Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe

Overview

General Information

Sample name:1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe
Analysis ID:1543231
MD5:e011877d616ad130de4a55dcac6f2b35
SHA1:2db89a42e9b29ca2f356581934d7efc3b92fd772
SHA256:e86bff1f4a71cb3629da4267744f3552830837e778d914e4f59a267123dbb2f9
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["elaboretib.sbs", "mediavelk.sbs", "offybirhtdi.sbs", "strikebripm.sbs", "definitib.sbs", "activedomest.sbs", "ostracizez.sbs", "arenbootk.sbs"]}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["elaboretib.sbs", "mediavelk.sbs", "offybirhtdi.sbs", "strikebripm.sbs", "definitib.sbs", "activedomest.sbs", "ostracizez.sbs", "arenbootk.sbs"]}
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeReversingLabs: Detection: 21%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeJoe Sandbox ML: detected
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: offybirhtdi.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: activedomest.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: arenbootk.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: mediavelk.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: definitib.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: elaboretib.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: strikebripm.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: ostracizez.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: strikebripm.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeString decryptor: Workgroup: -
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: elaboretib.sbs
    Source: Malware configuration extractorURLs: mediavelk.sbs
    Source: Malware configuration extractorURLs: offybirhtdi.sbs
    Source: Malware configuration extractorURLs: strikebripm.sbs
    Source: Malware configuration extractorURLs: definitib.sbs
    Source: Malware configuration extractorURLs: activedomest.sbs
    Source: Malware configuration extractorURLs: ostracizez.sbs
    Source: Malware configuration extractorURLs: arenbootk.sbs
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_004072DD0_2_004072DD
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_004073060_2_00407306
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_0040C90C0_2_0040C90C
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_004073150_2_00407315
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_0040B1890_2_0040B189
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_0040D3A70_2_0040D3A7
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7676 -s 224
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7676
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4ecc62ea-8e22-4ed6-8094-7755dafa7247Jump to behavior
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeReversingLabs: Detection: 21%
    Source: unknownProcess created: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe "C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe"
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7676 -s 224
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_004114E4 push ebx; retf 0_2_004114E5
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeCode function: 0_2_00401525 push dword ptr [edx+eax-77h]; ret 0_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: offybirhtdi.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: activedomest.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: arenbootk.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: mediavelk.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: definitib.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: elaboretib.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: strikebripm.sbs
    Source: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, 00000000.00000000.1359394471.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: ostracizez.sbs
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe21%ReversingLabs
    1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    mediavelk.sbstrue
      unknown
      activedomest.sbstrue
        unknown
        ostracizez.sbstrue
          unknown
          definitib.sbstrue
            unknown
            strikebripm.sbstrue
              unknown
              offybirhtdi.sbstrue
                unknown
                arenbootk.sbstrue
                  unknown
                  elaboretib.sbstrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://upx.sf.netAmcache.hve.4.drfalse
                    • URL Reputation: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1543231
                    Start date and time:2024-10-27 13:40:42 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 2s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe
                    Detection:MAL
                    Classification:mal84.troj.evad.winEXE@2/5@0/0
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 11
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 104.208.16.94
                    • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                    • Execution Graph export aborted for target 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe, PID 7676 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: 1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe
                    TimeTypeDescription
                    08:41:49API Interceptor1x Sleep call for process: WerFault.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.7130686748749896
                    Encrypted:false
                    SSDEEP:96:wFFGt4YKWcxHy3s73hI1yDf0QXIDcQzc6CmcE1cw3CVpz+HbHg6ZAX/d5FMT2Slr:4MHKWf320NXfvjEzuiF4Z24IO8G
                    MD5:DBFE34BE511A869E778935487B800DDF
                    SHA1:889EC822032BB960FA598FE91C7964C4031BE910
                    SHA-256:538E26E426EEB961C0839221E9AC47AFFEB69743401B79BA1EB3515E21694286
                    SHA-512:16A743C36AFB93D12C4F82CAC447D840CD51F3E71786C30B5B38AAEE673C7FFF3C0AFDC53A38CC8818F4B6942B2D8B183BBA5D2F6AB0556CF45D099E7223C0C6
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.5.0.6.5.0.2.5.3.3.3.9.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.5.0.6.5.0.2.8.3.0.2.6.7.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.a.4.3.0.4.e.-.5.d.c.5.-.4.e.6.3.-.b.e.d.8.-.4.4.d.3.8.4.f.b.6.a.4.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.0.c.d.1.9.8.1.-.0.8.d.f.-.4.f.d.0.-.a.f.9.c.-.4.6.8.2.0.8.1.7.e.d.8.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.0.3.2.6.2.7.d.2.1.9.5.3.9.1.c.a.d.2.8.1.9.c.f.d.f.7.5.1.f.1.b.b.2.b.8.8.5.2.7.7.f.6.7.2.8.8.0.c.3.0.2.e.b.c.6.d.a.c.b.6.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.f.c.-.0.0.0.1.-.0.0.1.3.-.6.8.3.e.-.1.4.9.3.6.d.2.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.5.2.1.a.d.4.1.2.e.1.1.7.3.c.d.d.2.a.b.7.2.e.6.d.e.c.d.9.9.a.1.0.0.0.0.f.f.f.f.!.0.0.0.0.2.d.b.8.9.a.4.2.e.9.b.2.9.c.a.2.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Sun Oct 27 12:41:42 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):19618
                    Entropy (8bit):2.050583016680698
                    Encrypted:false
                    SSDEEP:96:5F8pEdxLrxrwtj3OQXoi7ng3z9qGVk2WI/WItIIZ3vBM:YooKQ4OAsGD3pM
                    MD5:E6450C1312375E3B28A88660FCF65A35
                    SHA1:38DDA605D14EB22555F592AA5496C095D3435873
                    SHA-256:9D4D0BF52C6C5BC2381DA5009844895CD7539D46001ACDCD2BF2AB8DA0CC554D
                    SHA-512:0DE7154DCBF10A2A435DFAD5173237AF92EACC11D14BC2EA7D5DE1005DE7228DD63B3A4AA2241221142CB10020268043150DA6C2CF85C60375F6BEE95F6341A2
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... ........5.g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T............5.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8544
                    Entropy (8bit):3.703860521512643
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJ9h6Aa6YWiSU/36gmfgJPWOXpxp89bSrsfQmm:R6lXJr6Aa6YTSU/qgmfgJPWOOSwfY
                    MD5:AFAA12DD47B532C69E895359F3776F5E
                    SHA1:101B64398A7A596AB61D438004833CC838814816
                    SHA-256:63618CE6F1367B87E6CACCBEA39F7BB9710FAE7788C32C0A5EF812DE9FE5B6D9
                    SHA-512:8E3061A816E31F52B07478A8AA8FB9B94530CBB4EBE2F357299B6F512E61B9DC9498D17DBAAB71F05EAA6B4FC4F5E63B2AAD3722B8C21EE7712F9D4126EEF528
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.7.6.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4893
                    Entropy (8bit):4.5613092531315775
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zs+Jg77aI9I/pWpW8VYyYm8M4JZKFsQ1Fm+q8jUw4m7Xd:uIjf0I74Y7VuJ6Pm9wJ7Xd
                    MD5:7587E187DAAD0A28CE2B0E87079701DE
                    SHA1:61DFB977600D941FD9A4C2E73C144697D0958095
                    SHA-256:9BF62F24CF9419E1C98C821D4528E0F4C136747ACC64B51E49BA16567AB2D555
                    SHA-512:07415FC8F9DB4F7023265E36955F9869F89E85ABCFA5247F98A6850672985DD8918937D98DBED65EAA6F017E3C48BFE6BCCF6029059B4F70D6D2EB00671DA5BA
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="561824" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.295917489709988
                    Encrypted:false
                    SSDEEP:6144:M41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+vjmBMZJh1VjU:h1/YCW2AoQ0NipjwMHrVg
                    MD5:97DB9F2BDA54BD33306EAFC41F7E5289
                    SHA1:DBC077BAB7A0BEEA7D68E372BB8EBDA5D58EBE3B
                    SHA-256:0477FB6E0BAEEE0411DE55D242E992D4138E3EECF5E4041ACF003B906C2A2AE2
                    SHA-512:D3FE1F7CAB096ABD89961C8A859D031CBA3B2FC4C7BB4C454D2CEB471E6934C3BA089A2C9FB2216D6288F99B8F2CDE6745905EB60E78616F976EC71B5C78F53F
                    Malicious:false
                    Reputation:low
                    Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..C.m(...............................................................................................................................................................................................................................................................................................................................................6W.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.814487446222104
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe
                    File size:354'040 bytes
                    MD5:e011877d616ad130de4a55dcac6f2b35
                    SHA1:2db89a42e9b29ca2f356581934d7efc3b92fd772
                    SHA256:e86bff1f4a71cb3629da4267744f3552830837e778d914e4f59a267123dbb2f9
                    SHA512:79195b82241495d8ef9933058b7754db8153f01a31408d024baecedf32644ae9fc2bc8f50b9c28195cb2bb340317fcf52125f3a0ffc8f19b249f1e52c2c009f6
                    SSDEEP:6144:05gt/WJxHSd56E+a5VTWaRVeCK6V/Hyw1sKsuH1AliCTPYyXNSzTxEq:054/oyd56E+yTx46V/HQKsdi5yXNS3Oq
                    TLSH:97748D07EA6350D1D8C7897422CF737BAE3A621117284EC7DA4CEED038B36F16836956
                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...S..g.................J........................@.......................................@.................................R......
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x40cf90
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6715D353 [Mon Oct 21 04:06:43 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    loop 00007F4D488B84F3h
                    shr cl, FFFFFF8Bh
                    add al, byte ptr [eax]
                    add byte ptr [ebx-3EEBDBB4h], cl
                    loope 00007F4D488B84C7h
                    mov esi, dword ptr [esp+10h]
                    mov dword ptr [esp+14h], ecx
                    lea eax, dword ptr [esi+ecx]
                    add eax, 00008F12h
                    push 00000120h
                    push 00000000h
                    push eax
                    call 00007F4D488B891Fh
                    add esp, 0Ch
                    mov eax, dword ptr [esp+1Ch]
                    add eax, esi
                    add eax, 00008852h
                    push 00000240h
                    push 00000000h
                    push eax
                    call 00007F4D488B8904h
                    add esp, 0Ch
                    test ebx, ebx
                    add al, ah
                    dec esi
                    mov bh, 8Eh
                    in al, 00h
                    add byte ptr [eax], al
                    add ebp, FFFFFFFEh
                    mov eax, 00000001h
                    mov ecx, dword ptr [esp+14h]
                    add ecx, dword ptr [esp+10h]
                    mov dword ptr [esp+14h], ecx
                    mov dword ptr [esp+0Ch], ebp
                    jmp 00007F4D488B84E1h
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    mov esi, dword ptr [esp+04h]
                    mov dword ptr [esp+04h], esi
                    lea ecx, dword ptr [eax+01h]
                    cmp eax, ebx
                    mov eax, ecx
                    add al, ah
                    dec esi
                    mov bh, 84h
                    stosd
                    add byte ptr [eax], al
                    add byte ptr [ebx-7ACF7BB4h], cl
                    leave
                    jle 00007F4D488B84A5h
                    mov edx, ecx
                    and edx, 03h
                    je 00007F4D488B850Eh
                    mov esi, dword ptr [esp+04h]
                    lea edi, dword ptr [00000000h+esi*4]
                    add edi, ebp
                    xor esi, esi
                    mov ebp, dword ptr [esp+14h]
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    movzx edx, word ptr [eax]
                    loopne 00007F4D488B8510h
                    mov bh, 88h
                    test byte ptr [ebx], ch
                    adc cl, byte ptr [edi+00000000h]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4a84.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x481a00xc0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x449010x44a00f716ae96b9fe377cd3bc507c192a8d7eFalse0.5444451559653917data6.661889453528604IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x460000x253d0x260075aa12666fc3cd0dae60f7e8d72fa046False0.633532072368421data6.750447756020646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x490000xf3b80x60007978eb7c6960e0636bbe6facd4722d69False0.514404296875data6.837582144604669IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x590000x4a840x4c0009d6a7b9e1c161797a2992729c0e8d41False0.5371607730263158data6.338390142602727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:08:41:42
                    Start date:27/10/2024
                    Path:C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311cdcc8842.dat-decoded.exe"
                    Imagebase:0x400000
                    File size:354'040 bytes
                    MD5 hash:E011877D616AD130DE4A55DCAC6F2B35
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:4
                    Start time:08:41:42
                    Start date:27/10/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7676 -s 224
                    Imagebase:0xd10000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 992da56a12b929749f5b34514ef4403dc7cd1c8e496927517b658f2e5690325d
                      • Instruction ID: 33d1fa796b1d896eb3f1c7a1f020b0e48ef70a42adf84ec873fa5626091bade2
                      • Opcode Fuzzy Hash: 992da56a12b929749f5b34514ef4403dc7cd1c8e496927517b658f2e5690325d
                      • Instruction Fuzzy Hash: 49611CB3E443244BC728CEA4DC9129AF392EBD4660F0FD62DEC45E7700E57DAD464A89
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cfa8fd6e708e242520525c30bfcadfa422ce028f315f66dc66fbe8ec01c725ec
                      • Instruction ID: ddd1b86d349be93cd26abd39a089ad28cebcfcecbc2669ff4f6db5009d02065c
                      • Opcode Fuzzy Hash: cfa8fd6e708e242520525c30bfcadfa422ce028f315f66dc66fbe8ec01c725ec
                      • Instruction Fuzzy Hash: E271A270609341CFC722DF18D88539ABBE1EFD6304F198A6EC9C597286D338A552CB96
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8c31fb140ed6bf20187175e22f0a7b43266736225535e38520ef6b94780b61b6
                      • Instruction ID: 96f5fc08c655095b160617391283794c17b460828c94bb8a9a883e3b036af509
                      • Opcode Fuzzy Hash: 8c31fb140ed6bf20187175e22f0a7b43266736225535e38520ef6b94780b61b6
                      • Instruction Fuzzy Hash: F9613C7110C380CFC315CB58884065BBFE0AFAA704F540D6EE5C5A7792C675EA09CBAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2756ed4631783ae0cc829404af07eadf753561bb50897bdfdf90c7d9c5c52181
                      • Instruction ID: 29538516de44edcf7582a9e2b727cf2f55695f5a19e8fd380397c09a88aa26e7
                      • Opcode Fuzzy Hash: 2756ed4631783ae0cc829404af07eadf753561bb50897bdfdf90c7d9c5c52181
                      • Instruction Fuzzy Hash: A521C637B1C7614BE3518F35DCC45477792EB87214B1A017ADE81D7382C636F802E296
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: df886b0847863313051c2667727db0ab781dfdfa4379abec52b675b3adf67df5
                      • Instruction ID: 973ffdcea0d592f631ef01c1131d7206f6ae1fd1f2d280df51a51869193aa499
                      • Opcode Fuzzy Hash: df886b0847863313051c2667727db0ab781dfdfa4379abec52b675b3adf67df5
                      • Instruction Fuzzy Hash: 5401BC3BB285314BF3519F79ECC814A6353FB8B21530E0231EA82D7342C632F412E28A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f28a8a5de9b0aa23fd99f53cd2d8b87933a2631140e4c19104637d173a8c570
                      • Instruction ID: 6c04391225370861c0d4043648be8474e9e55333c0dae57bd26468f16cf2eb63
                      • Opcode Fuzzy Hash: 1f28a8a5de9b0aa23fd99f53cd2d8b87933a2631140e4c19104637d173a8c570
                      • Instruction Fuzzy Hash: 59F0E22BB2867147F7919F66ECC410A6303E78B21570E0135EF81D7382C676F512E25A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0000$0000$0000$0000$0000$0000$0000
                      • API String ID: 0-3735745554
                      • Opcode ID: 97be3ee8353ebcccb5fd9c356fa5382d5f9c485eb5905a2df973ccc4d463490a
                      • Instruction ID: e5378a02405b101bcdf5dbed652373363ec6d2d21f896ddc0aa595c3e7dd57fb
                      • Opcode Fuzzy Hash: 97be3ee8353ebcccb5fd9c356fa5382d5f9c485eb5905a2df973ccc4d463490a
                      • Instruction Fuzzy Hash: 78115EBD2273804FC7089F0489E8656BF59FB56344369C6AAC4471B2E2D3B58803DB8E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0000$0000$0000$0000$0000$0000$0000
                      • API String ID: 0-3735745554
                      • Opcode ID: 8cc84ef14e8c139efcd8b1de24fc7b879e2537f081eb35a549e7ee1673a866ce
                      • Instruction ID: 3c1ac74e3f97160d7814e9761efe813063702cfa5cd85854cd263fed32d1d0fc
                      • Opcode Fuzzy Hash: 8cc84ef14e8c139efcd8b1de24fc7b879e2537f081eb35a549e7ee1673a866ce
                      • Instruction Fuzzy Hash: 310161BD6173808FC7098F1489A8605BF69BB56244359C1AAC4474F2E2E3B5C902CF8F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID: @DvF$Jxzv$_kQT$a[[d
                      • API String ID: 0-2174979120
                      • Opcode ID: 2d8366e74524e5093e30f7680ddec45d2930d59e69f81c80475d04386c52cd36
                      • Instruction ID: 1f3a0a8d3e70423f2bf4a75cc8649767a6149206e9a7a498639a5e44bad7eead
                      • Opcode Fuzzy Hash: 2d8366e74524e5093e30f7680ddec45d2930d59e69f81c80475d04386c52cd36
                      • Instruction Fuzzy Hash: 8171E37050D3C18FD7128F69885029BBFE0AF97318F184EAED4D1AB392D778854AC756
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID: !m%k$#i4g$+e(c$yw
                      • API String ID: 0-579512773
                      • Opcode ID: 6e9b7c751517cdbc06bb436c88e5d05743f4077e86103d70768e6b00b4fc371b
                      • Instruction ID: 57514c8425cd2fd664880043902cd7e69d9183ebd53fa6c61cf51f223200030c
                      • Opcode Fuzzy Hash: 6e9b7c751517cdbc06bb436c88e5d05743f4077e86103d70768e6b00b4fc371b
                      • Instruction Fuzzy Hash: D35178B154D3C18FE3329F2088557CABFB1AF92300F19899EC5C98B296E7794546CB53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2602603948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2602585528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602646527.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602663192.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602680171.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2602703124.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_1730032627d2195391cad2819cfdf751f1bb2b885277f672880c302ebc6dacb60d311c.jbxd
                      Similarity
                      • API ID:
                      • String ID: !q"s$#iJk$*u&w$0e-g
                      • API String ID: 0-3825726463
                      • Opcode ID: 3135c7baf312c3557c70f0376436dfd03e155d8f7ecc23642683bdfda1843212
                      • Instruction ID: 4e1464e1ccee8a0c2a5fd956f5e32923f0b79b51bff7f4d65ef434471bc5245a
                      • Opcode Fuzzy Hash: 3135c7baf312c3557c70f0376436dfd03e155d8f7ecc23642683bdfda1843212
                      • Instruction Fuzzy Hash: 9001EEB0054BA09FC3368F26A591206BFF0BF52600B616E1DC5E65FB29DB70A050CF45