Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BITCC70.exe

Overview

General Information

Sample name:BITCC70.exe
renamed because original name is a hash value
Original sample name:BITCC70.tmp
Analysis ID:1467076
MD5:cbdcb926bfeee7882259772315e97fc8
SHA1:7436766c5de4f2550fafffcbb4465caf689a9e03
SHA256:786bf17e8789856ac2a00eea8d589032985f32013a15ea5c2f4fe21433a07ac6
Infos:

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AI detected suspicious sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
One or more processes crash
PE file contains an invalid checksum
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • BITCC70.exe (PID: 516 cmdline: "C:\Users\user\Desktop\BITCC70.exe" MD5: CBDCB926BFEEE7882259772315E97FC8)
    • WerFault.exe (PID: 6152 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.7% probability
Source: BITCC70.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: BITCC70.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\BITCC70.exeCode function: 6_2_0040324A6_2_0040324A
Source: C:\Users\user\Desktop\BITCC70.exeCode function: 6_2_004040256_2_00404025
Source: C:\Users\user\Desktop\BITCC70.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 228
Source: BITCC70.exeStatic PE information: No import functions for PE file found
Source: BITCC70.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus25.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess516
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f73e3931-f7e5-4a67-8f1b-fcb9309935faJump to behavior
Source: BITCC70.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\BITCC70.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\BITCC70.exe "C:\Users\user\Desktop\BITCC70.exe"
Source: C:\Users\user\Desktop\BITCC70.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 228
Source: C:\Users\user\Desktop\BITCC70.exeSection loaded: apphelp.dllJump to behavior
Source: BITCC70.exeStatic file information: File size 1341272 > 1048576
Source: BITCC70.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x124600
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: BITCC70.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: BITCC70.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: BITCC70.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: BITCC70.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: BITCC70.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: BITCC70.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: BITCC70.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: BITCC70.exeStatic PE information: real checksum: 0x14f75e should be: 0x155aa5
Source: C:\Users\user\Desktop\BITCC70.exeCode function: 6_2_00405556 push ecx; ret 6_2_00405569
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\BITCC70.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\BITCC70.exeCode function: 6_2_004051B2 LdrInitializeThunk,6_2_004051B2
Source: C:\Users\user\Desktop\BITCC70.exeCode function: 6_2_0040556B cpuid 6_2_0040556B
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467076 Sample: BITCC70.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 25 10 AI detected suspicious sample 2->10 6 BITCC70.exe 2->6         started        process3 process4 8 WerFault.exe 21 16 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.10.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467076
Start date and time:2024-07-03 17:33:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Potential for more IOCs and behavior
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:BITCC70.exe
renamed because original name is a hash value
Original Sample Name:BITCC70.tmp
Detection:SUS
Classification:sus25.winEXE@2/5@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 3
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: BITCC70.exe
TimeTypeDescription
11:34:23API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.6410159564635556
Encrypted:false
SSDEEP:96:aeF8S2hm47dCsVhZoI7Rq6tQXIDcQvc6QcEVcw3cE/9Bz+HbHg6ZAX/d5FMT2SlB:NJ2hm47dCD0BU/gjEzuiFbZ24IO83
MD5:EC397C914FC5793D5DB09AFD6C2D55FD
SHA1:63A437A03585BB5EEAD990DAA9D7D7EC9CE51D2B
SHA-256:5C756648A5F6C5CB553E3F672E43CB5F3D15E6199CD2CDF1D1201C87F9825C5E
SHA-512:3EACBDEB516A7CD758E1E0D07DEF73E4E0028A8B3C230838AE78F6B55F85AE5BD11546EBA26036601A5C61FA9A2CA8F27638A402E99B7A8A503435AA869E1908
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.9.4.4.4.8.9.5.4.9.8.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.9.4.4.4.9.5.1.7.4.9.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.2.d.4.d.d.5.a.-.d.1.1.6.-.4.5.4.0.-.9.3.4.b.-.7.f.8.4.7.2.5.b.7.3.0.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.f.3.7.d.c.8.-.6.a.b.6.-.4.9.c.7.-.9.3.2.4.-.1.f.1.5.5.8.c.d.d.a.5.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.B.I.T.C.C.7.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.0.4.-.0.0.0.1.-.0.0.1.4.-.9.a.b.c.-.1.4.7.2.5.e.c.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.8.0.f.e.5.c.3.5.1.d.b.d.a.1.a.3.5.2.1.c.2.7.5.f.9.7.6.b.0.1.e.0.0.0.0.f.f.f.f.!.0.0.0.0.7.4.3.6.7.6.6.c.5.d.e.4.f.2.5.5.0.f.a.f.f.f.c.b.b.4.4.6.5.c.a.f.6.8.9.a.9.e.0.3.!.B.I.T.C.C.7.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.0.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Jul 3 15:34:09 2024, 0x1205a4 type
Category:dropped
Size (bytes):18478
Entropy (8bit):1.925982788502072
Encrypted:false
SSDEEP:96:5g8YBOQyIJAPltei7nvJEtbNqDHEimfI/WIkWIgyIxDWLj9DJbO:RDRPveOxqarDDW7O
MD5:D941EDD7806FF3FF3E3D6580EC4E681C
SHA1:A311A159508A8FED6177C9662953DB0A50C10DD8
SHA-256:12EDE697C22AB19EE9224093B2F8E91186E0C0AF12EFB45EC1AE01BA5E69CC26
SHA-512:80D8A2C206D5BB79F0C405F3D371FBF7276082D079835347ACEDD51301AE84375238BB9D9CA733AC9E169D5C30D88063D5344FF1E1CF8010F037AB9DAF03B262
Malicious:false
Reputation:low
Preview:MDMP..a..... .......qo.f............4...............<.......T...............T.......8...........T...........p....>......................................................................................................eJ......L.......GenuineIntel............T...........po.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8368
Entropy (8bit):3.697597571239088
Encrypted:false
SSDEEP:192:R6l7wVeJrI6y86YNsSU9vxgmfPpprj89bYIsfACAom:R6lXJU6y86YmSU9pgmfPgY7fACm
MD5:F4C862B9AB2009950FCB06843A16725E
SHA1:92999866252AFE60EA6E44589A6AFBA2CC3D6B5C
SHA-256:DD12B8961294883A21E53A1B4D4DF7F513376F9A6C98A845234C8F17DEE1745F
SHA-512:2F24A7C5E765F75810E20B2E40587A87F97C3BE2AFCDBB71756F6447AF37BB85299DEBE241163CC6B66A8689F369E5FA4E31806BE2A7CD1D0FB23355B16196F3
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.6.<./.P.i.d.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4710
Entropy (8bit):4.476660206307657
Encrypted:false
SSDEEP:48:cvIwWl8zs6Jg77aI92pWpW8VYvYm8M4JIjEFgZxsK+q8vTjuwe8d:uIjfII74Y7V3JaUKKGwe8d
MD5:E2C5AF3906C2205969279A37D34D8346
SHA1:3B69856B68B29B2BDD4E7AE058F2D1A6A1F9120A
SHA-256:799121DA0B89CE2E38399AD29366C3618775A76233113BA2FF9420C9C8378031
SHA-512:620412447293A835C2DD0E40B28421B04C19A962659BE8D1BB14CCF3AC252BB43BCD8CB59BDA921D19C6CFB3799CA01D530FA67E25A162680FDBC78AD14F1E6B
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="394956" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.416633198790115
Encrypted:false
SSDEEP:6144:kcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNw5+:Ji58oSWIZBk2MM6AFBao
MD5:08A94EB3D6474D6A6DD61954952E4348
SHA1:03EA045EA0009F2D3CDF8EFDFB2DFD3A3C34A888
SHA-256:38158A4FF16B15F6D0137E20D430CE578E6FC35A0854AF79E1840C80B1A40C44
SHA-512:C16BEDA738FE3A50AC02BCC3B3447ADDFF747C57D35EF01208C4E797C997C7BECFB15E72D3304282874E510118DC44FAD6F6041D41F5BFBCAE892B3DFE79EBF2
Malicious:false
Reputation:low
Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>.Er^.................................................................................................................................................................................................................................................................................................................................................SF........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):0.20097591751921548
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:BITCC70.exe
File size:1'341'272 bytes
MD5:cbdcb926bfeee7882259772315e97fc8
SHA1:7436766c5de4f2550fafffcbb4465caf689a9e03
SHA256:786bf17e8789856ac2a00eea8d589032985f32013a15ea5c2f4fe21433a07ac6
SHA512:288e12d1685e06b00fc1cba19f649f4e5efcfd2ce0787065f4a398be0e2cab262b87396849c275610fda1c5ca0a46f841ac7a1728f3c0639ee23d810dd2f2384
SSDEEP:768:HkFQ5Co+hQWsw5OLNIGtUtititEPQDj5Sq7Xmfg6ueV8tQ:fCoO5OLmk1uF
TLSH:10556D229E51C0A1C97E0A32524EFDB1B4FFF97C025166839FE599136E1EE85C03E297
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f..............\.K.....\.I.....\.H.....\m......\m......\m.......l......\.U..............lE.......-......l......Rich...........
Icon Hash:00928e8e8686b000
Entrypoint:0x404f17
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x614410AB [Fri Sep 17 03:51:07 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:
Signature Valid:
Signature Issuer:
Signature Validation Error:
Error Number:
Not Before, Not After
    Subject Chain
      Version:
      Thumbprint MD5:
      Thumbprint SHA-1:
      Thumbprint SHA-256:
      Serial:
      Instruction
      call 00007F7D812A2A98h
      jmp 00007F7D812A262Fh
      push ebp
      mov ebp, esp
      mov eax, dword ptr [0041D018h]
      and eax, 1Fh
      push 00000020h
      pop ecx
      sub ecx, eax
      mov eax, dword ptr [ebp+08h]
      ror eax, cl
      xor eax, dword ptr [0041D018h]
      pop ebp
      ret
      push ebp
      mov ebp, esp
      mov eax, dword ptr [ebp+08h]
      push esi
      mov ecx, dword ptr [eax+3Ch]
      add ecx, eax
      movzx eax, word ptr [ecx+14h]
      lea edx, dword ptr [ecx+18h]
      add edx, eax
      movzx eax, word ptr [ecx+06h]
      imul esi, eax, 28h
      add esi, edx
      cmp edx, esi
      je 00007F7D812A27CBh
      mov ecx, dword ptr [ebp+0Ch]
      cmp ecx, dword ptr [edx+0Ch]
      jc 00007F7D812A27BCh
      mov eax, dword ptr [edx+08h]
      add eax, dword ptr [edx+0Ch]
      cmp ecx, eax
      jc 00007F7D812A27BEh
      add edx, 28h
      cmp edx, esi
      jne 00007F7D812A279Ch
      xor eax, eax
      pop esi
      pop ebp
      ret
      mov eax, edx
      jmp 00007F7D812A27ABh
      push esi
      call 00007F7D812A2F2Fh
      test eax, eax
      je 00007F7D812A27D2h
      mov eax, dword ptr fs:[00000018h]
      mov esi, 0041D814h
      mov edx, dword ptr [eax+04h]
      jmp 00007F7D812A27B6h
      cmp edx, eax
      je 00007F7D812A27C2h
      xor eax, eax
      mov ecx, edx
      lock cmpxchg dword ptr [esi], ecx
      test eax, eax
      jne 00007F7D812A27A2h
      xor al, al
      pop esi
      ret
      mov al, 01h
      pop esi
      ret
      push ebp
      mov ebp, esp
      cmp dword ptr [ebp+08h], 00000000h
      jne 00007F7D812A27B9h
      mov byte ptr [0041D818h], 00000001h
      call 00007F7D812A2D57h
      call 00007F7D812A31C5h
      test al, al
      jne 00007F7D812A27B6h
      xor al, al
      pop ebp
      ret
      call 00007F7D812A58D6h
      test al, al
      jne 00007F7D812A27BCh
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1c4680x78.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1f0000x1244e8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x141a000x5d58
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1440000x10e0.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x1bad00x54.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1bb280x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x160000x1a0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x1442f0x146006d3c493fb17e48518060e8cd249b8148False0.1605037384969325data2.2567413051962735IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x160000x6dac0x6e00cf26b39e7e03767333e01134b2429010False0.0017755681818181818data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x1d0000x12900xa00a371492f16c0940507435909603efe88False0.009375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1f0000x1244e80x1246002cc17499098e539cc4a496d494fb75a2False0.0009878353463018384data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x1440000x10e00x1200b1e27aa018409de6bfd73f8afb883a65False0.005859375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:6
      Start time:11:34:08
      Start date:03/07/2024
      Path:C:\Users\user\Desktop\BITCC70.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\BITCC70.exe"
      Imagebase:0x400000
      File size:1'341'272 bytes
      MD5 hash:CBDCB926BFEEE7882259772315E97FC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:10
      Start time:11:34:08
      Start date:03/07/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 228
      Imagebase:0x990000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:0.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:28.6%
        Total number of Nodes:7
        Total number of Limit Nodes:0
        execution_graph 2205 404f17 2208 4051ff 2205->2208 2207 404f1c 2207->2207 2209 405215 2208->2209 2211 40521e 2209->2211 2212 4051b2 LdrInitializeThunk 2209->2212 2211->2207 2213 4051d9 2212->2213 2213->2211
        Strings
        Memory Dump Source
        • Source File: 00000006.00000002.1418933578.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000006.00000002.1418917267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_400000_BITCC70.jbxd
        Similarity
        • API ID:
        • String ID: ?@
        • API String ID: 0-3392405296
        • Opcode ID: 4e4784f7e0b2912510f1f4db1f13e7d1b23b13bc8c26a916381265236119ec59
        • Instruction ID: 59ad17f68d095d7d3016612117b649c2e40764180bcb4c8e8ae3871492fb8fd9
        • Opcode Fuzzy Hash: 4e4784f7e0b2912510f1f4db1f13e7d1b23b13bc8c26a916381265236119ec59
        • Instruction Fuzzy Hash: 7E927F72E101298FDB18CFADC9806ACBBF2BF89341F15427AE455F7385E6389A41CB54
        Memory Dump Source
        • Source File: 00000006.00000002.1418933578.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000006.00000002.1418917267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_400000_BITCC70.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 07742bc48a47d668c5b7ba0a761fa324f4e69b4b27f22652eb96e8f34f5a8860
        • Instruction ID: eb96918d260fd90e639c7953e409dc6ba44fcf4b02c3a2910948117c73e549c9
        • Opcode Fuzzy Hash: 07742bc48a47d668c5b7ba0a761fa324f4e69b4b27f22652eb96e8f34f5a8860
        • Instruction Fuzzy Hash: 0B02C4B2F001259FDF04CA78C98467CBBF2BBC5345F114276E656EB284E638D981CB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 14 405880-4058d1 call 405840 call 405cf7 20 4058d3-4058e5 14->20 21 40592d-405930 14->21 22 405950-405959 20->22 24 4058e7-4058fe 20->24 21->22 23 405932-40593f call 405ce0 21->23 28 405944-40594d call 405840 23->28 26 405900-40590e call 405c90 24->26 27 405914 24->27 36 405910 26->36 37 405924-40592b 26->37 30 405917-40591c 27->30 28->22 30->24 31 40591e-405920 30->31 31->22 34 405922 31->34 34->28 38 405912 36->38 39 40595a-405963 36->39 37->28 38->30 40 405965-40596c 39->40 41 40599d-4059ad call 405cc4 39->41 40->41 43 40596e-40597d 40->43 45 4059c1-4059dd call 405840 call 405ca8 41->45 46 4059af-4059be call 405ce0 41->46 50 40599a 43->50 51 40597f-405997 43->51 46->45 50->41 51->50
        APIs
        • _ValidateLocalCookies.LIBCMT ref: 004058B7
        • ___except_validate_context_record.LIBVCRUNTIME ref: 004058BF
        • _ValidateLocalCookies.LIBCMT ref: 00405948
        • _ValidateLocalCookies.LIBCMT ref: 004059C8
        Strings
        Memory Dump Source
        • Source File: 00000006.00000002.1418933578.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000006.00000002.1418917267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_400000_BITCC70.jbxd
        Similarity
        • API ID: CookiesLocalValidate$___except_validate_context_record
        • String ID: csm
        • API String ID: 2101322661-1018135373
        • Opcode ID: 59df14a356989e39687bf01535ae3d615d0f1d46a4eb88d9b7a263f2ac7fbccd
        • Instruction ID: d136ae7ba25870899988bdb39c6e5800b3a2aa53295376701b78973fc669c532
        • Opcode Fuzzy Hash: 59df14a356989e39687bf01535ae3d615d0f1d46a4eb88d9b7a263f2ac7fbccd
        • Instruction Fuzzy Hash: 6D41B470A00614DBCF10EF59C884A9F7BA5EF44328F14806AE8187B392D739DA55CF99