Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CustomPayload.exe

Overview

General Information

Sample name:CustomPayload.exe
Analysis ID:1508677
MD5:0025bd5b725a83366b8fc30c6b5c65bf
SHA1:484f6760a8e49df78b1cc3ce1f5620f193864f28
SHA256:c5cfe951aae6cc74e6e8f1d9c33e15fd1b1bbb34066a10cec27fc62e81d86548
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64
  • CustomPayload.exe (PID: 3796 cmdline: "C:\Users\user\Desktop\CustomPayload.exe" MD5: 0025BD5B725A83366B8FC30C6B5C65BF)
    • conhost.exe (PID: 2404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 1336 cmdline: C:\Windows\system32\WerFault.exe -u -p 3796 -s 856 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: CustomPayload.exeStatic PE information: certificate valid
Source: CustomPayload.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: WC:\code\devops\devops\Tools\Installer\CustomPayload\obj\Release\net48\CustomPayload.pdb source: CustomPayload.exe, 00000000.00000002.2158633400.0000017DBB331000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\CustomPayload.pdb/ source: CustomPayload.exe, 00000000.00000002.2158266664.0000017DB96D3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: C:\code\devops\devops\Tools\Installer\CustomPayload\obj\Release\net48\CustomPayload.pdbSHA256 source: CustomPayload.exe
Source: Binary string: System.ni.pdbRSDS source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: CustomPayload.pdb source: CustomPayload.exe, 00000000.00000002.2158633400.0000017DBB331000.00000004.00000800.00020000.00000000.sdmp, WERAEE5.tmp.dmp.5.dr
Source: Binary string: +C:\Users\user\Desktop\CustomPayload.pdbh source: CustomPayload.exe, 00000000.00000002.2158633400.0000017DBB331000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.Core.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: C:\code\devops\devops\Tools\Installer\CustomPayload\obj\Release\net48\CustomPayload.pdb source: CustomPayload.exe
Source: Binary string: System.pdb0 source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.ni.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\CustomPayload.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3796 -s 856
Source: classification engineClassification label: clean3.winEXE@3/6@0/0
Source: C:\Users\user\Desktop\CustomPayload.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2404:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3796
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5f6995d0-3cbb-4a83-ba98-08f4f88fddadJump to behavior
Source: CustomPayload.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: CustomPayload.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\CustomPayload.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeFile read: C:\Users\user\Desktop\CustomPayload.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\CustomPayload.exe "C:\Users\user\Desktop\CustomPayload.exe"
Source: C:\Users\user\Desktop\CustomPayload.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\CustomPayload.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3796 -s 856
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: CustomPayload.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: CustomPayload.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: CustomPayload.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: CustomPayload.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: WC:\code\devops\devops\Tools\Installer\CustomPayload\obj\Release\net48\CustomPayload.pdb source: CustomPayload.exe, 00000000.00000002.2158633400.0000017DBB331000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\CustomPayload.pdb/ source: CustomPayload.exe, 00000000.00000002.2158266664.0000017DB96D3000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: C:\code\devops\devops\Tools\Installer\CustomPayload\obj\Release\net48\CustomPayload.pdbSHA256 source: CustomPayload.exe
Source: Binary string: System.ni.pdbRSDS source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: CustomPayload.pdb source: CustomPayload.exe, 00000000.00000002.2158633400.0000017DBB331000.00000004.00000800.00020000.00000000.sdmp, WERAEE5.tmp.dmp.5.dr
Source: Binary string: +C:\Users\user\Desktop\CustomPayload.pdbh source: CustomPayload.exe, 00000000.00000002.2158633400.0000017DBB331000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.Core.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: C:\code\devops\devops\Tools\Installer\CustomPayload\obj\Release\net48\CustomPayload.pdb source: CustomPayload.exe
Source: Binary string: System.pdb0 source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.ni.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERAEE5.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdb source: WERAEE5.tmp.dmp.5.dr
Source: CustomPayload.exeStatic PE information: 0xD06529FF [Wed Oct 16 07:53:35 2080 UTC]
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeMemory allocated: 17DB98B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeMemory allocated: 17DD3330000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\CustomPayload.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeQueries volume information: C:\Users\user\Desktop\CustomPayload.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\CustomPayload.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1508677 Sample: CustomPayload.exe Startdate: 10/09/2024 Architecture: WINDOWS Score: 3 5 CustomPayload.exe 1 2->5         started        process3 7 WerFault.exe 22 16 5->7         started        9 conhost.exe 5->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1508677
Start date and time:2024-09-10 15:36:47 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:CustomPayload.exe
Detection:CLEAN
Classification:clean3.winEXE@3/6@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, oneocsp.microsoft.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target CustomPayload.exe, PID 3796 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: CustomPayload.exe
TimeTypeDescription
09:37:41API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.9133497387628312
Encrypted:false
SSDEEP:96:YZF1yTmxssYBgzxymTpQXIDcQBc6TocEq6cw3X+BHUHZ0ownOgFkEwH3d2FYAKca:M3emxs8A0/XotKaWSIzuiFVZ24lO8l
MD5:F0D7978D46EA1D9427719AF1BC00EC0C
SHA1:2677927ECFE3FB65593AC8BD244A41C952A9AB00
SHA-256:F1EFBCF283AD9F4F294985F1839708500F9531C1788A663F3ED7B21D0EC9CD5C
SHA-512:1C806DD91C40C2E08FA1788D42BF86EB1595B72E97FFE172BCD7713A0B785A8F62025AAA7036F73A163871CA8968D30C9572487B36E096614DC96EAA037203BA
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.4.4.9.0.5.8.8.8.6.1.1.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.4.4.9.0.5.9.5.7.3.6.1.3.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.a.b.e.1.e.5.5.-.6.2.2.6.-.4.2.8.b.-.b.4.7.7.-.e.1.d.7.2.3.3.5.0.c.7.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.e.e.7.c.c.6.-.9.c.a.a.-.4.a.c.c.-.9.7.8.5.-.d.0.6.c.5.6.e.2.9.c.2.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.C.u.s.t.o.m.P.a.y.l.o.a.d...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.u.s.t.o.m.P.a.y.l.o.a.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.d.4.-.0.0.0.1.-.0.0.1.5.-.e.e.8.6.-.b.b.9.9.8.6.0.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.0.9.e.1.1.5.4.2.7.6.1.b.f.9.9.e.5.3.3.b.c.e.4.8.a.a.9.4.d.0.e.0.0.0.0.0.0.0.0.!.0.0.0.0.4.8.4.f.6.7.6.0.a.8.e.4.9.d.f.7.8.b.1.c.c.3.c.e.1.f.5.6.2.0.f.1.9.3.8.6.4.f.2.8.!.C.u.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 16 streams, Tue Sep 10 13:37:39 2024, 0x1205a4 type
Category:dropped
Size (bytes):290345
Entropy (8bit):3.155853615490259
Encrypted:false
SSDEEP:3072:NwGFMi1CCqq5E3+vBLwIB4cUFdXcSzms8y:6GFTqq5E3QxzUFd76
MD5:79EBDACFA40978AC549A1E9885B70C8F
SHA1:0158A478F78BEAD366415B8DBB474A45049186C8
SHA-256:AF63885E117658A93D3EF35CF4D6E9EC65E30A434528F5FBD97F919699EEE352
SHA-512:2DFC520BD3EB60ADF47D2CA3CB588D48C4FBF1B8CD9C05A648808E89BB24C5F124504B73E048A578B7C66889133686679DEA8AB8466B07B449CB56261E1F32E1
Malicious:false
Reputation:low
Preview:MDMP..a..... ........K.f........................4...........$...............,............R..........l.......8...........T............!..1L......................................................................................................eJ......x.......Lw......................T............K.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8560
Entropy (8bit):3.7007471402069685
Encrypted:false
SSDEEP:192:R6l7wVeJfK0HhZ6Y2Dm+R90gmfi4dbDprT89b6lVfD+m:R6lXJyU6Yb+Rugmfi4dG6nfz
MD5:2142D8772EA46ACB334E44062275124D
SHA1:B9B1B5C2F309226B8295D552130318FAF58E5E23
SHA-256:8E5EDE896800D9716BC3C528E950EDFF005FA88106F0E2396931C232957EB6E3
SHA-512:0FD414181680192B738C0FC37C9F276DE2118A9CBC0DB138DEA0AA212ADEF3E3458CA8B897FDC09A215F785296C965D39EF7F4CB9A47827E9AFC27201705EC79
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.7.9.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4740
Entropy (8bit):4.483186463136627
Encrypted:false
SSDEEP:48:cvIwWl8zshXPNJg771I939juWpW8VYNYm8M4JHsFjuyq85YK01md:uIjfhXPnI7a9jP7VFJ4uc01md
MD5:70270FB4FFC66E40496FAD1F6E9B2317
SHA1:518E1489C266D8AF7FE45AEB2212CE38D47A2E46
SHA-256:F6CB7B4E4BD03DDB32B782A46FABF36DA5881841D7766979E52CACB758EF7B8C
SHA-512:7F7F110017FE7A60AD9B9D09EB040E5A666DAD1BCC6598FB12C64C6C423B1D71A4D7D0B3352A435E7ECB11EEB8FAF14087A8538E8AD8C6C0E116F9655B333496
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="494200" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.468769474183624
Encrypted:false
SSDEEP:6144:EzZfpi6ceLPx9skLmb0fbZWSP3aJG8nAgeiJRMMhA2zX4WABluuNijDH5S:qZHtbZWOKnMM6bFpIj4
MD5:59EF3AA34B0946AB2E2D26BB3AE6C87C
SHA1:3515E1C5A09E3DAD629CF42ECD9D4315CACF0480
SHA-256:59062CDD5246C8E043033F5B1E37572E8B87063EE7B40145512098ABFAC32F1C
SHA-512:9BD4E6045B5B9EF76F91EDC266393D359457DBDE622ACA50DCB1CDC34EF625B0000A74CDA9D72E1A49434C1C48E125E990FD743096B68F7AF924634C960E64B2
Malicious:false
Reputation:low
Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.=S..................................................................................................................................................................................................................................................................................................................................................TE.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\CustomPayload.exe
File Type:ASCII text, with CRLF, LF line terminators
Category:dropped
Size (bytes):324
Entropy (8bit):4.950157693544746
Encrypted:false
SSDEEP:6:WsTbZqbbUcfvfAw3XpBQLKPLIP12MUAvvm33JpQWoJPqZEKKZe:2HfvfTHpBQLKPLI4MA3rQ1iZE1e
MD5:346FD26346EB238D298C3217095504DC
SHA1:00B6D23EE00276BDB94383712ECA1EDF080F1053
SHA-256:07D34AABB38F983B17B998B8943D1BB7C2590906901B9224490B891BB4E02F06
SHA-512:45C06B9B4A2B9218FA7B4D951D9FFA299152A19DC99F44EDA74B72EF7A01D779A2547A432DEC9E03F830692E9D6141EB74323479B37D82CEE19F430EC509E61E
Malicious:false
Reputation:low
Preview:.Unhandled Exception: System.IO.FileNotFoundException: Could not load file or assembly 'Microsoft.Extensions.Configuration.Abstractions, Version=8.0.0.0, Culture=neutral, PublicKeyToken=adb9793829ddae60' or one of its dependencies. The system cannot find the file specified... at CustomPayload.Program.Main(String[] args).
File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):6.8416209103189685
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
  • Win32 Executable (generic) a (10002005/4) 49.97%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:CustomPayload.exe
File size:24'496 bytes
MD5:0025bd5b725a83366b8fc30c6b5c65bf
SHA1:484f6760a8e49df78b1cc3ce1f5620f193864f28
SHA256:c5cfe951aae6cc74e6e8f1d9c33e15fd1b1bbb34066a10cec27fc62e81d86548
SHA512:ef444495769ab50da12f8b8133be99e53f41d5ee1d119ecac2ed0b8499673b62cb704c817615ffa7484986f707e5d0877183ee2bf2035559e955563b89929390
SSDEEP:384:9Av7XUuCQG9p62Z91qrjSo3RV89o3RV8c+Y7h7X2Ip4gOASqjdAA1m5wMRv3cqu6:wQrX6QnFSVKSVN+Y7N2Ip41ASqxf1mlT
TLSH:13B23ACA9BBC4007EF97AE30E2F5CA827939B7D35C61C56B589AE1850D173D1A30533A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)e..........."...0..............7... ...@....@.. ...............................I....`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x4037fe
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xD06529FF [Wed Oct 16 07:53:35 2080 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Signature Valid:true
Signature Issuer:CN=Microsoft ID Verified CS AOC CA 02, O=Microsoft Corporation, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 13/08/2024 06:58:11 16/08/2024 06:58:11
Subject Chain
  • CN=SDL LIMITED, O=SDL LIMITED, L=Maidenhead, S=Windsor and Maidenhead, C=GB
Version:3
Thumbprint MD5:79C2FA8A56BFE27EC1733A4A56356D99
Thumbprint SHA-1:E6794260AECECA1C80900976EBCC5365CC2CCF07
Thumbprint SHA-256:37E02E87A0DAAA680F9972FE39B6809E3FF1678B0DE031955C3F7431CA7FEEED
Serial:33000154B986959C8AA471A9EA0000000154B9
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x37ab0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x39c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x3db0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x36c00x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x18040x1a0039b456e0e648404f91b5fc63d397dcfeFalse0.5063100961538461data5.188079666092921IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x40000x39c0x400f00cae6b428f5bf6aa099152bfeb84b0False0.396484375data2.986035168333682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000xc0x200f75d333d4cda3c796b2c876d2e789889False0.041015625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x40580x340data0.4495192307692308
DLLImport
mscoree.dll_CorExeMain
TimestampSource PortDest PortSource IPDest IP
Sep 10, 2024 15:37:58.248977900 CEST53578191.1.1.1192.168.2.6

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:09:37:37
Start date:10/09/2024
Path:C:\Users\user\Desktop\CustomPayload.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\CustomPayload.exe"
Imagebase:0x17db9580000
File size:24'496 bytes
MD5 hash:0025BD5B725A83366B8FC30C6B5C65BF
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:09:37:37
Start date:10/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:09:37:38
Start date:10/09/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 3796 -s 856
Imagebase:0x7ff64b8d0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2158875517.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd34660000_CustomPayload.jbxd
    Similarity
    • API ID:
    • String ID: :O_^
    • API String ID: 0-1961111628
    • Opcode ID: c3f6bbba20aed6a3d7dea0b660858501589dce52563e8a5f7a52314ec82b9ef7
    • Instruction ID: 645bd50a71ff33ad438a024acdcffc292741ee5a263c5133ec8c054472cfe7e8
    • Opcode Fuzzy Hash: c3f6bbba20aed6a3d7dea0b660858501589dce52563e8a5f7a52314ec82b9ef7
    • Instruction Fuzzy Hash: 7341D41AB4DA661AE221B6EDB4711FE6B94DFD237AF080177D28CD9183CE0C688546A1
    Memory Dump Source
    • Source File: 00000000.00000002.2158875517.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd34660000_CustomPayload.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b94f8aaad14b2581dca0677239a542be9617f95c6f913cd774a3b96f515fb591
    • Instruction ID: 5c641afa9bcf28265237ba8f503ded3ac85eddf294be8b2c39c767bd3dad3f71
    • Opcode Fuzzy Hash: b94f8aaad14b2581dca0677239a542be9617f95c6f913cd774a3b96f515fb591
    • Instruction Fuzzy Hash: B3217101F8DAA70BF622B6E8A4711FE67D45F93379F094176D28CD90C3CE0C384056A6
    Memory Dump Source
    • Source File: 00000000.00000002.2158875517.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd34660000_CustomPayload.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 23890ce6156a313d8a8683a75ef9a0604828af8aa9d4d052cd3a69caf112566e
    • Instruction ID: 5864fa5f2e423d7b95548e51056918c25d91c812aa7ff7637c841aa3fa05d468
    • Opcode Fuzzy Hash: 23890ce6156a313d8a8683a75ef9a0604828af8aa9d4d052cd3a69caf112566e
    • Instruction Fuzzy Hash: 60216211F8DAA70BF622B6E8A0711FE67D45F92379F094176D28CD90C3CE0C384056A6
    Memory Dump Source
    • Source File: 00000000.00000002.2158875517.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd34660000_CustomPayload.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e7374e0e87b55f94b81da43af07bb5c91dd5e9625901fed80b5f3960816a7934
    • Instruction ID: 9e41c80e9fd7678047ef81b7e96fa58ec21921af9e936b39a0935b467db6f4e7
    • Opcode Fuzzy Hash: e7374e0e87b55f94b81da43af07bb5c91dd5e9625901fed80b5f3960816a7934
    • Instruction Fuzzy Hash: 91E06DA041E7D00EE7565B3448661957FA0AF93210F4905FED6C9CB093C66C5149C353
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2158875517.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd34660000_CustomPayload.jbxd
    Similarity
    • API ID:
    • String ID: @*T4$@*T4$@*T4$H&T4
    • API String ID: 0-3099306853
    • Opcode ID: e296cf850b0c812ea68ca1eb42590e49edc0d18a17cbf3d9b0d9f0215b46d1c6
    • Instruction ID: 57d13bcdf6252568e94af67969cae2ad2d289cc752727905feb18690c85c119b
    • Opcode Fuzzy Hash: e296cf850b0c812ea68ca1eb42590e49edc0d18a17cbf3d9b0d9f0215b46d1c6
    • Instruction Fuzzy Hash: 3AF16F31B18A198FDF58DF58C4A4AE973E2FFA9314F144269D44ED7296CA38F841DB80