eax
push eax
ror eax, 07h
xor dword ptr [esp], eax
lodsb
test al, al
jne 00007F89F8C687C7h
pop eax
push edi
cmp dword ptr [edi], 000000FFh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x130180x74.bqn
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1120.fwp
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.bmz0x10000xd4de0x88006cb4b4aa6c06ba270e800f615714f753False0.6440142463235294data6.709000337249343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.ylyrul0xf0000x13000x400c01f2331b018ce563df43a9b9a12e9dcFalse0.494140625data3.82379015159714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.fwp0x110000x11500x12007d8d8690f46af27deb24406ed494fa8eFalse0.8020833333333334data6.5743808063928855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bqn0x130000xf0000x400940847b1dbc7269f2118688652310a34False0.8125data6.231958684449648IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
shell32.dllSHBrowseForFolderA, SHFileOperationA
TimestampSource PortDest PortSource IPDest IP
May 27, 2024 03:04:24.547022104 CEST53516821.1.1.1192.168.2.7
May 27, 2024 03:04:51.218760014 CEST5357833162.159.36.2192.168.2.7
May 27, 2024 03:04:52.060457945 CEST53631201.1.1.1192.168.2.7

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:21:04:03
Start date:26/05/2024
Path:C:\Users\user\Desktop\XYYECgVGek.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\XYYECgVGek.exe"
Imagebase:0x400000
File size:42'496 bytes
MD5 hash:5FC65066299949ECFFB04AF69C37FD19
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:21:04:04
Start date:26/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 328
Imagebase:0xac0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.1385440069.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1385412772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385457476.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385472541.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385488970.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_XYYECgVGek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction ID: ae42489584d8f454c4d26df400c6142c902132189950ac7d3556678ec97d8bd3
    • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
    • Instruction Fuzzy Hash: B0817032D0952ADBDF15CE58C9406ADB7B1EB85324F1542AAEC56BB3C2C334AD42DBC4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1385440069.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1385412772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385457476.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385472541.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385488970.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_XYYECgVGek.jbxd
    Similarity
    • API ID:
    • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
    • API String ID: 0-737691513
    • Opcode ID: 04cc8d570ec73210cf5e2046091b9f394282551419ddbe29c7271f7fede9d7f2
    • Instruction ID: 8dc1f84bb5c1dcb92be229210c6c805f0271fcf05725c4ca1e9200c46726ad31
    • Opcode Fuzzy Hash: 04cc8d570ec73210cf5e2046091b9f394282551419ddbe29c7271f7fede9d7f2
    • Instruction Fuzzy Hash: FAD1F471E08305BAFB206B758D4AFAF7E79AF01314F14403BF904B51D2EA7DA941875A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1385440069.0000000000401000.00000008.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1385412772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385457476.000000000040F000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385472541.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1385488970.0000000000413000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_XYYECgVGek.jbxd
    Similarity
    • API ID:
    • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
    • API String ID: 0-1780237566
    • Opcode ID: 088afcfed5fc1dbe4f17afd226ab5fc3f97d9bf1a661a27fa7f27897b77fbee9
    • Instruction ID: acaf3fd7290626fa2f0e730b1ae233165bd978760014ee3fb4178f56bfaa7f14
    • Opcode Fuzzy Hash: 088afcfed5fc1dbe4f17afd226ab5fc3f97d9bf1a661a27fa7f27897b77fbee9
    • Instruction Fuzzy Hash: 6F51B0B25002067EDB01BBB5DD42EBB77BDAB09704F04053FB950F32A2EA7995148B78