Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5XpKRbh2k7.exe

Overview

General Information

Sample name:5XpKRbh2k7.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:d89bfa433590d35313bc40cfdd257acc84331d1f95cda24a47c22c23af78c724
Analysis ID:1544261
MD5:0b9820ecc88383016b7ff530a6777294
SHA1:44c13dfa53d66e6c13b3eb06323d900cebfe7e6e
SHA256:d89bfa433590d35313bc40cfdd257acc84331d1f95cda24a47c22c23af78c724
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

.NET source code contains potential unpacker
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • 5XpKRbh2k7.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\5XpKRbh2k7.exe" MD5: 0B9820ECC88383016B7FF530A6777294)
    • WerFault.exe (PID: 5040 cmdline: C:\Windows\system32\WerFault.exe -u -p 7096 -s 760 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5XpKRbh2k7.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: 5XpKRbh2k7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\DependencyInjection\src\Microsoft.Extensions.DependencyInjection.Abstractions\bin\Release\netstandard1.0\Microsoft.Extensions.DependencyInjection.Abstractions.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: mscorlib.pdb source: WER2F60.tmp.dmp.3.dr
    Source: Binary string: D:\a\1\s\xpdBootstrapper\obj\Release\net472\xpdBootstrapper.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: E:\A\_work\708\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Diagnostics.DiagnosticSource\net46\System.Diagnostics.DiagnosticSource.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\Microsoft.Applications.Events\obj\Server\netstandard1.3\Microsoft.Applications.Events.Server.pdbSHA256 source: 5XpKRbh2k7.exe
    Source: Binary string: mscorlib.ni.pdb source: WER2F60.tmp.dmp.3.dr
    Source: Binary string: D:\a\1\s\Microsoft.Applications.Events\obj\Server\netstandard1.3\Microsoft.Applications.Events.Server.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\OTelCS.Net461\Sources\OneCollector\obj\Release\Microsoft.Office.Telemetry.OneCollector.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\EventFlags.Net45\Sources\obj\Release\Microsoft.Office.Telemetry.EventFlags.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\EventFlags.Net45\Sources\obj\Release\Microsoft.Office.Telemetry.EventFlags.pdb|A source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\OTelCS.Net461\Sources\TelemetryService\obj\Release\OTelCS.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER2F60.tmp.dmp.3.dr
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\Logging\src\Microsoft.Extensions.Logging.Abstractions\bin\Release\netstandard1.1\Microsoft.Extensions.Logging.Abstractions.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\Microsoft.Data.Sqlite\src\Microsoft.Data.Sqlite\bin\Release\netstandard1.3\Microsoft.Data.Sqlite.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\Logging\src\Microsoft.Extensions.Logging\bin\Release\netstandard1.1\Microsoft.Extensions.Logging.pdb source: 5XpKRbh2k7.exe

    Networking

    barindex
    Source: Yara matchFile source: 5XpKRbh2k7.exe, type: SAMPLE
    Source: 5XpKRbh2k7.exeString found in binary or memory: http://corppki/aia/MSIT%20CA%20Z1(2).crt0E
    Source: 5XpKRbh2k7.exeString found in binary or memory: http://corppki/aia/msintcrca.crt0=
    Source: 5XpKRbh2k7.exeString found in binary or memory: http://corppki/crl/MSIT%20CA%20Z1(2).crl
    Source: 5XpKRbh2k7.exeString found in binary or memory: http://corppki/crl/msintcrca.crl
    Source: 5XpKRbh2k7.exeString found in binary or memory: http://sqlite.org/rescode.html
    Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
    Source: 5XpKRbh2k7.exeString found in binary or memory: http://www.asp.net/
    Source: 5XpKRbh2k7.exeString found in binary or memory: https://pipe.int.trafficmanager.net/OneCollector/1.0/
    Source: 5XpKRbh2k7.exeString found in binary or memory: https://support.office.com/oReplacing
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7096 -s 760
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Applications.Events.Server.dllj% vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Data.Sqlite.dll> vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Extensions.DependencyInjection.Abstractions.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Extensions.Logging.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Extensions.Logging.Abstractions.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Office.Telemetry.EventFlags.dlll& vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Office.Telemetry.OneCollector.dllB vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOTelCS.dll. vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE03462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Diagnostics.DiagnosticSource.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, 00000000.00000000.1682954949.000001EE036E7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexpdBootstrapper.exeX vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Applications.Events.Server.dllj% vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Data.Sqlite.dll> vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Extensions.DependencyInjection.Abstractions.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Extensions.Logging.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Extensions.Logging.Abstractions.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Office.Telemetry.EventFlags.dlll& vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameMicrosoft.Office.Telemetry.OneCollector.dllB vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameOTelCS.dll. vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenameSystem.Diagnostics.DiagnosticSource.dllT vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exeBinary or memory string: OriginalFilenamexpdBootstrapper.exeX vs 5XpKRbh2k7.exe
    Source: 5XpKRbh2k7.exe, IAppxBundleReader.csSuspicious method names: ..GetPayloadPackage
    Source: 5XpKRbh2k7.exe, IAppxBundleReader.csSuspicious method names: ..GetPayloadPackages
    Source: 5XpKRbh2k7.exe, IAppxPackageWriter.csSuspicious method names: ..AddPayloadFile
    Source: 5XpKRbh2k7.exe, IAppxPackageReader.csSuspicious method names: ..GetPayloadFile
    Source: 5XpKRbh2k7.exe, IAppxPackageReader.csSuspicious method names: ..GetPayloadFiles
    Source: 5XpKRbh2k7.exe, Program.csSuspicious method names: .Program.GetPayload
    Source: 5XpKRbh2k7.exe, Program.csSuspicious method names: .Program.InjectResources
    Source: 5XpKRbh2k7.exe, Program.csSuspicious method names: .Program.PayloadFromPackage
    Source: classification engineClassification label: mal48.troj.evad.winEXE@2/5@0/0
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeMutant created: NULL
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7096
    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\9c090737-4f8e-4ed4-81c7-d95a0bb408c4Jump to behavior
    Source: 5XpKRbh2k7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 5XpKRbh2k7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 5XpKRbh2k7.exeString found in binary or memory: --help
    Source: 5XpKRbh2k7.exeString found in binary or memory: --help
    Source: 5XpKRbh2k7.exeString found in binary or memory: !/silent /installQRunning WebView2 Evergreen bootstrapper.[WebView2 Evergreen bootstrapper has been run.aError running WebView2 Evergreen bootstrapper: '
    Source: 5XpKRbh2k7.exeString found in binary or memory: Try `= --help' for more information.
    Source: 5XpKRbh2k7.exeString found in binary or memory: Try `= --help' for more information.
    Source: 5XpKRbh2k7.exeString found in binary or memory: install/Installs a packaged app?Installs a packaged application!p:|pkg:|package:
    Source: 5XpKRbh2k7.exeString found in binary or memory: launch/Launches an application/pfn:|packageFamilyName:kPackage family name of the application to be launchedeCommand line to pass into the launched applicationlistYLists all versions of the app on this device
    Source: 5XpKRbh2k7.exeString found in binary or memory: Input does not match expected format: [x-y]. Run xpdAgent.exe configure-buckets --help to see formatting instructions
    Source: 5XpKRbh2k7.exeString found in binary or memory: Input does not match expected format: [x-y]. Run xpdAgent.exe configure-buckets --help to see formatting instructions
    Source: 5XpKRbh2k7.exeString found in binary or memory: Unable to parse range. Run xpdAgent.exe configure-buckets --help to see formatting instructions
    Source: 5XpKRbh2k7.exeString found in binary or memory: Unable to parse range. Run xpdAgent.exe configure-buckets --help to see formatting instructions
    Source: 5XpKRbh2k7.exeString found in binary or memory: IChecking installation prerequisites.yAt least one installation prerequisite was not met, exiting.KCompleted installation prerequisites./Installation succeeded.EInstallation failed with exception
    Source: 5XpKRbh2k7.exeString found in binary or memory: qFailed to add persistent data fields to an unusable sink/AddPersistentDataFields!Dropping event: %SendTelemetryEvent9Event name was null or empty
    Source: 5XpKRbh2k7.exeString found in binary or memory: {"indirect":"false","quiet":"false","errorBaseUrl":"https://go.microsoft.com/fwlink/","errorParameters":"linkid=2238672","packageFamilyName":"Microsoft.OutlookForWindows_8wekyb3d8bbwe","applicationId":"Microsoft.OutlookforWindows","arm64":"https://res.cdn.office.net/nativehost/5mttl/installer/v2/1.2024.1018.100/Microsoft.OutlookForWindows_arm64.msix","x86":"https://res.cdn.office.net/nativehost/5mttl/installer/v2/1.2024.1018.100/Microsoft.OutlookForWindows_x86.msix","x64":"https://res.cdn.office.net/nativehost/5mttl/installer/v2/1.2024.1018.100/Microsoft.OutlookForWindows_x64.msix","CompanyName":"Microsoft Corporation","FileDescription":"Microsoft Outlook Installer","FileVersion":"1.2024.1018.100","LegalCopyright":"Copyright (C) Microsoft Corporation. All rights reserved.","ProductName":"Microsoft Outlook Installer","ProductVersion":"1.2024.1018.100","packageManifest":"C:\\a\\_work\\1\\b\\2\\_work\\1\\s\\build\\win-x64-release\\xpdPackLogs\\AppXManifest.xml","errorBackgroundColor":"#ffffff","errorTextColor":"#737474","enableStubMode":"true"}PA
    Source: unknownProcess created: C:\Users\user\Desktop\5XpKRbh2k7.exe "C:\Users\user\Desktop\5XpKRbh2k7.exe"
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7096 -s 760
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: 5XpKRbh2k7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: 5XpKRbh2k7.exeStatic file information: File size 2725888 > 1048576
    Source: 5XpKRbh2k7.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x1b9600
    Source: 5XpKRbh2k7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: 5XpKRbh2k7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\DependencyInjection\src\Microsoft.Extensions.DependencyInjection.Abstractions\bin\Release\netstandard1.0\Microsoft.Extensions.DependencyInjection.Abstractions.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: mscorlib.pdb source: WER2F60.tmp.dmp.3.dr
    Source: Binary string: D:\a\1\s\xpdBootstrapper\obj\Release\net472\xpdBootstrapper.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: E:\A\_work\708\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Diagnostics.DiagnosticSource\net46\System.Diagnostics.DiagnosticSource.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\Microsoft.Applications.Events\obj\Server\netstandard1.3\Microsoft.Applications.Events.Server.pdbSHA256 source: 5XpKRbh2k7.exe
    Source: Binary string: mscorlib.ni.pdb source: WER2F60.tmp.dmp.3.dr
    Source: Binary string: D:\a\1\s\Microsoft.Applications.Events\obj\Server\netstandard1.3\Microsoft.Applications.Events.Server.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\OTelCS.Net461\Sources\OneCollector\obj\Release\Microsoft.Office.Telemetry.OneCollector.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\EventFlags.Net45\Sources\obj\Release\Microsoft.Office.Telemetry.EventFlags.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\EventFlags.Net45\Sources\obj\Release\Microsoft.Office.Telemetry.EventFlags.pdb|A source: 5XpKRbh2k7.exe
    Source: Binary string: D:\a\1\s\OTelCS.Net461\Sources\TelemetryService\obj\Release\OTelCS.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER2F60.tmp.dmp.3.dr
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\Logging\src\Microsoft.Extensions.Logging.Abstractions\bin\Release\netstandard1.1\Microsoft.Extensions.Logging.Abstractions.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\Microsoft.Data.Sqlite\src\Microsoft.Data.Sqlite\bin\Release\netstandard1.3\Microsoft.Data.Sqlite.pdb source: 5XpKRbh2k7.exe
    Source: Binary string: C:\b\w\d6337ac2abf63a4b\.repositories\Logging\src\Microsoft.Extensions.Logging\bin\Release\netstandard1.1\Microsoft.Extensions.Logging.pdb source: 5XpKRbh2k7.exe

    Data Obfuscation

    barindex
    Source: 5XpKRbh2k7.exe, JSONParser.cs.Net Code: ParseValue
    Source: 5XpKRbh2k7.exe, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
    Source: 5XpKRbh2k7.exe, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
    Source: 5XpKRbh2k7.exeStatic PE information: 0x8B7D1A90 [Sun Feb 28 00:23:44 2044 UTC]
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeMemory allocated: 1EE03A20000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeMemory allocated: 1EE1D5B0000 memory reserve | memory write watchJump to behavior
    Source: Amcache.hve.3.drBinary or memory string: VMware
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeQueries volume information: C:\Users\user\Desktop\5XpKRbh2k7.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\5XpKRbh2k7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Process Injection
    2
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory2
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Timestomp
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1544261 Sample: 5XpKRbh2k7 Startdate: 29/10/2024 Architecture: WINDOWS Score: 48 10 .NET source code contains potential unpacker 2->10 12 Yara detected Generic Downloader 2->12 6 5XpKRbh2k7.exe 2->6         started        process3 process4 8 WerFault.exe 19 16 6->8         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    5XpKRbh2k7.exe0%ReversingLabs
    5XpKRbh2k7.exe0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    https://support.office.com/oReplacing0%VirustotalBrowse
    http://www.asp.net/0%VirustotalBrowse
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.3.drfalse
    • URL Reputation: safe
    unknown
    http://corppki/crl/msintcrca.crl5XpKRbh2k7.exefalse
      unknown
      http://www.asp.net/5XpKRbh2k7.exefalseunknown
      http://corppki/aia/MSIT%20CA%20Z1(2).crt0E5XpKRbh2k7.exefalse
        unknown
        http://corppki/crl/MSIT%20CA%20Z1(2).crl5XpKRbh2k7.exefalse
          unknown
          https://support.office.com/oReplacing5XpKRbh2k7.exefalseunknown
          http://corppki/aia/msintcrca.crt0=5XpKRbh2k7.exefalse
            unknown
            http://sqlite.org/rescode.html5XpKRbh2k7.exefalse
              unknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1544261
              Start date and time:2024-10-29 06:42:16 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 59s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:5XpKRbh2k7.exe
              (renamed file extension from none to exe, renamed because original name is a hash value)
              Original Sample Name:d89bfa433590d35313bc40cfdd257acc84331d1f95cda24a47c22c23af78c724
              Detection:MAL
              Classification:mal48.troj.evad.winEXE@2/5@0/0
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 52.168.117.173
              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              01:43:30API Interceptor1x Sleep call for process: WerFault.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.8579064854031604
              Encrypted:false
              SSDEEP:96:JhF7ZhzTkhssl9kzxymTpQXIDcQ1c6mcEqcw3QdJ+BHUHZopAnQFdE7HeSv+xnj0:PnVssLA0biwMsaKWzuiFNZ24lO8yyV
              MD5:21B606C91473EE3DBAF54402A5B117C9
              SHA1:ECDD372AC03D5BDEC46855544D06EAFA7292262C
              SHA-256:0AB908246ED182010343BE8EF51995DEAAB835154985614C18F4CD7F392BFD30
              SHA-512:2E889AEEA0ED8DF47284B4DEE2902CF38CC345900336406952A8C17DEE9908C5F9F5011F71F233304B882DC8443F576E3A48DFF162CD25345CAD1A1C8B6EFED8
              Malicious:false
              Reputation:low
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.5.4.1.8.9.2.4.9.1.2.2.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.5.4.1.8.9.6.2.4.1.2.4.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.d.d.8.9.a.b.-.d.1.9.c.-.4.c.d.5.-.9.8.4.5.-.e.9.e.b.5.b.1.9.5.e.2.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.f.1.6.f.5.f.-.c.4.7.5.-.4.a.6.e.-.9.3.7.7.-.b.0.9.3.0.b.7.3.0.e.e.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.5.X.p.K.R.b.h.2.k.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.x.p.d.B.o.o.t.s.t.r.a.p.p.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.b.8.-.0.0.0.1.-.0.0.1.4.-.6.0.8.3.-.f.8.6.e.c.5.2.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.2.0.e.3.a.4.3.9.1.2.a.b.0.a.4.3.a.8.e.6.d.b.a.4.8.d.a.8.1.2.9.0.0.0.0.0.0.0.0.!.0.0.0.0.4.4.c.1.3.d.f.a.5.3.d.6.6.e.6.c.1.3.b.3.e.b.0.6.3.2.3.d.9.0.0.c.e.b.f.e.7.e.6.e.!.5.X.p.
              Process:C:\Windows\System32\WerFault.exe
              File Type:Mini DuMP crash report, 16 streams, Tue Oct 29 05:43:09 2024, 0x1205a4 type
              Category:dropped
              Size (bytes):215542
              Entropy (8bit):2.6027343713973825
              Encrypted:false
              SSDEEP:1536:Ig8YziuZ9jCC8jH/K3mXh5+vMOxVF83IHyUvqy/:v8Yzl1CCqn3+v/VwriB/
              MD5:CA0E1F9AA889658772CA14EB243B2C8E
              SHA1:D5DD1E42BEC9AB525A58AB47D0439351CCED816C
              SHA-256:E15C46E97996C019F476AF11BAB3ED8993B889680D44A11C7F747017B758E094
              SHA-512:450E8BDD1B1DEB260D27F760739D2496C62AAFDDCF2A9DA6C44EBCEB88FC7EE58AD9D406FC5630962612AF06477F90FB666C3F3341910B14EB9D332991A82CF5
              Malicious:false
              Reputation:low
              Preview:MDMP..a..... ........u g....................................$...X...........|............O..........l.......8...........T................,......................p...............................................................................eJ..............Lw......................T............u g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8558
              Entropy (8bit):3.707100623029257
              Encrypted:false
              SSDEEP:192:R6l7wVeJhLz6Y9dlS3tgmfJ4dvUprw89bnmAf0itm:R6lXJtz6YnlS3tgmfJ4dvcnxfu
              MD5:D0196478AC23E5ACF54C9C7F34D1FB7E
              SHA1:57F065C0ED2A55D1985BB3EEEBE1FC8542F7BC46
              SHA-256:10C186512F6858F790387EBF662CB7FA929030D2BFD61A6C8194B56CDF4795A5
              SHA-512:03C36F0377E44AD2F391570B4AFFA9A5BB1BD7C1F35CF3EF739C27A705191B913FDE3075E058E959930590102536C8BFE787586356BBA205830BE73D8A9A7483
              Malicious:false
              Reputation:low
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.9.6.<./.P.i.
              Process:C:\Windows\System32\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4739
              Entropy (8bit):4.49924203094601
              Encrypted:false
              SSDEEP:48:cvIwWl8zs8Jg771I9xzyWpW8VY+Ym8M4J6xIsFNRyq858xmh4bB/6d:uIjf6I76/7VqJ6xRRnxi4bB/6d
              MD5:31A6A84A87E2C04FD0EBA41B90340583
              SHA1:F92C38F3AD945B42AB227FF0973BEE570C8C19D1
              SHA-256:69DE1DCC8B607CF61E6BBE9EE95A87FF31E7F2B2F2809A860E3CA7CCCF003EEF
              SHA-512:DF66ACA7AB2DE2D36BDB788B00F4E63BCDAE0345292EA70633E6F263FCE69EAF9A967803014B2032C700BB5E3A6AE25A3DA0BFA603D133CCB2A2261254DD93A3
              Malicious:false
              Reputation:low
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="564285" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
              Process:C:\Windows\System32\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):1835008
              Entropy (8bit):4.466092212818802
              Encrypted:false
              SSDEEP:6144:aIXfpi67eLPU9skLmb0b4mWSPKaJG8nAgejZMMhA2gX4WABl0uNvdwBCswSbt:vXD94mWlLZMM6YFHl+t
              MD5:E78C727C383395A183B122E6D50A0F39
              SHA1:CC9756934D3312E9E28377171045AE1A8A4C3D1A
              SHA-256:9E61A71ECC1BCED7B29C9723DD470504AE1C3D1FA97E3D6A920B04F22DEE776A
              SHA-512:1CA3191917E6F46FD6307F2C6681784C455340DB1CB66188C8F10156718A4341A3B64A911002A2335EDCDECA97F87C61C95C8F44DE2BEF26EEBF9D84A29E22AF
              Malicious:false
              Reputation:low
              Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.`o.)...............................................................................................................................................................................................................................................................................................................................................-w[........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):3.3813537372092846
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:5XpKRbh2k7.exe
              File size:2'725'888 bytes
              MD5:0b9820ecc88383016b7ff530a6777294
              SHA1:44c13dfa53d66e6c13b3eb06323d900cebfe7e6e
              SHA256:d89bfa433590d35313bc40cfdd257acc84331d1f95cda24a47c22c23af78c724
              SHA512:a45a9af37a0df94b134c1e28e5f745d85cd2da29f304de3cc7359ed8798e9d0022f6f0affd78acb04aa580f98a62b4970b4e8df6aee52f57f2deb1ccebdec180
              SSDEEP:12288:qVuZ6Zoi5qEeMjY7sMCkn8Q+qPFU1k8QRiAfXnDZRImi:SuZpsMCkbtfiAn5i
              TLSH:52C56B4267F88615E2FF1B34E4B0443907BAFE676AA2D38E5945BC8D1B33B849521733
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}..........."...0.................. ... ....@.. ........................)...........`................................
              Icon Hash:1c37ec3a1ec4e373
              Entrypoint:0x4e12c6
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x8B7D1A90 [Sun Feb 28 00:23:44 2044 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              push ebx
              push eax
              add byte ptr [eax], FFFFFF9Bh
              in al, FCh
              pop esp
              sub edx, edi
              mov dl, byte ptr [edx-331D432Ch]
              cld
              cmp al, 05h
              out C4h, eax
              xchg eax, edx
              aam F4h
              cld
              mov byte ptr [F2A55B4Ah], al
              int3
              mov esp, 62F2FC94h
              cmp eax, 6A707CA0h
              push ecx
              pop ecx
              push FFFFFF91h
              xchg eax, edx
              sbb eax, 1C02972Fh
              xor ch, 00000039h
              ret
              in al, 80h
              push edx
              sub bl, byte ptr [edx]
              jo 00007FA5CCD6E410h
              sahf
              jnc 00007FA5CCD6E4F0h
              pop esi
              pop edx
              mov dx, 8A26h
              jp 00007FA5CCD6E4EFh
              je 00007FA5CCD6E47Fh
              test al, 32h
              jo 00007FA5CCD6E499h
              fadd dword ptr [ecx]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [ebp-6Eh], dh
              dec ebp
              imul eax, dword ptr [eax+esi-7A1079F0h], FEh
              xchg dword ptr [eax], edx
              jp 00007FA5CCD6E41Ah
              pop ss
              mov ebp, AB287B2Ch
              and byte ptr [ebp+0B6942C2h], ch
              imul ebp, ecx, A5h
              xchg eax, edi
              test eax, 26C8128Eh
              ror dword ptr [ecx+50h], FFFFFFFFh
              jnl 00007FA5CCD6E44Fh
              int AEh
              adc eax, CC29CED7h
              cmp al, EFh
              cmp ebx, dword ptr [edi]
              test byte ptr [ecx], dh
              pop ds
              cmp eax, dword ptr [edi]
              out 29h, al
              jmp 00007FA5CCD6E49Fh
              sub dl, byte ptr [edx]
              pop edx
              mov cl, 67h
              mov al, D8h
              call 00007FA5F4506CEBh
              push esp
              movsd
              cmp ecx, dword ptr [edx]
              imul esp, dword ptr [ecx], B1h
              sbb byte ptr [esi], cl
              inc esp
              mov edx, 8A476014h
              mov bl, 4Ch
              fstenv [esi-08h]
              rol byte ptr [edx-27h], 1
              cwde
              jnle 00007FA5CCD6E4CFh
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xe12740x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe20000x1b9580.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x29c0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0xe11e40x38.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xdfda00xdfe0071bd3fe2b8e9bb1e5f9414230bb16da0False0.4152936993997767data6.14330679205434IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xe20000x1b95800x1b960043fe835c4ee31c02b3c7743134cb39a0False0.037760416666666664data0.8942007763359577IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x29c0000xc0x200a95e3921bcac1a17465009fdae8ed52eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_BITMAP0xe23580x1a51a8Device independent bitmap graphic, 880 x 490 x 32, image size 0, resolution 2835 x 2835 px/m0.017606735229492188
              RT_ICON0x2875000x8a4ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9951985539174151
              RT_ICON0x28ff500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.19561880018894662
              RT_ICON0x2941780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.24201244813278008
              RT_ICON0x2967200x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400, resolution 2835 x 2835 px/m0.2739644970414201
              RT_ICON0x2981880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.31378986866791747
              RT_ICON0x2992300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/m0.4163934426229508
              RT_ICON0x299bb80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600, resolution 2835 x 2835 px/m0.45813953488372094
              RT_ICON0x29a2700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.5398936170212766
              RT_STRING0x29a6d80x862data0.2777260018639329
              RT_GROUP_ICON0x29af3c0x76data0.7542372881355932
              RT_GROUP_ICON0x29afb40x14data1.1
              RT_VERSION0x29afc80x418data0.40935114503816794
              RT_MANIFEST0x29b3e00x1a0XML 1.0 document, ASCII text, with CRLF line terminators0.6274038461538461
              DLLImport
              mscoree.dll_CorExeMain
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:01:43:08
              Start date:29/10/2024
              Path:C:\Users\user\Desktop\5XpKRbh2k7.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\5XpKRbh2k7.exe"
              Imagebase:0x1ee03460000
              File size:2'725'888 bytes
              MD5 hash:0B9820ECC88383016B7FF530A6777294
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:3
              Start time:01:43:09
              Start date:29/10/2024
              Path:C:\Windows\System32\WerFault.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\WerFault.exe -u -p 7096 -s 760
              Imagebase:0x7ff7d35b0000
              File size:570'736 bytes
              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly