Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
n5GnRlKN80.exe

Overview

General Information

Sample name:n5GnRlKN80.exe
renamed because original name is a hash value
Original sample name:e20b6aef7d38aecf32a198d5abd3140d15e74386d1223cee0b788ef754a11577.bin.exe
Analysis ID:1447791
MD5:5cdd5ee5f6348fdfa96bc5c5d18ae405
SHA1:abfaad56092e61fc2fb5f2a89092378ece4b63b0
SHA256:e20b6aef7d38aecf32a198d5abd3140d15e74386d1223cee0b788ef754a11577
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

  • System is w10x64
  • n5GnRlKN80.exe (PID: 7500 cmdline: "C:\Users\user\Desktop\n5GnRlKN80.exe" MD5: 5CDD5EE5F6348FDFA96BC5C5D18AE405)
    • WerFault.exe (PID: 7604 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 244 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7672 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 248 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: n5GnRlKN80.exeAvira: detected
Source: n5GnRlKN80.exeReversingLabs: Detection: 75%
Source: n5GnRlKN80.exeVirustotal: Detection: 63%Perma Link
Source: n5GnRlKN80.exeJoe Sandbox ML: detected
Source: n5GnRlKN80.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\n5GnRlKN80.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 244
Source: n5GnRlKN80.exeStatic PE information: No import functions for PE file found
Source: n5GnRlKN80.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@3/9@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7500
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7ea243a4-b61e-44bb-b84a-dcdbcaf23aadJump to behavior
Source: C:\Users\user\Desktop\n5GnRlKN80.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: n5GnRlKN80.exeReversingLabs: Detection: 75%
Source: n5GnRlKN80.exeVirustotal: Detection: 63%
Source: unknownProcess created: C:\Users\user\Desktop\n5GnRlKN80.exe "C:\Users\user\Desktop\n5GnRlKN80.exe"
Source: C:\Users\user\Desktop\n5GnRlKN80.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 244
Source: C:\Users\user\Desktop\n5GnRlKN80.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 248
Source: C:\Users\user\Desktop\n5GnRlKN80.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .klencr
Source: n5GnRlKN80.exeStatic PE information: section name: .jkboz
Source: n5GnRlKN80.exeStatic PE information: section name: .klencr
Source: n5GnRlKN80.exeStatic PE information: section name: .srupun
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\n5GnRlKN80.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1447791 Sample: n5GnRlKN80.exe Startdate: 27/05/2024 Architecture: WINDOWS Score: 60 12 Antivirus / Scanner detection for submitted sample 2->12 14 Multi AV Scanner detection for submitted file 2->14 16 Machine Learning detection for sample 2->16 6 n5GnRlKN80.exe 2->6         started        process3 process4 8 WerFault.exe 16 6->8         started        10 WerFault.exe 19 16 6->10         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
n5GnRlKN80.exe75%ReversingLabsWin32.Trojan.Zeus
n5GnRlKN80.exe64%VirustotalBrowse
n5GnRlKN80.exe100%AviraTR/Crypt.XPACK.Gen
n5GnRlKN80.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447791
Start date and time:2024-05-27 03:03:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:n5GnRlKN80.exe
renamed because original name is a hash value
Original Sample Name:e20b6aef7d38aecf32a198d5abd3140d15e74386d1223cee0b788ef754a11577.bin.exe
Detection:MAL
Classification:mal60.winEXE@3/9@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 3
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target n5GnRlKN80.exe, PID 7500 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
21:04:12API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6324124174381265
Encrypted:false
SSDEEP:192:sFkvyS3/WDc0BU/JKvjEzuiF3Z24IO8ybp:/yS3/WDXBU/JKvjEzuiF3Y4IO8ybp
MD5:D0B3294A240143A2A354754BA169F83E
SHA1:0E84B0F0A6C98BF504821FCEFFA311E437D27DF6
SHA-256:C10B005BFFFF8AE7F91E301E9C09662BADEC2AD77B0C496C438051F172B78F9E
SHA-512:66938971577A86B194FF92F92194DB0BF29ADD6F8AD9D4445DA4C619209D63A08C8862C50FF3B10C0D00E4164E6F5E3F1E1EEC0681EB95ABA774FA44281ED08B
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.4.5.4.4.7.7.2.1.0.1.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.2.4.5.4.4.8.4.7.1.0.1.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.b.1.5.3.c.9.6.-.f.b.3.7.-.4.f.7.5.-.b.7.4.c.-.6.4.3.2.b.6.a.d.e.a.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.4.d.3.b.a.e.6.-.1.2.9.1.-.4.9.8.9.-.a.0.5.7.-.e.7.e.4.e.d.f.0.4.0.0.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.n.5.G.n.R.l.K.N.8.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.4.c.-.0.0.0.1.-.0.0.1.4.-.1.2.e.2.-.2.6.c.6.d.1.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.c.d.6.a.4.0.b.c.3.f.d.6.6.e.e.6.0.3.6.c.f.b.a.a.1.2.9.9.0.0.a.0.0.0.0.f.f.f.f.!.0.0.0.0.a.b.f.a.a.d.5.6.0.9.2.e.6.1.f.c.2.f.b.5.f.2.a.8.9.0.9.2.3.7.8.e.c.e.4.b.6.3.b.0.!.n.5.G.n.R.l.K.N.8.0...e.x.e.....T.a.r.g.e.t.A.p.p.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6285892320014808
Encrypted:false
SSDEEP:192:RwyS3FWDD0tM/vKvjEzuiF3Z24IO8Rbp:CyS3FWDwtM/vKvjEzuiF3Y4IO8Rbp
MD5:C032F2CBC4C47D6E0621029CCDB54E08
SHA1:7E49C42B62F4414D0B458AAF6F17D677CAE287D6
SHA-256:2EB9496B4AF6AB45C43C4C58A8CA222E92711D39DC70C01F55ED3AA0A2BDC58F
SHA-512:57702AEBECE90265892773699F8FFD9AAC1F3B0B17C4EA1BD7ED3998647F8C3342D9C71305153D9743478101D7EC2749B2958BDC1BC85DD650A8A35DCCEC4348
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.4.5.4.4.7.1.8.3.4.5.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.7.0.6.0.a.c.1.-.9.6.b.1.-.4.3.1.f.-.b.7.1.1.-.1.d.f.9.b.5.3.a.b.3.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.d.1.c.3.4.c.6.-.e.8.1.8.-.4.3.2.0.-.9.0.a.b.-.4.0.d.6.9.3.d.4.6.1.4.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.n.5.G.n.R.l.K.N.8.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.4.c.-.0.0.0.1.-.0.0.1.4.-.1.2.e.2.-.2.6.c.6.d.1.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.c.d.6.a.4.0.b.c.3.f.d.6.6.e.e.6.0.3.6.c.f.b.a.a.1.2.9.9.0.0.a.0.0.0.0.f.f.f.f.!.0.0.0.0.a.b.f.a.a.d.5.6.0.9.2.e.6.1.f.c.2.f.b.5.f.2.a.8.9.0.9.2.3.7.8.e.c.e.4.b.6.3.b.0.!.n.5.G.n.R.l.K.N.8.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.5././.0.3././.2.2.:.1.8.:.0.8.:.3.3.!.0.!.n.5.G.n.R.l.K.N.8.0...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 01:04:07 2024, 0x1205a4 type
Category:dropped
Size (bytes):18036
Entropy (8bit):1.930792902935173
Encrypted:false
SSDEEP:96:5d8eRWzSn10pE1i7nzySJuJtE0NsPUQWIkWIc4IQeMrI:oaT1O4PNsPUeMrI
MD5:118B5739EFA9139E94012497084B567C
SHA1:7686092FDC3CC279DF9950FBC50F3D0E80083C7D
SHA-256:0A55084D241963BEC52638D96AE5B57E2A0F213E77478B63FEE0FA86F8413614
SHA-512:37C6C6E85808101995CD1A0A1E6F73991A8CFA336A5415D3612BAFFCDA998CE98A6C6A558D142A500B18ACB21756BBECC750A8FAF2FDE61AABD262429463AC95
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Sf............4...............<.......d...............T.......8...........T...........p....=......................................................................................................eJ......L.......GenuineIntel............T.......L.....Sf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8350
Entropy (8bit):3.693515473668462
Encrypted:false
SSDEEP:192:R6l7wVeJvqT6JH6YSnSU9LNigmf7PGhpNt89b2bs1fPwjm:R6lXJvW6JH6YSSU9LNigmf7PGw2b2fI6
MD5:D9B43DFF3A895A30126EF804E829B001
SHA1:2792226946BAE2C8A1EC5367EE2379A17AF71F54
SHA-256:D8591197D8B02D0A7B7AE98ECD38FABFADECE9933C444454B136DC8349121F0F
SHA-512:FC7D197F2ACE4C5C418930F160BF8BD37E40E4F3ED215A4295240CFB61C43640748C2F9CF20B0ADA36160D0704A0397238E47632F5542FC2281C6CE6AFF96ABA
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.0.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4680
Entropy (8bit):4.444108086763028
Encrypted:false
SSDEEP:96:uIjfNI7+i7VnJe4BPVy6KFBPV+/toty8d:uIxY+i7Xe4F8F0/totp
MD5:998F314B44210678F434546B3084ACE3
SHA1:99424BF490122DB50EBE69C3578165EACEC89347
SHA-256:E59AC0ECD219A57A97A57C62E07EAEB2FB3D9D02FFF3B89109DC1D17E54005E8
SHA-512:0FC1A389A562FDFF82278E4B2F67006D90BB4F3E7BD9BF7F0F329689ECEE83AEC58D13C179E80C09906C14D47D06DC3D884CE5C467465A8FEB89509B9E3D338E
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="340806" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 01:04:07 2024, 0x1205a4 type
Category:dropped
Size (bytes):18760
Entropy (8bit):2.001915468527521
Encrypted:false
SSDEEP:96:5d8gfWzSTv1i7nzh9ujtk/foAQUQWIkWI/4ISyOuNti/:oo1O+GgzjyO0ti/
MD5:1DBEDDAA1C712C58BCD3C7B527ED988F
SHA1:9C7719ACE1553314AE25EB06CF47FED359EC0967
SHA-256:1E64495D40995E0E558FE8243E37434DBC71736481392E387537FDF604996EC6
SHA-512:F054CAC9271B64CAAD7B705746BF239C424E031BC80F806CB5CCD0291C926A3AEA9412B419A67EF6C653EC9979D09D54D099A0A6EF5FD9FBEC938E3239974811
Malicious:false
Reputation:low
Preview:MDMP..a..... .........Sf............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T.......L.....Sf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8290
Entropy (8bit):3.6970933856944255
Encrypted:false
SSDEEP:192:R6l7wVeJvqk6JtZ6YSmSU9LNigmfkPiDprM89b2bcsf+wjm:R6lXJvx6JtZ6YjSU9LNigmfkPiH2bvfk
MD5:B34B90BA7D71B53B4B55138DB215C94E
SHA1:E8961DAFA10F0F1DB811DE9522A2031DFB2EAA90
SHA-256:17AC4FA45DD83AE2A76259C4967F1654F5753DB85044F8CCD2BFFFB21A446CCC
SHA-512:F842B7566AF158EE6F05FCC94FD7A3261949CCBB0060556FA54403FDD8D8EED1CC635BF40897C8DA5B32C97C630A96A3B859B08EE7A9547E64E80872CC8AB29B
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.0.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4579
Entropy (8bit):4.455893951970642
Encrypted:false
SSDEEP:48:cvIwWl8zszJg77aI9ITWpW8VY0Ym8M4Je4gCNFMCaFvo+q8hgCdeCSU5htotydd:uIjfNI7+i7VAJe4BPVrOBd7P/totydd
MD5:E5ED8B3900C038B304100DFA916D7E0F
SHA1:01318CE19C8966085E00329AC645970D0B940D5B
SHA-256:8B86C5A42A10FACC1BF34CCA3710D7664A3078A9F44D556AA9347B5D9A0FE965
SHA-512:015D30D0B2694EAA838E35AED26551EA05585F384FBD27C75D04225F5E83E329A20744D5D3B6AB7B74DFBBE3E6CCA793F1AF759C4124FD1553882A0D6113B9D6
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="340806" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.372053803808925
Encrypted:false
SSDEEP:6144:XFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNviL:VV1QyWWI/glMM6kF7dq
MD5:A0D38C8DFC6D87D2B2077005EE75EF68
SHA1:F753B9B137E43D009230E6CBC04F1CCBA6E6D99D
SHA-256:BE3FA815B1BC484DADF91DCCEA83731332B419A864A6E9B9D2E4A93F4544DDFD
SHA-512:29CB33297C566B8CC878C497D4F5D3D9D3E34E10110F796872E8FC1A6BB582936D34AFE9624B93AA5FD17E001F03D7829DC213BBBC0A52A49F248556557B45CC
Malicious:false
Reputation:low
Preview:regfD...D....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.vS................................................................................................................................................................................................................................................................................................................................................q.E.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.7560826192300505
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Sybase iAnywhere database files (19/3) 0.00%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:n5GnRlKN80.exe
File size:47'104 bytes
MD5:5cdd5ee5f6348fdfa96bc5c5d18ae405
SHA1:abfaad56092e61fc2fb5f2a89092378ece4b63b0
SHA256:e20b6aef7d38aecf32a198d5abd3140d15e74386d1223cee0b788ef754a11577
SHA512:6a177230ec7aef0cf9b50ded49538d9ab6421915dfa081d34624b14cf1935958aef56aec8b1593aa9d7cd77d51b5c7e857ee570ac9a3a10be260356005f8325e
SSDEEP:768:AynUnSAvu6cMEtGhi2KKXpUBCA4gJ0GebDnQR8gIiMfp381c/LBe9F65qxtbwLD1:AyUnhvuqm8KKX4uXf1Lz38O4kExtbs
TLSH:D5238E1A72D2DDE2CE11407027EDFF7697BEF8336C24AC93831459895A22DD2811BA4B
File Content Preview:MZ..........................................................,.......o034..........I...6..eR.@w......".......^}f}(@.L.G.O.O.X.W.f.`......$.....^}f}(@.L.G.O.O.X.W.f.`3...*.7........J......G.q4..5...9...}.W......8...,.~.`gR...fU...Y|.N..w"!$.6......#.-....t+
Icon Hash:00928e8e8686b000
Entrypoint:0x4102bc
Entrypoint Section:.klencr
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x42405F21 [Tue Mar 22 18:08:33 2005 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:
Instruction
add byte ptr [eax], al
add byte ptr [eax], al
adc al, 11h
inc eax
add byte ptr [esp+ecx+41h], cl
add byte ptr [eax], al
add byte ptr [ecx+00h], al
dec eax
insd
or eax, 40110400h
add ah, dl
or eax, dword ptr [ecx+00h]
pop eax
add dword ptr [ecx+00h], eax
pushad
insd
or eax, 4010F800h
add al, ch
or al, 41h
add byte ptr [eax-2FFFBEFFh], ch
xchg dword ptr [esi], ecx
add al, ch
adc byte ptr [eax+00h], al
pop eax
or eax, dword ptr [ecx+00h]
push B0004100h
scasd
adc dword ptr [eax], eax
fcom qword ptr [eax]
inc eax
add al, ch
or al, byte ptr [ecx+00h]
and byte ptr [edx], al
inc ecx
add al, cl
scasd
adc dword ptr [eax], eax
int3
adc byte ptr [eax+00h], al
insb
or al, 41h
add byte ptr [eax-07FFBEFEh], bl
add dl, byte ptr [eax+eax]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
inc esp
add byte ptr [ecx], al
add dword ptr [edx], ecx
jc 00007FD0A95F2992h
add byte ptr [ebp+00h], al
add dword ptr [ecx], eax
jc 00007FD0A95F2993h
add byte ptr [edx+00h], al
add dword ptr [ecx], eax
inc esi
jc 00007FD0A95F2992h
add byte ptr [ebx+00h], al
add dword ptr [ecx], eax
bound esi, dword ptr [edx+40h]
add byte ptr [ebp+00h], ah
add byte ptr [eax], al
xor byte ptr [edx+40h], 00000000h
add byte ptr [eax], al
add byte ptr [edx+64004072h], al
add byte ptr [ecx], al
add dword ptr [esi+3F004072h], ebp
add byte ptr [eax], al
add byte ptr [edi+73h], ah
inc eax
add byte ptr [ebx], bh
add byte ptr [eax], al
add byte ptr [ebp+3C004073h], cl
add byte ptr [eax], al
add ebp, eax
jnc 00007FD0A95F2992h
add byte ptr [00000000h], bh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x11e0.srupun
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.jkboz0x10000xe3490x9200e5a09b025e6e2657d706e1f4e7c82d25False0.6392337328767124data6.7127177207901925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.klencr0x100000x13600x60028cccb6eb844edd770cd20f5bfd9bc6fFalse0.498046875data4.328304506425335IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.srupun0x120000x130000x1c00a125ff914c00123c55979e96079e7038False0.7018694196428571data6.393244874991497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:21:04:06
Start date:26/05/2024
Path:C:\Users\user\Desktop\n5GnRlKN80.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\n5GnRlKN80.exe"
Imagebase:0x400000
File size:47'104 bytes
MD5 hash:5CDD5EE5F6348FDFA96BC5C5D18AE405
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:21:04:07
Start date:26/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 244
Imagebase:0xc60000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:21:04:07
Start date:26/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 248
Imagebase:0xc60000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1439784904.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1439827854.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1439850046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_n5GnRlKN80.jbxd
    Similarity
    • API ID:
    • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
    • API String ID: 0-737691513
    • Opcode ID: ef5c846847f84f0e9d66147695999ff3258898dbfcd7c55f116a37233538873b
    • Instruction ID: 70ad86299ce65f304f07df4dd01fee24586ec881e54f3616d39ce46575f7bea1
    • Opcode Fuzzy Hash: ef5c846847f84f0e9d66147695999ff3258898dbfcd7c55f116a37233538873b
    • Instruction Fuzzy Hash: 2DD106B1E043057AEB206BA58D4AFAF3EA8AF51314F14407FF580B52D2EF7D89418B59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1439784904.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1439827854.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1439850046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_n5GnRlKN80.jbxd
    Similarity
    • API ID:
    • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
    • API String ID: 0-1780237566
    • Opcode ID: 494530a21cbceca3e0db01d9583dbaf78bd4040d22689b67190a4c0714f1f18d
    • Instruction ID: 4f77d030fb00911df7d8936b690bd4f1f49d61fc90d67f953e30212404501671
    • Opcode Fuzzy Hash: 494530a21cbceca3e0db01d9583dbaf78bd4040d22689b67190a4c0714f1f18d
    • Instruction Fuzzy Hash: 6551A6F28142047EDB01ABA59C46EFB3BECAB55708F04443AF911F7292EA789D05C768
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1439784904.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1439827854.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1439850046.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_n5GnRlKN80.jbxd
    Similarity
    • API ID:
    • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
    • API String ID: 0-471104514
    • Opcode ID: d77f079005d0f023bbf537e163b71a13ea96ca5f280a3e20be0852c9a285dab8
    • Instruction ID: a8045bf7166e3bcef58e980b0c977ee71a47b0656836553fcd4fdb92641b431f
    • Opcode Fuzzy Hash: d77f079005d0f023bbf537e163b71a13ea96ca5f280a3e20be0852c9a285dab8
    • Instruction Fuzzy Hash: 03C15EB5D00209AFDF10DF94C884EEEBBB9EF89304F1484AAE601B7291D7795E45CB64