Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
adEHIudJGb.exe

Overview

General Information

Sample name:adEHIudJGb.exe
renamed because original name is a hash value
Original sample name:0dafaa7feba79f41422715d008deefe5c7d94849.exe
Analysis ID:1546792
MD5:ab9870c0ad477a2f5e0078e82c7afb54
SHA1:0dafaa7feba79f41422715d008deefe5c7d94849
SHA256:d4610be19ea719ca5ca2ec3f53e2ae70bb60b1345d74d65fdcd18a45282634d4
Tags:exeReversingLabsuser-NDA0E
Infos:

Detection

Metasploit
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AV process strings found (often used to terminate AV products)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • adEHIudJGb.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\adEHIudJGb.exe" MD5: AB9870C0AD477A2F5E0078E82C7AFB54)
    • WerFault.exe (PID: 7372 cmdline: C:\Windows\system32\WerFault.exe -u -p 7300 -s 416 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"Type": "Metasploit Connect", "IP": "192.168.56.102", "Port": 443}
SourceRuleDescriptionAuthorStrings
adEHIudJGb.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    adEHIudJGb.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
    • 0x70061:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x6fc61:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0x6fc61:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        SourceRuleDescriptionAuthorStrings
        0.0.adEHIudJGb.exe.140000000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          0.0.adEHIudJGb.exe.140000000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
          • 0x70061:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
          0.2.adEHIudJGb.exe.140000000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            0.2.adEHIudJGb.exe.140000000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
            • 0x70061:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-01T15:55:29.070083+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449744TCP
            2024-11-01T15:56:07.348587+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449782TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: adEHIudJGb.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "192.168.56.102", "Port": 443}
            Source: adEHIudJGb.exeReversingLabs: Detection: 60%
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49782
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49744
            Source: adEHIudJGb.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: adEHIudJGb.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: adEHIudJGb.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
            Source: adEHIudJGb.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
            Source: adEHIudJGb.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
            Source: adEHIudJGb.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
            Source: adEHIudJGb.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
            Source: adEHIudJGb.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
            Source: adEHIudJGb.exeString found in binary or memory: http://ocsp.comodoca.com0
            Source: adEHIudJGb.exeString found in binary or memory: http://ocsp.sectigo.com0
            Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
            Source: adEHIudJGb.exeString found in binary or memory: https://sectigo.com/CPS0
            Source: adEHIudJGb.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/
            Source: adEHIudJGb.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

            System Summary

            barindex
            Source: adEHIudJGb.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
            Source: 0.0.adEHIudJGb.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
            Source: 0.2.adEHIudJGb.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
            Source: 00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
            Source: 00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
            Source: C:\Users\user\Desktop\adEHIudJGb.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7300 -s 416
            Source: adEHIudJGb.exeStatic PE information: invalid certificate
            Source: adEHIudJGb.exeBinary or memory string: OriginalFilename vs adEHIudJGb.exe
            Source: adEHIudJGb.exe, 00000000.00000002.1979817609.000000014013D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePuTTYd" vs adEHIudJGb.exe
            Source: adEHIudJGb.exeBinary or memory string: OriginalFilenamePuTTYd" vs adEHIudJGb.exe
            Source: adEHIudJGb.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
            Source: 0.0.adEHIudJGb.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
            Source: 0.2.adEHIudJGb.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
            Source: 00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
            Source: 00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
            Source: adEHIudJGb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal72.troj.winEXE@2/5@0/0
            Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7300
            Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\679f59e6-f2b6-4923-9fd7-126386c87bedJump to behavior
            Source: adEHIudJGb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\adEHIudJGb.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: adEHIudJGb.exeReversingLabs: Detection: 60%
            Source: adEHIudJGb.exeString found in binary or memory: config-address-family
            Source: adEHIudJGb.exeString found in binary or memory: config-ssh-portfwd-address-family
            Source: adEHIudJGb.exeString found in binary or memory: [200~}||{zconfig-proxyUnable to parse auth header from HTTP proxyConnection/Proxysshttypermit-ptyconfig-ssh-ptyServer refused to allocate ptyAllocated ptyReset scrollback on display activityidentityconfig-ssh-xauthorityPublic key of certification authoritySelect public key file of certification authorityconfig-serial-parityConfiguring %s paritySerialParityFontQualityValidityAddDllDirectoryOut of memoryCryptProtectMemoryUnable to load any WinSock libraryprimaryconfig-selection-autocopyMouseAutocopyconfig-rtfcopyWindow/Selection/Copy&CopyFlush log file frequentlyApplyReceived invalid elliptic curve point in ECDH replyReceived invalid elliptic curve point in GSSAPI ECDH replyconfig-altonlyKey file contains public key onlyUse font in OEM mode onlyAltOnlyForwarded port opened successfullyDisconnect if authentication succeeds triviallyconfig-address-familyconfig-ssh-portfwd-address-familyNetwork error: Address family not supported by protocol familyAddressFamilyForbid resizing completelyHandles SSH-2 key re-exchange badlyValid hosts this key is trusted to certifyModifyconfig-ssh-privkey-hostkeyconfig-telnetkeyconfig-ssh-kex-rekeyconfig-ssh-bug-rekeyGssapiRekeypublickeypubkeycert_ca_keyerrors-cant-load-keyputty-private-key-file-mac-keycross-certifying new host keyNoninteractive SSH proxy cannot confirm host keyNoninteractive SSH proxy cannot confirm weak cached host keyNo validity expression configured for this keyServer refused our keyuser authentication keyEncrypted session keyssh.com SSH-2 private keynot a PuTTY SSH-2 private keynot a public key or a PuTTY SSH-2 private keySSH-1 private keyAltGr acts as Compose keyunable to identify algorithm of base keyThe Backspace keyAdd keyFull text of host's public keyOffered public keySSH-1 public keyFingerprint of signing CA keyHostKeyTelnetKeyScrollOnKeyComposeKeyPublicKeySteadycleanup after downstream went awayDisable bidirectional text displayX authority file for local displayX11Displayconfig-nodelayTCPNoDelaypublic_affine_ypublic_yLinuxaux-demo-config-boxPuTTYConfigBoxunixdisplay name '%s' has no ':number' suffixgssapi-keyexLocal\putty-connshare-mutexNTRU Prime / Curve25519 hybrid kexServer's host key did not match any used in previous GSS kexConnection/SSH/Kexhhctrl.ocxprivate_xpublic_affine_xFlashWindowExToUnicodeExPageantRequest%08x%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x%s%02x\'%02x
            Source: adEHIudJGb.exeString found in binary or memory: config-serial-stopbits
            Source: adEHIudJGb.exeString found in binary or memory: source-address
            Source: adEHIudJGb.exeString found in binary or memory: /config-address-family.html
            Source: adEHIudJGb.exeString found in binary or memory: /config-serial-stopbits.html
            Source: adEHIudJGb.exeString found in binary or memory: j'/config-ssh-portfwd-address-family.html
            Source: adEHIudJGb.exeString found in binary or memory: /faq-startmax.html
            Source: adEHIudJGb.exeString found in binary or memory: /faq-startsess.html
            Source: adEHIudJGb.exeString found in binary or memory: /faq-startssh.html
            Source: adEHIudJGb.exeString found in binary or memory: /feedback-address.html
            Source: adEHIudJGb.exeString found in binary or memory: /pageant-mainwin-addkey.html
            Source: adEHIudJGb.exeString found in binary or memory: /pageant-start.html
            Source: adEHIudJGb.exeString found in binary or memory: /plink-starting.html
            Source: adEHIudJGb.exeString found in binary or memory: /pscp-starting.html
            Source: adEHIudJGb.exeString found in binary or memory: /psftp-cmd-help.html
            Source: adEHIudJGb.exeString found in binary or memory: /psftp-starting.html
            Source: unknownProcess created: C:\Users\user\Desktop\adEHIudJGb.exe "C:\Users\user\Desktop\adEHIudJGb.exe"
            Source: C:\Users\user\Desktop\adEHIudJGb.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7300 -s 416
            Source: C:\Users\user\Desktop\adEHIudJGb.exeSection loaded: apphelp.dllJump to behavior
            Source: adEHIudJGb.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: adEHIudJGb.exeStatic file information: File size 1663264 > 1048576
            Source: adEHIudJGb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: adEHIudJGb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: adEHIudJGb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: adEHIudJGb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: adEHIudJGb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: adEHIudJGb.exeStatic PE information: section name: .00cfg
            Source: adEHIudJGb.exeStatic PE information: section name: .gxfg
            Source: adEHIudJGb.exeStatic PE information: section name: _RDATA
            Source: C:\Users\user\Desktop\adEHIudJGb.exeCode function: 0_2_0000000140004E51 push CA36FFFFh; ret 0_2_0000000140004E6E
            Source: C:\Users\user\Desktop\adEHIudJGb.exeCode function: 0_2_00000001400462C0 push rdi; ret 0_2_00000001400462C2
            Source: adEHIudJGb.exeStatic PE information: section name: .text entropy: 6.989384052357256
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: Amcache.hve.3.drBinary or memory string: VMware
            Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.3.drBinary or memory string: vmci.sys
            Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.3.drBinary or memory string: VMware20,1
            Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: adEHIudJGb.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.adEHIudJGb.exe.140000000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.adEHIudJGb.exe.140000000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            Process Injection
            2
            Software Packing
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Process Injection
            LSASS Memory1
            System Information Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
            Obfuscated Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            adEHIudJGb.exe61%ReversingLabsWin64.Trojan.Swrort
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            http://upx.sf.net0%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#adEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tadEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            http://upx.sf.netAmcache.hve.3.drfalse
            • URL Reputation: safe
            unknown
            https://sectigo.com/CPS0adEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#adEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yadEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0adEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            http://ocsp.sectigo.com0adEHIudJGb.exefalse
            • URL Reputation: safe
            unknown
            https://www.chiark.greenend.org.uk/~sgtatham/putty/adEHIudJGb.exefalse
              unknown
              https://www.chiark.greenend.org.uk/~sgtatham/putty/0adEHIudJGb.exefalse
              • URL Reputation: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#adEHIudJGb.exefalse
              • URL Reputation: safe
              unknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1546792
              Start date and time:2024-11-01 15:54:07 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 16s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:adEHIudJGb.exe
              renamed because original name is a hash value
              Original Sample Name:0dafaa7feba79f41422715d008deefe5c7d94849.exe
              Detection:MAL
              Classification:mal72.troj.winEXE@2/5@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.42.65.92
              • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target adEHIudJGb.exe, PID 7300 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: adEHIudJGb.exe
              TimeTypeDescription
              10:55:28API Interceptor1x Sleep call for process: WerFault.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.7822078217881336
              Encrypted:false
              SSDEEP:96:gAF63OD2sKtaPQtYynFQXIDcQVlc6V5cE1cw3M+HbHg/PB6HeaOyVvESKDm6EBoH:d83OD2c0blR5/5jGnFzuiFuZ24lO8M
              MD5:CED4802A26907E2239B6BB1423EE5E44
              SHA1:CCB0F641DA3FAB0237D63333EBD105301BF78848
              SHA-256:88C71CC4DB954D4A2C965CF73EDB0DDFD946B98BC55F64DDDF9F4C7C6C514C64
              SHA-512:CBCCB5F5D92FCCA53984651781B7563E48EF5570CD6FFB8209917F3ED93A929AA551B78269FE938D07EF63339442D1D1B2D7139302C1811BC6C17D019155554B
              Malicious:true
              Reputation:low
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.9.4.6.5.0.8.3.9.4.3.9.3.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.9.4.6.5.0.8.7.8.5.0.0.9.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.9.1.2.1.6.4.-.c.9.1.f.-.4.c.0.f.-.a.0.b.9.-.e.3.d.3.0.5.f.7.5.c.a.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.0.f.8.9.f.e.7.-.9.9.8.0.-.4.e.a.4.-.8.2.7.9.-.2.0.8.4.c.d.d.f.3.f.f.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.a.d.E.H.I.u.d.J.G.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.u.T.T.Y.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.8.4.-.0.0.0.1.-.0.0.1.4.-.5.3.1.3.-.0.2.0.b.6.e.2.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.a.2.3.f.b.4.4.c.b.e.7.0.3.0.b.b.c.2.0.2.8.f.5.e.1.6.d.0.f.2.6.0.0.0.0.0.9.0.8.!.0.0.0.0.0.d.a.f.a.a.7.f.e.b.a.7.9.f.4.1.4.2.2.7.1.5.d.0.0.8.d.e.e.f.e.5.c.7.d.9.4.8.4.9.!.a.d.E.H.I.u.d.J.G.b...e.x.e.....T.
              Process:C:\Windows\System32\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Fri Nov 1 14:55:08 2024, 0x1205a4 type
              Category:dropped
              Size (bytes):46164
              Entropy (8bit):1.427180548930039
              Encrypted:false
              SSDEEP:96:5X8JKuwdTS2YNMG5O2f85WsnkptcQ4x1i7qWjDc2882V2SAEJ7HnwYWIi0IhAkLV:qGQMUD8Oqr820SZTs7qe766
              MD5:B8987EA0A7226033CA5E53E3A5CC5AFD
              SHA1:F7A893B65C895F6AA4D218453CC2E249B8F0DB3F
              SHA-256:4CAF38F0F16D46A03E5C3B17BD4E5C9266BDE0EDD99361EFEDA21FECF094FD12
              SHA-512:F9A4A7F0409879470010684AB3FD0209F62D832A0BAB48E61702E1EBE1B6F5EFEDA5CA5D26FF6274870DC87D9E2C415DB0C68B5A21A2E7ADB153AF4FC8D374D5
              Malicious:false
              Reputation:low
              Preview:MDMP..a..... .........$g.........................................)..........T.......8...........T...........................T...........@...............................................................................eJ..............Lw......................T.............$g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8520
              Entropy (8bit):3.701694783015132
              Encrypted:false
              SSDEEP:192:R6l7wVeJaePsP5OG6Y9H7F/gmfUhpDa89bqIhfvOm:R6lXJzPsR6Yd7F/gmfU3qmff
              MD5:795B5E5A091BFCE8661D6FDD24A22861
              SHA1:D983674AB4F7BD04B31AD151E1FCC132F31E46FF
              SHA-256:AD596BF7D0BCF7ED2BF7A91C3AFC5BC6169B45E448BB4E9986E401FA30EB5ACB
              SHA-512:FC6B5549188FEB8C8AC1F3ACD05B91B0693FB7148F2FA89A6285BD4896204CEE9EDF95EDC0F341835BA5A234A4D4021C7EF8867C2038CF8E32FD8185FE9AF200
              Malicious:false
              Reputation:low
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.0.0.<./.P.i.
              Process:C:\Windows\System32\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4697
              Entropy (8bit):4.480033506134391
              Encrypted:false
              SSDEEP:48:cvIwWl8zsXJg771I9H0WpW8VYaYm8M4JhOQq4F/hyq851BFlaC5qmDBd:uIjf5I7st7VKJhOtChMBz5qmDBd
              MD5:B4CEDB85726ACC9672DD98E1A00C471D
              SHA1:28F14127E8D7EDA60B6B0CD5A8034F090EAE76D0
              SHA-256:86E3F3149B7E0843EC7A94A795B537251DD64D8585A10AA32BDD546AEB0EA33A
              SHA-512:2B4F9E73BE9B971B1A39F7DDCFE53696002734FB323A1FFC3F68AC87F61A0730A8BD781311E21B8AFF81BFA6395DBB8BED5A5FC114B87E1476CFA68986F86C50
              Malicious:false
              Reputation:low
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="569157" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
              Process:C:\Windows\System32\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):1835008
              Entropy (8bit):4.465814455410295
              Encrypted:false
              SSDEEP:6144:AIXfpi67eLPU9skLmb0b4sWSPKaJG8nAgejZMMhA2gX4WABl0uN/dwBCswSbp:FXD94sWlLZMM6YFHN+p
              MD5:62E5D76753927887C9E7559A203B6A0A
              SHA1:4FE1656DA63C47DEC295509389D93EAA19316690
              SHA-256:1D5153227974A60284140C7E4A9A41C075A179526EA0AB2A571FFF313EBFA7B8
              SHA-512:307F036BE40C0EFF661D84988F44B78AE88BDF442C0A2971C07A9BE0D1EE166A41CFA48490F8763190F42C9C4457E8D14E88118FA183A44008D6E3812E08CFB0
              Malicious:false
              Reputation:low
              Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr...n,...............................................................................................................................................................................................................................................................................................................................................#9?........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:PE32+ executable (GUI) x86-64, for MS Windows
              Entropy (8bit):7.170770312347737
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:adEHIudJGb.exe
              File size:1'663'264 bytes
              MD5:ab9870c0ad477a2f5e0078e82c7afb54
              SHA1:0dafaa7feba79f41422715d008deefe5c7d94849
              SHA256:d4610be19ea719ca5ca2ec3f53e2ae70bb60b1345d74d65fdcd18a45282634d4
              SHA512:df2aa714b1b31e435ff766fa572c8408337c430c9216fbd0c0c463b616b3791e0274cb132e8f12273a9e6fb5fcd0ea6a3da1de58f1799471841decd6be02d4dc
              SSDEEP:49152:UEQTCzdN1WD0fvum5MLMERuwvoiRj6KIeVSc/zui+:f1mDRR36K2c/ii+
              TLSH:8A75E113B25A10EDD06EC57886625111EE71FC805B347ADF17ACA6292E22FD06F3DF26
              File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......e.........."............................@.......................................... ........................................
              Icon Hash:5c1d1e974b031d47
              Entrypoint:0x140078b8c
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x658B7F92 [Wed Dec 27 01:36:18 2023 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:69573714e11441683ea863c40a1c0d54
              Signature Valid:false
              Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
              Signature Validation Error:The digital signature of the object did not verify
              Error Number:-2146869232
              Not Before, Not After
              • 06/11/2021 00:00:00 05/11/2024 23:59:59
              Subject Chain
              • CN=Simon Tatham, O=Simon Tatham, S=Cambridgeshire, C=GB
              Version:3
              Thumbprint MD5:6F05B370ED850ADBDA93F7D41CDDA4C2
              Thumbprint SHA-1:6026ABF61401A3A86F1A4C6D37E7A4CC4D50B3AD
              Thumbprint SHA-256:8B5D2A54B182D234CC46D2FD4D9B139610CE6D3ABF3BEEF328E3884E9B14A850
              Serial:008E3FBFB91BE6DA041BA41F7A983AD61E
              Instruction
              cmc
              xchg eax, ebx
              inc edx
              inc ecx
              inc edx
              daa
              lahf
              dec edx
              cmc
              dec ecx
              inc eax
              nop
              stc
              xchg eax, ebx
              wait
              daa
              lahf
              das
              xchg eax, edx
              cdq
              das
              dec ebx
              nop
              clc
              wait
              xchg eax, ebx
              dec eax
              stc
              cdq
              std
              inc edx
              xchg eax, edx
              aas
              stc
              dec ebx
              cwde
              aas
              dec eax
              dec eax
              aaa
              lahf
              das
              dec eax
              das
              wait
              lahf
              clc
              daa
              xchg eax, ecx
              dec edx
              cdq
              inc ecx
              nop
              xchg eax, edx
              aaa
              inc eax
              inc ecx
              xchg eax, ebx
              cwde
              std
              nop
              daa
              cwde
              xchg eax, ebx
              dec edx
              aas
              lahf
              xchg eax, edx
              cmc
              das
              nop
              dec edx
              cmc
              xchg eax, ebx
              dec ebx
              inc ecx
              dec ebx
              xchg eax, ecx
              salc
              nop
              cld
              inc eax
              nop
              stc
              inc eax
              dec eax
              std
              clc
              clc
              das
              aaa
              dec eax
              nop
              xchg eax, ecx
              salc
              std
              inc eax
              dec edx
              salc
              xchg eax, ecx
              aas
              clc
              stc
              cwde
              jmp 00007F3988B2BA93h
              imul eax, dword ptr [ecx-48h], F4h
              add byte ptr [eax], al
              lodsb
              call 00007F39BDB86CBCh
              mov ecx, ebx
              mov eax, dword ptr [esi+ecx*4+48h]
              in al, F0h
              add dword ptr [ecx-62B771BCh], ecx
              retf 01A8h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1248100xb4.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x13e0000x5ab40.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1310000x6d38.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x190a000x5720.rsrc
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1990000x1ed8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x103dd00x28.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xfd6300x140.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x1253a80xae0.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xe80560xe8200abc1cec50fb9cc4259765916cc181473False0.7924312988018309data6.989384052357256IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0xea0000x4065c0x40800dd19f307beaba6e42c8dae5f0665cc59False0.35675569282945735PDP-11 UNIX/RT ldp5.474793339775578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x12b0000x559c0x100040007450ff23f6bfed5ad04a64c23342False0.1591796875data2.1145973694545392IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x1310000x6d380x6e0005e12815855165b38fa6ab9c712f5b64False0.49328835227272727data5.881052570110782IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .00cfg0x1380000x380x200cc911a368a87b6fd49c16207da72a70aFalse0.0703125data0.5091857957461216IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .gxfg0x1390000x2a600x2c00ba6aa0a7bdc8ed78db6dee460f93c19cFalse0.4118430397727273data5.099220379738547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tls0x13c0000x110x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              _RDATA0x13d0000x15c0x200d1cc931550eb0743be0ce87d8ed39048False0.40625data3.359944449669418IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x13e0000x5ab400x5ac00863f91d4b66ea2c4794edc695ab26f8cFalse0.916268508953168data7.827311438417424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x1990000x1ed80x2000fcd618a111f65824773c4f8ee2be50a1False0.3128662109375data5.407117932062177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x13e5200x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5202702702702703
              RT_ICON0x13e6480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.3602150537634409
              RT_ICON0x13e9300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.2097560975609756
              RT_ICON0x13ef980xb0Device independent bitmap graphic, 16 x 32 x 1, image size 64EnglishUnited States0.5681818181818182
              RT_ICON0x13f0480x130Device independent bitmap graphic, 32 x 64 x 1, image size 128EnglishUnited States0.5263157894736842
              RT_ICON0x13f1780x330Device independent bitmap graphic, 48 x 96 x 1, image size 384EnglishUnited States0.2928921568627451
              RT_ICON0x13f5080x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6081081081081081
              RT_ICON0x13f6300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.4771505376344086
              RT_ICON0x13f9180x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3195121951219512
              RT_ICON0x13ff800xb0Device independent bitmap graphic, 16 x 32 x 1, image size 64EnglishUnited States0.6590909090909091
              RT_ICON0x1400300x130Device independent bitmap graphic, 32 x 64 x 1, image size 128EnglishUnited States0.7368421052631579
              RT_ICON0x1401600x330Device independent bitmap graphic, 48 x 96 x 1, image size 384EnglishUnited States0.45465686274509803
              RT_DIALOG0x197da80x76dataEnglishUnited States0.711864406779661
              RT_DIALOG0x197e200xbadataEnglishUnited States0.7741935483870968
              RT_DIALOG0x197ca80xfadataEnglishUnited States0.692
              RT_DIALOG0x197ee00x8adataEnglishUnited States0.8260869565217391
              RT_DIALOG0x197f700x1aedataEnglishUnited States0.5720930232558139
              RT_DIALOG0x1981200xdedataEnglishUnited States0.7207207207207207
              RT_DIALOG0x1982000xa8dataEnglishUnited States0.7023809523809523
              RT_GROUP_ICON0x13f4a80x5adataEnglishUnited States0.7444444444444445
              RT_GROUP_ICON0x1404900x5adataEnglishUnited States0.7666666666666667
              RT_VERSION0x1982a80x338dataEnglishUnited States0.4817961165048544
              RT_MANIFEST0x1985e00x559XML 1.0 document, ASCII textEnglishUnited States0.4579985390796202
              None0x1404f00x577b7MS Windows HtmlHelp DataEnglishUnited States0.938371934015578
              DLLImport
              GDI32.dllBitBlt, CreateBitmap, CreateCompatibleBitmap, CreateCompatibleDC, CreateFontA, CreateFontIndirectA, CreatePalette, CreatePen, CreateSolidBrush, DeleteDC, DeleteObject, ExcludeClipRect, ExtTextOutA, ExtTextOutW, GetBkMode, GetCharABCWidthsFloatA, GetCharWidth32A, GetCharWidth32W, GetCharWidthA, GetCharWidthW, GetCharacterPlacementW, GetCurrentObject, GetDIBits, GetDeviceCaps, GetObjectA, GetOutlineTextMetricsA, GetPixel, GetStockObject, GetTextExtentExPointA, GetTextExtentPoint32A, GetTextMetricsA, IntersectClipRect, LineTo, MoveToEx, Polyline, RealizePalette, Rectangle, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetMapMode, SetPaletteEntries, SetPixel, SetTextAlign, SetTextColor, TextOutA, TranslateCharsetInfo, UnrealizeObject, UpdateColors
              IMM32.dllImmGetCompositionStringW, ImmGetContext, ImmReleaseContext, ImmSetCompositionFontA, ImmSetCompositionWindow
              ole32.dllCoCreateInstance, CoInitialize, CoUninitialize
              USER32.dllAppendMenuA, BeginPaint, CheckDlgButton, CheckMenuItem, CheckRadioButton, CloseClipboard, CreateCaret, CreateDialogParamA, CreateMenu, CreatePopupMenu, CreateWindowExA, CreateWindowExW, DefDlgProcA, DefWindowProcA, DefWindowProcW, DeleteMenu, DestroyCaret, DestroyIcon, DestroyWindow, DialogBoxParamA, DispatchMessageA, DispatchMessageW, DrawEdge, DrawIconEx, EmptyClipboard, EnableMenuItem, EnableWindow, EndDialog, EndPaint, FindWindowA, FlashWindow, GetCapture, GetCaretBlinkTime, GetClientRect, GetClipboardData, GetClipboardOwner, GetCursorPos, GetDC, GetDesktopWindow, GetDlgItem, GetDlgItemTextA, GetDoubleClickTime, GetForegroundWindow, GetKeyboardLayout, GetKeyboardState, GetMessageA, GetMessageTime, GetParent, GetQueueStatus, GetScrollInfo, GetSysColor, GetSysColorBrush, GetSystemMenu, GetSystemMetrics, GetWindowLongPtrA, GetWindowPlacement, GetWindowRect, GetWindowTextA, GetWindowTextLengthA, HideCaret, InsertMenuA, InvalidateRect, IsDialogMessageA, IsDlgButtonChecked, IsIconic, IsWindow, IsZoomed, KillTimer, LoadCursorA, LoadIconA, LoadImageA, MapDialogRect, MessageBeep, MessageBoxA, MessageBoxIndirectA, MoveWindow, MsgWaitForMultipleObjects, OffsetRect, OpenClipboard, PeekMessageA, PeekMessageW, PostMessageA, PostQuitMessage, RegisterClassA, RegisterClassW, RegisterClipboardFormatA, RegisterWindowMessageA, ReleaseCapture, ReleaseDC, ScreenToClient, SendDlgItemMessageA, SendMessageA, SetActiveWindow, SetCapture, SetCaretPos, SetClassLongPtrA, SetClipboardData, SetCursor, SetDlgItemTextA, SetFocus, SetForegroundWindow, SetKeyboardState, SetScrollInfo, SetTimer, SetWindowLongPtrA, SetWindowPlacement, SetWindowPos, SetWindowTextA, SetWindowTextW, ShowCaret, ShowCursor, ShowWindow, SystemParametersInfoA, ToAsciiEx, TrackPopupMenu, TranslateMessage, UpdateWindow
              KERNEL32.dllBeep, ClearCommBreak, CloseHandle, CompareStringW, ConnectNamedPipe, CreateEventA, CreateFileA, CreateFileMappingA, CreateFileW, CreateMutexA, CreateNamedPipeA, CreatePipe, CreateProcessA, CreateThread, DeleteCriticalSection, DeleteFileA, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileA, FindFirstFileExW, FindNextFileA, FindNextFileW, FindResourceA, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommState, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryA, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetEnvironmentStringsW, GetEnvironmentVariableA, GetFileSizeEx, GetFileType, GetLastError, GetLocalTime, GetLocaleInfoA, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetProcessTimes, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryA, GetSystemTimeAsFileTime, GetTempPathA, GetThreadTimes, GetTickCount, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, GetWindowsDirectoryA, GlobalAlloc, GlobalFree, GlobalLock, GlobalMemoryStatus, GlobalUnlock, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringW, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryExW, LoadResource, LocalAlloc, LocalFileTimeToFileTime, LocalFree, LockResource, MapViewOfFile, MulDiv, MultiByteToWideChar, OpenProcess, OutputDebugStringW, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseMutex, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetCommBreak, SetCommState, SetCommTimeouts, SetCurrentDirectoryA, SetEndOfFile, SetEnvironmentVariableW, SetEvent, SetFilePointerEx, SetHandleInformation, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SizeofResource, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UnmapViewOfFile, WaitForSingleObject, WaitNamedPipeA, WideCharToMultiByte, WriteConsoleW, WriteFile
              SHELL32.dllShellExecuteA
              COMDLG32.dllChooseColorA, ChooseFontA, GetOpenFileNameA, GetSaveFileNameA
              ADVAPI32.dllAllocateAndInitializeSid, CopySid, EqualSid, GetLengthSid, GetUserNameA, InitializeSecurityDescriptor, RegCloseKey, RegCreateKeyExA, RegDeleteKeyA, RegEnumKeyA, RegOpenKeyA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, SetSecurityDescriptorDacl, SetSecurityDescriptorOwner
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:10:55:08
              Start date:01/11/2024
              Path:C:\Users\user\Desktop\adEHIudJGb.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\adEHIudJGb.exe"
              Imagebase:0x140000000
              File size:1'663'264 bytes
              MD5 hash:AB9870C0AD477A2F5E0078E82C7AFB54
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.1771504707.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.1979604577.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:3
              Start time:10:55:08
              Start date:01/11/2024
              Path:C:\Windows\System32\WerFault.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\WerFault.exe -u -p 7300 -s 416
              Imagebase:0x7ff6b8e70000
              File size:570'736 bytes
              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly