Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe
Analysis ID:1508669
MD5:85877d16342cea80354627b1e26bd1a5
SHA1:0db5402908665862107f36edf4cda9daa913ba61
SHA256:309d16af0620da1d4811bdbffac56cbe4cfbbb2b1a190073571e7efe0b3f6b2a
Tags:exe
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Contains capabilities to detect virtual machines
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
IP address seen in connection with other malware
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeReversingLabs: Detection: 79%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeJoe Sandbox ML: detected
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215670015.0000000140D4F000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: loader.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000003.2060451798.00000000004D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215530451.00000001400F9000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215670015.0000000140D4F000.00000040.00000001.01000000.00000003.sdmp
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 51.38.37.194:3333
Source: Joe Sandbox ViewIP Address: 51.222.31.217 51.222.31.217
Source: Joe Sandbox ViewIP Address: 103.251.113.36 103.251.113.36
Source: Joe Sandbox ViewIP Address: 51.38.37.194 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: unknownTCP traffic detected without corresponding DNS query: 51.38.37.194
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 744 -s 616
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: Number of sections : 13 > 10
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: Section: ZLIB complexity 0.9994698397737983
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
Source: classification engineClassification label: mal88.evad.winEXE@2/5@0/5
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess744
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a3464d11-e4a6-43d3-932e-f0f9376c2febJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeReversingLabs: Detection: 79%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 744 -s 616
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSection loaded: cryptbase.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic file information: File size 14287888 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0xced800
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215670015.0000000140D4F000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: loader.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000003.2060451798.00000000004D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215530451.00000001400F9000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215670015.0000000140D4F000.00000040.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name:
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name: .boot
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeStatic PE information: section name: entropy: 7.986056231058502

Boot Survival

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe, 00000000.00000002.2215068694.000000000056C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllot #
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeSystem information queried: ModuleInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeOpen window title or class name: regmonclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeOpen window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeOpen window title or class name: filemonclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeNtQuerySystemInformation: Indirect: 0x140E4F307Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping421
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
2
Software Packing
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe79%ReversingLabsWin64.Infostealer.Tinba
SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe100%AviraBDS/Agent.rlulr
SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
51.222.31.217
unknownFrance
16276OVHFRfalse
103.230.14.225
unknownHong Kong
55953XIM-HKRoom704ChinaChenLeightonPlazaHKfalse
77.105.172.225
unknownRussian Federation
43176ICOMF-ASRUfalse
103.251.113.36
unknownHong Kong
133380LAYER-ASLayerstackLimitedHKfalse
51.38.37.194
unknownFrance
16276OVHFRfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1508669
Start date and time:2024-09-10 15:25:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe
Detection:MAL
Classification:mal88.evad.winEXE@2/5@0/5
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe
TimeTypeDescription
09:26:18API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
51.222.31.2170Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
    LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
      LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
        LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
          LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
            SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                uF57zn1zFCF77zYR.exeGet hashmaliciousUnknownBrowse
                  uF57zn1zFCF77zYR.exeGet hashmaliciousUnknownBrowse
                    103.230.14.2250Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                      LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                            77.105.172.2250Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                              103.251.113.360Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                                LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                                  LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                                    LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                      LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                            uF57zn1zFCF77zYR.exeGet hashmaliciousUnknownBrowse
                                              uF57zn1zFCF77zYR.exeGet hashmaliciousUnknownBrowse
                                                51.38.37.1940Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                                                  LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                                                    LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                                                      LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                                        LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                                          SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                                            SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                                              uF57zn1zFCF77zYR.exeGet hashmaliciousUnknownBrowse
                                                                uF57zn1zFCF77zYR.exeGet hashmaliciousUnknownBrowse
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  XIM-HKRoom704ChinaChenLeightonPlazaHK0Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.230.14.225
                                                                  LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.230.14.225
                                                                  SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.230.14.225
                                                                  SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.230.14.225
                                                                  OVHFRhttps://www.tiktok.com/////link/v2?aid=1988&lang=enFSmPWg&scene=bio_url&target=google.com.////amp/s/%E2%80%8Bva%C2%ADnd%C2%ADat%C2%ADco%E2%80%8B.%C2%ADv%C2%ADn/.dev/ChZuQF9L/bHlubi5wYXJzb25zQGltYWdvLmNvbW11bml0eQ===$%E3%80%82Get hashmaliciousHTMLPhisherBrowse
                                                                  • 51.178.195.217
                                                                  https://kby.oqp.mybluehost.me/wp-admin/20191952407230/account/amendes2024orgGet hashmaliciousUnknownBrowse
                                                                  • 91.134.109.31
                                                                  https://kby.oqp.mybluehost.me/wp-admin/20191952407230/account/amendes2024org/infospage.phpGet hashmaliciousUnknownBrowse
                                                                  • 91.134.109.31
                                                                  https://kby.oqp.mybluehost.me/wp-admin/20191952407230/account/amendes2024org/3dsec.phpGet hashmaliciousUnknownBrowse
                                                                  • 137.74.125.233
                                                                  https://kby.oqp.mybluehost.me/wp-admin/20191952407230/account/amendes2024org/3dsece.phpGet hashmaliciousUnknownBrowse
                                                                  • 137.74.125.233
                                                                  https://kby.oqp.mybluehost.me/wp-admin/20191952407230/account/amendes2024org/paiement.phpGet hashmaliciousUnknownBrowse
                                                                  • 91.134.109.31
                                                                  https://emailmarketing.locaweb.com.br/accounts/193978/messages/3/clicks/1078/3?envelope_id=3Get hashmaliciousUnknownBrowse
                                                                  • 91.134.109.31
                                                                  https://sucursal-virtual123.w3spaces.com/Get hashmaliciousUnknownBrowse
                                                                  • 51.77.64.70
                                                                  https://holidayvisuals.com/Payment_receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                                  • 51.89.199.99
                                                                  Chrome.exeGet hashmaliciousXmrigBrowse
                                                                  • 54.37.232.103
                                                                  ICOMF-ASRUgobEmOm5sr.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                                                  • 77.105.164.24
                                                                  FileApp.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Stealc, Vidar, Xmrig, zgRATBrowse
                                                                  • 77.105.164.24
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.164.24
                                                                  kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                                                                  • 77.105.164.24
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.164.24
                                                                  0Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.172.225
                                                                  ozA28PDMTu.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.164.24
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.164.24
                                                                  66b9e7f54cf7b_pro.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.164.24
                                                                  SecuriteInfo.com.Trojan.MulDrop28.3097.13525.30211.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.105.164.24
                                                                  LAYER-ASLayerstackLimitedHKSecuriteInfo.com.Trojan.GenericKD.73873010.20504.26058.exeGet hashmaliciousUnknownBrowse
                                                                  • 43.228.126.4
                                                                  SecuriteInfo.com.Trojan.GenericKD.73873010.20504.26058.exeGet hashmaliciousUnknownBrowse
                                                                  • 43.228.126.4
                                                                  0Ig0ovoll2k6.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  LisectAVT_2403002A_234.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  SecuriteInfo.com.Win64.Evo-gen.8630.20101.exeGet hashmaliciousUnknownBrowse
                                                                  • 103.251.113.36
                                                                  xfO72LuQ7K.elfGet hashmaliciousUnknownBrowse
                                                                  • 103.254.214.105
                                                                  No context
                                                                  No context
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.9329136481575825
                                                                  Encrypted:false
                                                                  SSDEEP:96:RcFXcl17sIhqFi7qIf4QXIDcQyc6ycEncw3SH+HbHg/HgoXO+ZuUXqOE8OQ5oEEm:Ws170fY0s29njufFRzuiFvZ24lO8L
                                                                  MD5:BE71C9C9389C9E19F18206E9FE0E5B90
                                                                  SHA1:57881BC96301D8C4D5082CF30D462A05D6DD401B
                                                                  SHA-256:FC956BC8D3ED2F7E18CFA2F848766E974250AABC0102FAD1E83A81237DA5AE22
                                                                  SHA-512:847C5F2CF86B47D8C828A9A6E91ED1C5AABD394620C5C29FC24706736047589A226F12B1A44DDBBD88CFC71D62C3FB22BF91ED44057E256350E60EF5217DFEEB
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.4.4.8.3.6.5.9.0.5.6.2.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.4.4.8.3.6.6.2.4.9.3.6.9.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.7.5.9.c.9.8.9.-.d.0.0.8.-.4.0.0.a.-.b.b.5.a.-.a.a.d.d.6.1.2.0.1.c.5.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.4.d.e.0.7.e.f.-.6.5.f.d.-.4.e.f.8.-.b.a.2.0.-.f.6.4.b.3.3.d.9.0.3.2.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.6.4...M.a.l.w.a.r.e.X.-.g.e.n...2.1.4.4.2...4.0.7.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.e.8.-.0.0.0.1.-.0.0.1.4.-.f.f.4.3.-.8.d.f.b.8.4.0.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.b.1.5.9.8.b.3.a.7.d.7.0.1.b.a.c.e.d.f.c.c.b.c.0.9.c.6.a.9.4.4.0.0.0.0.f.f.f.f.!.0.0.0.0.0.d.b.5.4.0.2.9.0.8.6.6.5.8.6.2.1.0.7.f.3.6.e.d.f.4.c.d.a.9.d.a.a.9.1.3.b.a.6.1.!.S.e.c.u.r.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 14 streams, Tue Sep 10 13:26:06 2024, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):111814
                                                                  Entropy (8bit):1.4792592215399694
                                                                  Encrypted:false
                                                                  SSDEEP:192:6Sw6yIXbO+wboIM5slg0qUYIumE+7n0T6+aMavz+nS5:e6yx+wKU6mE+7niAMJ0
                                                                  MD5:92890B0D4DB9C128012A654D9961AC83
                                                                  SHA1:103C727F4F573ECBD32360504B0EB18FCD49BD5F
                                                                  SHA-256:CE9B6766ABFDF105F8190DA92C096F4F1BB2B5A4B7518E7C31ABC5B90F051B81
                                                                  SHA-512:81A38E2EF79B164E5CEBECE42A9FF93EA0B17A939BAE870DDD86846DD979E22B0E41EC77DBEEF8E7D74DA60C7E895A5101ACAE9CEA541F64C8EA60032A34516B
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:MDMP..a..... ........H.f............T...........P...\.......4....G..........T.......8...........T.......................................................................................................................eJ......0.......Lw......................T............H.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8952
                                                                  Entropy (8bit):3.7056766813507864
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJDDJw6YEI9JscgmfzqEcpDa89b2+sfFym:R6lXJH+6YESJscgmfzs2dfB
                                                                  MD5:3B53D688CC9553628CDEC417EE93DFA5
                                                                  SHA1:903D8D310A12CA38E55A69B179D87137F9D9DC13
                                                                  SHA-256:60B32928B01F04E0CF910C1E29BA23F7EF2488CD51FCBDE4433C1D8633458850
                                                                  SHA-512:0F2158C15965991A0E433061AC2FFC0DB954D95617ECDA3DBE5C20AB0B403EB359EE57C9633404D483154222C8BACFCF707842A55C12DE62DFBC556B3BE2AFFA
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.4.<./.P.i.d.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4894
                                                                  Entropy (8bit):4.550498246267619
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwWl8zshMJg771I9Z2WpW8VYjYm8M4J5Unm8n5FDO9yq85dFb7NPt4Unrs8sTd:uIjfhKI7uX7V/JDkt4mgVTd
                                                                  MD5:D155B345BE011FB0EEFCBBF15BE1D771
                                                                  SHA1:02926499BDAF379B0F750B76AC3CED57353639F1
                                                                  SHA-256:07150A05FF9A4BA632C2805238448478A4B3F2EAFDFFF6D84C064F8A1F55648B
                                                                  SHA-512:EEC1644EC024298F3708E1410C7AA822479BD099CDD1F8BC228DF7B64FAD6CE9D1B2B33F3E22CF8A1673AFBF58004B9FD3A1E78BC29571E7D3B075B0E9E3CE47
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="494188" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.421895733111292
                                                                  Encrypted:false
                                                                  SSDEEP:6144:MSvfpi6ceLP/9skLmb0OTjWSPHaJG8nAgeMZMMhA2fX4WABlEnN+0uhiTw:3vloTjW+EZMM6DFyg03w
                                                                  MD5:AFB7A4D026668705B0AA5549638B0DDC
                                                                  SHA1:5BFC649E246EDEDBFF92083E9CAA8B71F4B74C02
                                                                  SHA-256:0E90C9E0DB440A48E2E09D20C74CC9CF44FCCB94BE34D6EE0D35B4487E1CD93E
                                                                  SHA-512:F21620532FC190C0E6122A5025EF113014FDE17336E0D80CA62324F5365220CFB5F13447074C8ECD0748B8D67EF193C68446D9057796CAA9A0B5AB7D1055B8F6
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.rP...................................................................................................................................................................................................................................................................................................................................................G.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Entropy (8bit):7.9555117307343535
                                                                  TrID:
                                                                  • Win64 Executable GUI (202006/5) 92.65%
                                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                                  • DOS Executable Generic (2002/1) 0.92%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe
                                                                  File size:14'287'888 bytes
                                                                  MD5:85877d16342cea80354627b1e26bd1a5
                                                                  SHA1:0db5402908665862107f36edf4cda9daa913ba61
                                                                  SHA256:309d16af0620da1d4811bdbffac56cbe4cfbbb2b1a190073571e7efe0b3f6b2a
                                                                  SHA512:2d2c73592d6cd956c4bf837aac163ae4bd3819b6305bb2937848b6b5699d9ecb38efa99e15aaa1c5e1f6db74ceb7df97afb46d5458fae4b20096bb1408e8640e
                                                                  SSDEEP:196608:DIqlYtZt1fGNcD/qf4YxIWD3rpR3Y3oi2/qxmLcrZ72k640Ka3k422pb+K8BMzj:DhKtFfGaDyAlonBtOmLLkX0S4Fl+K8aX
                                                                  TLSH:5AE6334BB3C48FA5EB8CE3F09D2855A2E61592F7A8593278750F582A3F5EC015F37A40
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........J..m...m...m...n...m...h.~.m...i...m...h...m...n...m.".....m..7i...m...i...m...j...m...l...m...l...m..7n...m..7d...m..7....m
                                                                  Icon Hash:00928e8e8686b000
                                                                  Entrypoint:0x1414eb058
                                                                  Entrypoint Section:.boot
                                                                  Digitally signed:false
                                                                  Imagebase:0x140000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x66BB9FAD [Tue Aug 13 18:02:21 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:6
                                                                  OS Version Minor:0
                                                                  File Version Major:6
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:6
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:22402abe221b6efa466ca4190864858f
                                                                  Instruction
                                                                  call 00007F07D4B05907h
                                                                  inc ecx
                                                                  push edx
                                                                  dec ecx
                                                                  mov edx, esp
                                                                  inc ecx
                                                                  push edx
                                                                  dec ecx
                                                                  mov esi, dword ptr [edx+10h]
                                                                  dec ecx
                                                                  mov edi, dword ptr [edx+20h]
                                                                  cld
                                                                  mov dl, 80h
                                                                  mov al, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  mov byte ptr [edi], al
                                                                  dec eax
                                                                  inc edi
                                                                  mov ebx, 00000002h
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  jnc 00007F07D4B05766h
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  jnc 00007F07D4B057E0h
                                                                  xor eax, eax
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  jnc 00007F07D4B05888h
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  adc eax, eax
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  adc eax, eax
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  adc eax, eax
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  adc eax, eax
                                                                  je 00007F07D4B0578Bh
                                                                  push edi
                                                                  mov eax, eax
                                                                  dec eax
                                                                  sub edi, eax
                                                                  mov al, byte ptr [edi]
                                                                  pop edi
                                                                  mov byte ptr [edi], al
                                                                  dec eax
                                                                  inc edi
                                                                  mov ebx, 00000002h
                                                                  jmp 00007F07D4B0570Ah
                                                                  mov eax, 00000001h
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  adc eax, eax
                                                                  add dl, dl
                                                                  jne 00007F07D4B05789h
                                                                  mov dl, byte ptr [esi]
                                                                  dec eax
                                                                  inc esi
                                                                  adc dl, dl
                                                                  jc 00007F07D4B05768h
                                                                  sub eax, ebx
                                                                  mov ebx, 00000001h
                                                                  jne 00007F07D4B057B0h
                                                                  mov ecx, 00000001h
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1601830x1f0.idata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1620000x1e4.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x14c70c80x136bc
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x21d90000x10.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x1610180x28.tls
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  0x10000xf73300x84a00fc4efca6798147d176d1c9394e2cb3e2False0.9994698397737983data7.986056231058502IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  0xf90000x4e7fc0x262007d8ec58b2e3a2e0a346a7f2bb330351dFalse0.9857581967213115data7.973579534804117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  0x1480000xa49c0xa00fb51965c6ea1612373c43861164f2ee7False0.961328125data7.73764349978694IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  0x1530000x975c0x5c006fa6b912427cc4e349d11c7caff224c1False0.9390285326086957data7.661341495375132IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  0x15d0000x15c0x200f919a0492ef13d21ff89eab5fc879069False0.40625data3.3057524302120944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  0x15e0000x1e80x2002c8f2eff25c1fd909a1e16c4489a15caFalse0.587890625data4.770300300856275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  0x15f0000xe380x80080398426ce6cb383b52d1b32fed44367False0.931640625data7.672017416382715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  .idata0x1600000x10000x40070004a422ac32050917d726c77409539False0.3935546875data3.2999306991246558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .tls0x1610000x10000x200c79dc6026e9279d7106bb722ff03079eFalse0.0625data0.28456851570206254IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x1620000x10000x2001b6a67de27f1688f2391ce4c0b9544a5False0.53515625data4.758721582235538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  0x1630000x13880000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .boot0x14eb0000xced8000xced8005cdf2be9ae8ec287bffea6b9e372afe2unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .reloc0x21d90000x10000x106e6996b1c92025b8fdb50642647770f9False1.5GLS_BINARY_LSB_FIRST2.349601752714581IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_MANIFEST0x1620580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                  DLLImport
                                                                  kernel32.dllGetModuleHandleA
                                                                  CFGMGR32.dllCM_Locate_DevNodeW
                                                                  IPHLPAPI.DLLGetTcpTable
                                                                  d3d9.dllDirect3DCreate9
                                                                  ADVAPI32.dllAdjustTokenPrivileges
                                                                  SHELL32.dllSHGetSpecialFolderPathW
                                                                  ole32.dllStringFromGUID2
                                                                  WS2_32.dllconnect
                                                                  HID.DLLHidD_GetManufacturerString
                                                                  SETUPAPI.dllSetupDiGetClassDevsW
                                                                  ntdll.dllRtlPcToFileHeader
                                                                  SHLWAPI.dllStrStrIW
                                                                  NETAPI32.dllNetUserEnum
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Sep 10, 2024 15:26:05.181232929 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:05.186218023 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:05.186343908 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:05.188692093 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:05.193496943 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:05.804034948 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:05.804719925 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:05.804807901 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:05.805548906 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:05.811229944 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:05.811316013 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:05.817338943 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:06.053126097 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:06.057400942 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:06.064188004 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:06.191847086 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:06.231854916 CEST33334970451.38.37.194192.168.2.5
                                                                  Sep 10, 2024 15:26:06.232038021 CEST497043333192.168.2.551.38.37.194
                                                                  Sep 10, 2024 15:26:19.884217024 CEST497043333192.168.2.551.38.37.194
                                                                  TimestampSource IPDest IPChecksumCodeType
                                                                  Sep 10, 2024 15:26:04.173990965 CEST192.168.2.551.222.31.217b353Echo
                                                                  Sep 10, 2024 15:26:04.267126083 CEST51.222.31.217192.168.2.5bb53Echo Reply
                                                                  Sep 10, 2024 15:26:04.268938065 CEST192.168.2.5103.230.14.225b352Echo
                                                                  Sep 10, 2024 15:26:04.536592007 CEST103.230.14.225192.168.2.5bb52Echo Reply
                                                                  Sep 10, 2024 15:26:04.537520885 CEST192.168.2.577.105.172.225b351Echo
                                                                  Sep 10, 2024 15:26:04.588488102 CEST77.105.172.225192.168.2.5bb51Echo Reply
                                                                  Sep 10, 2024 15:26:04.589452982 CEST192.168.2.551.38.37.194b350Echo
                                                                  Sep 10, 2024 15:26:04.604238033 CEST51.38.37.194192.168.2.5bb50Echo Reply
                                                                  Sep 10, 2024 15:26:04.604911089 CEST192.168.2.5103.251.113.36b34fEcho

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:09:26:02
                                                                  Start date:10/09/2024
                                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.21442.4076.exe"
                                                                  Imagebase:0x140000000
                                                                  File size:14'287'888 bytes
                                                                  MD5 hash:85877D16342CEA80354627B1E26BD1A5
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:09:26:05
                                                                  Start date:10/09/2024
                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 744 -s 616
                                                                  Imagebase:0x7ff6af830000
                                                                  File size:570'736 bytes
                                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  No disassembly