Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe
Analysis ID:1542216
MD5:95a13fd9611e26609ba11ca84c7ddf96
SHA1:4ebc0f1b4bc7920327cd8c90de2d57f790ccef0c
SHA256:6bb085fdecf802e1baff810387ed7995082354376ba53388ae0a73bea5bde8a7
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe (PID: 5308 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe" MD5: 95A13FD9611E26609BA11CA84C7DDF96)
    • WerFault.exe (PID: 2488 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5308 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeAvira: detected
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeString found in binary or memory: http://www.clamav.net
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeCode function: 0_2_004012730_2_00401273
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5308 -s 232
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeStatic PE information: Section .clam01
Source: classification engineClassification label: mal64.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5308
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\53c93ea3-8092-4577-9f55-69c3a2eda02fJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeReversingLabs: Detection: 42%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5308 -s 232
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .clam01
Source: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeStatic PE information: section name: .clam01
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeCode function: 0_2_0040BAB9 push es; ret 0_2_0040BAD6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeCode function: 0_2_004087AE push D341AAB0h; ret 0_2_004087B3
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exeCode function: 0_2_00401000 EntryPoint,LdrInitializeThunk,0_2_00401000
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe42%ReversingLabs
SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe100%AviraTR/Crypt.XPACK.Gen
SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.clamav.netSecuriteInfo.com.Win32.Evo-gen.30513.13254.exefalse
    unknown
    http://upx.sf.netAmcache.hve.4.drfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1542216
    Start date and time:2024-10-25 16:52:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 1s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe
    Detection:MAL
    Classification:mal64.winEXE@2/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 1
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.65.92
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • VT rate limit hit for: SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe
    TimeTypeDescription
    10:53:03API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6727139768228432
    Encrypted:false
    SSDEEP:192:NMYbw8buQ0BU/y46jEzuiFdZ24IO8Kli:iYbw8burBU/y46jEzuiFdY4IO8Kli
    MD5:9E11D054392C7A4A3DA708D59EDCD66D
    SHA1:B365868A290CF96415A341EAF6C1DE1F35EDE345
    SHA-256:0B4CB016EA4711E9A48A707CFEC7D5B1CCD0F25936E6305FEAB39B58C59FFE65
    SHA-512:0350D858DC2E81A2234B6D4D0E06F22646384332D13B753D9FC85559DCD17EB39EBB1168ADDB322F869DD3048B59DC4D9CFDFD42BA67B6349950B03E1F34AE63
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.3.4.1.5.8.0.7.9.9.9.3.6.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.3.4.1.5.8.1.0.6.5.5.6.0.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.d.4.e.2.f.2.-.b.d.0.0.-.4.2.b.2.-.b.c.6.d.-.d.a.e.c.c.9.f.3.a.8.9.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.e.c.b.6.1.1.-.0.f.c.d.-.4.2.2.c.-.b.3.0.1.-.d.c.3.5.1.4.1.8.9.4.0.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...W.i.n.3.2...E.v.o.-.g.e.n...3.0.5.1.3...1.3.2.5.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.b.c.-.0.0.0.1.-.0.0.1.5.-.d.5.e.b.-.0.1.9.6.e.d.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.d.b.6.2.f.2.b.7.f.9.4.a.5.c.0.2.5.c.0.9.7.d.8.d.4.e.f.8.6.f.3.0.0.0.0.f.f.f.f.!.0.0.0.0.4.e.b.c.0.f.1.b.4.b.c.7.9.2.0.3.2.7.c.d.8.c.9.0.d.e.2.d.5.7.f.7.9.0.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Oct 25 14:53:00 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18580
    Entropy (8bit):1.9508353230651436
    Encrypted:false
    SSDEEP:96:5l8td25i6Kl2r9mi7n2cowut0rKVkjS68LWx4WqUoGjSx9XyrWIkWISEI4YGBlwD:MnH49mOhoKoGjiiCY2wo
    MD5:5AA66E150E99097474B194BA9021901F
    SHA1:EF9AE087FFF149A2D442374AC15443E393A05B71
    SHA-256:38DE2A2DDEFB313DAEFA4FEA8C01BB2E0ED23DD0E8B69C0FE6E46DB6BC5D34B1
    SHA-512:9332362AAF1808AECB5FB5E562B1708459CFEA46BB90C8405580D08565E42131C2CE2D90149A041583EED79B170A76A5C713AD9A93C36DF813443F9E0160476A
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .........g............4...............<.......d...............T.......8...........T................>......................................................................................................eJ......L.......GenuineIntel............T.............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8446
    Entropy (8bit):3.703157666647522
    Encrypted:false
    SSDEEP:192:R6l7wVeJLBi6ljD6Y2DLSUzgmfcpgDprZ89brysffZm:R6lXJLU6lH6YGSUzgmfc6Yrxfc
    MD5:9090ADF697ECE39A058F9E876C5C9440
    SHA1:67A1720D7991936751B8259ECD6536021F7193DC
    SHA-256:5B253D840EE74B4B524342B675403E65664E1F35882F80D2CF27602BF4A223DD
    SHA-512:21DF76974B12C20EDA7C497A836CB2DBE94E28074C6413BC24B8385776A451F9EF259EF9940BB91D8F57097761199482ABB228DE9C45CABDC3B8971C67132FDA
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.0.8.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4779
    Entropy (8bit):4.557810893727175
    Encrypted:false
    SSDEEP:48:cvIwWl8zsJJg77aI9+xWpW8VYtYm8M4Jnv2GFDzE+q8wSA0IQf+vfMd:uIjfbI78g7V9Jnvo3p0Zf+vfMd
    MD5:A5EBDF8215CC10622A63490C1610A346
    SHA1:4AE96D1267BFF7E3C3F69E2BACF47E7E7B817A43
    SHA-256:CE8AEBB26AE3F95511B6C43E41893EF4D56D2D0C8D8FCB559BDEB4D4620B9E28
    SHA-512:C56AF018F58FF5355FEB2797D754700050222B7D59E1FC1ADEB7573A0C812C269846258A8C3DA90DF18E6F0ADFE4FEE1092A9D9B470516AAE848B8C4F54DC89E
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="559075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.468823998085442
    Encrypted:false
    SSDEEP:6144:6zZfpi6ceLPx9skLmb0ftZWSP3aJG8nAgeiJRMMhA2zX4WABluuNSjDH5S:cZHttZWOKnMM6bFp4j4
    MD5:FC83E376F9C691122A837D03C81DF9E2
    SHA1:C19BC577D87EB1790D2286CBD22FC9C562DAD704
    SHA-256:22C9D061D3D23EA159480E5A14DF8957E71044C5BDA47A662A71BE2C47B71937
    SHA-512:94E6E3F5BC0066364E20C7F8BFD3E5789439664A81CF7EF428047E6FB922E94B92FD1D4007497B85F3B2AD35E49B7B3B436CF6FF11A29FC3FCE77BBCB272E057
    Malicious:false
    Reputation:low
    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmV.?..&................................................................................................................................................................................................................................................................................................................................................).........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Entropy (8bit):5.476290821920901
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe
    File size:119'296 bytes
    MD5:95a13fd9611e26609ba11ca84c7ddf96
    SHA1:4ebc0f1b4bc7920327cd8c90de2d57f790ccef0c
    SHA256:6bb085fdecf802e1baff810387ed7995082354376ba53388ae0a73bea5bde8a7
    SHA512:c2a3e9f2fe676be69a18a110895e2d2f2ed4c821491699314b3e197a883af59a9b65e8ae89264e4a991c976a2b057a11c4ef3a12e43aa778c432532ba6946391
    SSDEEP:1536:cbd3itE09mlFA3MtdecLTLzL1msCEEtWQ3w6qkY:cbdi4lFAc3kL/vwfkY
    TLSH:08C34B53EFC54D11E4641B3101720776B33FBD84AA5AE39BB909B1727EB33EA2D42182
    File Content Preview:MZ......................@...............................................!.L.!This file was created by ClamAV for internal use and should not be run...ClamAV - A GPL virus scanner - http://www.clamav.net..$...PE..L...CLAM...................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x401000
    Entrypoint Section:.clam01
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, BYTES_REVERSED_LO, 32BIT_MACHINE, DEBUG_STRIPPED, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP, BYTES_REVERSED_HI
    DLL Characteristics:
    Time Stamp:0x4D414C43 [Thu Jan 27 10:43:15 2011 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:1
    OS Version Minor:0
    File Version Major:1
    File Version Minor:0
    Subsystem Version Major:1
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    push 00000000h
    call 00007FDE52D7EF35h
    mov dword ptr [004033F8h], eax
    call 00007FDE4CD7EF35h
    mov dword ptr [004033FCh], eax
    push 00000000h
    push 00401032h
    push 00000000h
    push 00000064h
    push dword ptr [004033F8h]
    call 00007FDE7CD8EF35h
    push eax
    call 00007FDE40D7EF35h
    push ebp
    mov ebp, esp
    add esp, FFFFFFF0h
    cmp dword ptr [ebp+0Ch], 00000110h
    jne 00007FDE74D1F013h
    push edi
    push 00000BB9h
    push dword ptr [ebp+08h]
    call 00007FDE88D8EF35h
    push eax
    call 00007FDEB2D8EF35h
    push 0000006Fh
    push dword ptr [004033F8h]
    call 00007FDE94D8EF35h
    push 00000000h
    push 00000031h
    push 000000C5h
    push 00000BB9h
    push dword ptr [ebp+08h]
    call 00007FDEA0D8EF35h
    push 00403210h
    push 00000BBAh
    push dword ptr [ebp+08h]
    call 00007FDEACD8EF35h
    push 00000000h
    push 00030002h
    push 00000128h
    push dword ptr [ebp+08h]
    call 00007FDEA6D8EF35h
    push 00000BBBh
    push dword ptr [ebp+08h]
    call 00007FDE88D8EF35h
    mov dword ptr [00403404h], eax
    mov ecx, 00000028h
    shr ecx, 03h
    xor edi, edi
    mov eax, dword ptr [004020B9h+edi*8]
    mov dword ptr [ebp-0Ch], eax
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .clam010x10000x1d0000x1d000a29e98f455cac64dfec337bb4c25362bFalse0.4018470501077586data5.479863624937838IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_NO_PAD, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_LNK_OTHER, IMAGE_SCN_LNK_INFO, IMAGE_SCN_LNK_OVER, IMAGE_SCN_LNK_REMOVE, IMAGE_SCN_LNK_COMDAT, IMAGE_SCN_MEM_PROTECTED, IMAGE_SCN_NO_DEFER_SPEC_EXC, IMAGE_SCN_GPREL, IMAGE_SCN_MEM_FARDATA, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_128BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_LNK_NRELOC_OVFL, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_NOT_CACHED, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:10:53:00
    Start date:25/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.30513.13254.exe"
    Imagebase:0x400000
    File size:119'296 bytes
    MD5 hash:95A13FD9611E26609BA11CA84C7DDF96
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:10:53:00
    Start date:25/10/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5308 -s 232
    Imagebase:0x100000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:100%
      Total number of Nodes:2
      Total number of Limit Nodes:0
      execution_graph 1185 401000 LdrInitializeThunk 1186 401011 1185->1186

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 401000-401007 LdrInitializeThunk 1 401011-40103f 0->1 4 401122-401126 1->4 5 401045-4010bc 1->5 6 401141-401148 4->6 7 401128-40113c 4->7 45 4010be-401106 5->45 8 401261-401267 6->8 9 40114e-401155 6->9 7->6 12 4011f6-4011fa 9->12 13 40115b-401161 9->13 14 401208-401213 12->14 15 4011fc-401206 12->15 17 401167-40119d 13->17 18 40126a-401270 13->18 19 401215-401219 14->19 20 401227-40122a 14->20 15->18 36 4011b1-4011c8 17->36 37 40119f-4011af 17->37 23 401225 19->23 24 40121b-401224 19->24 25 40122c-401230 20->25 26 40125f 20->26 23->26 24->23 28 401232-40123e 25->28 29 401246-40124a 25->29 26->18 28->29 29->26 32 40124c-401258 29->32 32->26 42 4011ca-4011da 36->42 43 4011dc-4011e9 36->43 41 4011f4 37->41 41->18 42->41 43->41 50 401108-40111d 45->50 50->4
      APIs
      • LdrInitializeThunk.NTDLL(00000000), ref: 00401002
      Strings
      • Wrong DLL!, xrefs: 004011CE
      • About ACME Keygen, xrefs: 0040124E
      • DLL Library not found !, xrefs: 004011A3
      • keymaker.dll, xrefs: 00401191
      • DontBeCurious04, xrefs: 004011B6
      • Enter Your Product ID ..., xrefs: 0040107C
      • 602Pro LAN Suite Keygen by c2K Assembled using Masm v7.00 -------------------------------------- Big thnx and respects to: ivan, b00lean, JC, PROXXON, w00tz, death, melborn, |CGhost|, dash and all ot, xrefs: 00401253
      Memory Dump Source
      • Source File: 00000000.00000002.2166595194.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2166577855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2166595194.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID: 602Pro LAN Suite Keygen by c2K Assembled using Masm v7.00 -------------------------------------- Big thnx and respects to: ivan, b00lean, JC, PROXXON, w00tz, death, melborn, |CGhost|, dash and all ot$About ACME Keygen$DLL Library not found !$DontBeCurious04$Enter Your Product ID ...$Wrong DLL!$keymaker.dll
      • API String ID: 2994545307-3404118570
      • Opcode ID: 6e9bf520d6355ed123608ae0865f5c8a66a80cdc2a0dd42df3a65c0f1771f631
      • Instruction ID: 846443646a6a20b72c60f0d73c85555536f88633e4b07a22ac7db198c0cff398
      • Opcode Fuzzy Hash: 6e9bf520d6355ed123608ae0865f5c8a66a80cdc2a0dd42df3a65c0f1771f631
      • Instruction Fuzzy Hash: 7B51A130680344BAEF215F25CD42FDD3E6ADB24B11F10423ABB24BD2F1CBF95A519A49

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 52 401273-401292 54 401294-4012a6 52->54 55 4012ab-4012ba 52->55 54->55 56 4012c0-4012c6 55->56 57 401617-40162f 55->57 56->57 59 4012cc-4012d2 56->59 63 401649-401693 57->63 61 4012d4-4012e3 59->61 62 4012e5-4012eb 59->62 72 401332-40153b 61->72 64 4012ed-4012fc 62->64 65 4012fe-401304 62->65 64->72 66 401306-401315 65->66 67 401317-40131d 65->67 66->72 67->57 70 401323-401328 67->70 70->72 101 401631-401641 72->101 102 401541-401548 72->102 101->63 102->101 103 40154e-401555 102->103 103->101 104 40155b-401595 103->104 104->101 108 40159b-4015e2 104->108 108->101 110 4015e4-401615 108->110 110->63
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2166595194.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2166577855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2166595194.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: -999-$1. L$2. A$3. A$4. C$ACBDEFGHIJKLMNOPQRSTUVWXYZ0123456789$AL4ASC$CL4ASC$Choo$DontBeCurious04$Enter Your Product ID ...$PQBDEFGHIJKLMNOABRSTUVWXYZ0123456789$RL4ASC$Some wrong Product ID !$UL4777$keymaker.dll
      • API String ID: 0-310576210
      • Opcode ID: f70b63a7afbc2e28c2a66137bc109d5c8cc3bdf4f9ffff28ee6f9541118b97a1
      • Instruction ID: 728096e55cea02649e5ca6dd682e4de0909f3db65850282629eef546a1a287bd
      • Opcode Fuzzy Hash: f70b63a7afbc2e28c2a66137bc109d5c8cc3bdf4f9ffff28ee6f9541118b97a1
      • Instruction Fuzzy Hash: DEB12A302843816FD7019FB99DC1B95BF686B02726B0847BAD574B72E2C6F46708876E