Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPO49120.scr.exe

Overview

General Information

Sample name:rPO49120.scr.exe
Analysis ID:1564955
MD5:9f7b3b8d4066b235e9238a1e84a2619c
SHA1:e20d0c63cd20b227142f70376b13040d1666db13
SHA256:b7228f1612c886d9e36fe88d67561c3f99398f65094d7721c773a3d9a4cc5238
Tags:exeuser-Porcupine
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • rPO49120.scr.exe (PID: 4404 cmdline: "C:\Users\user\Desktop\rPO49120.scr.exe" MD5: 9F7B3B8D4066B235E9238A1E84A2619C)
    • WerFault.exe (PID: 6764 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2468 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: rPO49120.scr.exeReversingLabs: Detection: 26%
Source: rPO49120.scr.exeVirustotal: Detection: 33%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: rPO49120.scr.exeJoe Sandbox ML: detected
Source: rPO49120.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: rPO49120.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbe source: rPO49120.scr.exe, 00000000.00000002.3044153654.0000000005FF2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: C:\Users\user\Desktop\rPO49120.scr.PDB source: rPO49120.scr.exe, 00000000.00000002.3042122002.0000000000537000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbL}X source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdbF source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: Binary string: n0C:\Windows\mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3042122002.0000000000537000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbT( source: rPO49120.scr.exe, 00000000.00000002.3044153654.0000000005FF2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.pdb* source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Net.Http.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Configuration.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: \mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: %%.pdb source: rPO49120.scr.exe, 00000000.00000002.3042122002.0000000000537000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Windows.Forms.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3044153654.0000000005FF2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Net.Http.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Drawing.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Net.Http.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Xml.pdbmscorlib.dll source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: global trafficHTTP traffic detected: GET /wp-includes/N1j7IGsuRMa.php HTTP/1.1Host: www.new.eventawardsrussia.comConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /wp-includes/N1j7IGsuRMa.php HTTP/1.1Host: www.new.eventawardsrussia.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: www.new.eventawardsrussia.com
Source: rPO49120.scr.exe, 00000000.00000002.3043059288.00000000024EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: rPO49120.scr.exe, 00000000.00000002.3043059288.0000000002506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.new.eventawardsrussia.com
Source: rPO49120.scr.exe, 00000000.00000002.3043059288.0000000002506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.new.eventawardsrussia.comd
Source: rPO49120.scr.exe, 00000000.00000002.3043059288.00000000024FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.new.eventawardsrussia.com
Source: rPO49120.scr.exeString found in binary or memory: https://www.new.eventawardsrussia.com/wp-includes/N1j7IGsuRMa.php
Source: rPO49120.scr.exe, 00000000.00000002.3043059288.0000000002481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.new.eventawardsrussia.com/wp-includes/N1j7IGsuRMa.phpt
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: C:\Users\user\Desktop\rPO49120.scr.exeCode function: 0_2_00AA246D0_2_00AA246D
Source: C:\Users\user\Desktop\rPO49120.scr.exeCode function: 0_2_00AACB3C0_2_00AACB3C
Source: C:\Users\user\Desktop\rPO49120.scr.exeCode function: 0_2_00AAF3B80_2_00AAF3B8
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2468
Source: rPO49120.scr.exe, 00000000.00000002.3042495798.00000000008AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rPO49120.scr.exe
Source: rPO49120.scr.exe, 00000000.00000000.2040061130.0000000000174000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCdiyhcctb.exe4 vs rPO49120.scr.exe
Source: rPO49120.scr.exeBinary or memory string: OriginalFilenameCdiyhcctb.exe4 vs rPO49120.scr.exe
Source: rPO49120.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\rPO49120.scr.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4404
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ba3e1101-6360-4242-ba20-c1a7ab22929cJump to behavior
Source: rPO49120.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: rPO49120.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\rPO49120.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: rPO49120.scr.exeReversingLabs: Detection: 26%
Source: rPO49120.scr.exeVirustotal: Detection: 33%
Source: C:\Users\user\Desktop\rPO49120.scr.exeFile read: C:\Users\user\Desktop\rPO49120.scr.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\rPO49120.scr.exe "C:\Users\user\Desktop\rPO49120.scr.exe"
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2468
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: rPO49120.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: rPO49120.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbe source: rPO49120.scr.exe, 00000000.00000002.3044153654.0000000005FF2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: C:\Users\user\Desktop\rPO49120.scr.PDB source: rPO49120.scr.exe, 00000000.00000002.3042122002.0000000000537000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbL}X source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdbF source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: Binary string: n0C:\Windows\mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3042122002.0000000000537000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbT( source: rPO49120.scr.exe, 00000000.00000002.3044153654.0000000005FF2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.pdb* source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Net.Http.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Configuration.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: \mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: %%.pdb source: rPO49120.scr.exe, 00000000.00000002.3042122002.0000000000537000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Windows.Forms.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3044153654.0000000005FF2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Net.Http.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Drawing.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Net.Http.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Xml.pdbmscorlib.dll source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WERAF91.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERAF91.tmp.dmp.4.dr
Source: C:\Users\user\Desktop\rPO49120.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeMemory allocated: AA0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeMemory allocated: 2480000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeMemory allocated: 4480000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exe TID: 5960Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exe TID: 5960Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exe TID: 576Thread sleep count: 162 > 30Jump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exe TID: 576Thread sleep count: 289 > 30Jump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeThread delayed: delay time: 100000Jump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: rPO49120.scr.exe, 00000000.00000002.3042495798.0000000000922000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeQueries volume information: C:\Users\user\Desktop\rPO49120.scr.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\rPO49120.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager41
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
rPO49120.scr.exe26%ReversingLabsWin32.Trojan.Mardom
rPO49120.scr.exe34%VirustotalBrowse
rPO49120.scr.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
www.new.eventawardsrussia.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://www.new.eventawardsrussia.com/wp-includes/N1j7IGsuRMa.php0%Avira URL Cloudsafe
http://www.new.eventawardsrussia.com0%Avira URL Cloudsafe
https://www.new.eventawardsrussia.com0%Avira URL Cloudsafe
http://www.new.eventawardsrussia.comd0%Avira URL Cloudsafe
https://www.new.eventawardsrussia.com/wp-includes/N1j7IGsuRMa.phpt0%Avira URL Cloudsafe
https://www.new.eventawardsrussia.com0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
www.new.eventawardsrussia.com
5.23.51.54
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://www.new.eventawardsrussia.com/wp-includes/N1j7IGsuRMa.phpfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    https://www.new.eventawardsrussia.com/wp-includes/N1j7IGsuRMa.phptrPO49120.scr.exe, 00000000.00000002.3043059288.0000000002481000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerPO49120.scr.exe, 00000000.00000002.3043059288.00000000024EE000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.new.eventawardsrussia.comrPO49120.scr.exe, 00000000.00000002.3043059288.0000000002506000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.new.eventawardsrussia.comrPO49120.scr.exe, 00000000.00000002.3043059288.00000000024FA000.00000004.00000800.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://www.new.eventawardsrussia.comdrPO49120.scr.exe, 00000000.00000002.3043059288.0000000002506000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      5.23.51.54
      www.new.eventawardsrussia.comRussian Federation
      9123TIMEWEB-ASRUfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1564955
      Start date and time:2024-11-29 03:35:38 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 11s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:rPO49120.scr.exe
      Detection:MAL
      Classification:mal56.winEXE@2/5@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 98%
      • Number of executed functions: 9
      • Number of non-executed functions: 3
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.182.143.212
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      5.23.51.54SpiMLVsYmg.exeGet hashmaliciousUnknownBrowse
      • ck12339.tmweb.ru/reciver.php
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      TIMEWEB-ASRUDCRatBuild.exeGet hashmaliciousDCRatBrowse
      • 185.114.245.123
      guia_luqf.vbsGet hashmaliciousUnknownBrowse
      • 92.53.116.138
      guia_evfs.vbsGet hashmaliciousUnknownBrowse
      • 92.53.116.138
      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
      • 185.178.47.86
      CPYEzG7VGh.exeGet hashmaliciousDCRatBrowse
      • 185.114.245.123
      DividasAtivas_tgj.vbsGet hashmaliciousUnknownBrowse
      • 92.53.116.138
      QYP0tD7z0c.exeGet hashmaliciousDCRatBrowse
      • 92.53.106.114
      EBalcao_ysx.vbsGet hashmaliciousUnknownBrowse
      • 92.53.116.138
      kQyd2z80gD.exeGet hashmaliciousDCRatBrowse
      • 92.53.106.114
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      3b5074b1b5d032e5620f69f9f700ff0eINQUIRY_pdf.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
      • 5.23.51.54
      file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
      • 5.23.51.54
      RECEIPT DATED 28.11.2024,pdf.exeGet hashmaliciousSnake KeyloggerBrowse
      • 5.23.51.54
      drawing 10023. spec T4 300W .... dimn 560horsepower po 1198624 _ %00% spec .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
      • 5.23.51.54
      file.exeGet hashmaliciousPython Stealer, Amadey, LummaC Stealer, Nymaim, StealcBrowse
      • 5.23.51.54
      file.exeGet hashmaliciousPython StealerBrowse
      • 5.23.51.54
      file.exeGet hashmaliciousPython StealerBrowse
      • 5.23.51.54
      segura.vbsGet hashmaliciousUnknownBrowse
      • 5.23.51.54
      seemebestthings.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
      • 5.23.51.54
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.2105358256217604
      Encrypted:false
      SSDEEP:192:/mWsDFyD0BU/KaWOJoUT9OzuiFFZ24IO8X:e9DvBU/Kaxz9OzuiFFY4IO8X
      MD5:35EBC9A25E579F931EC530AAC56202E2
      SHA1:5CB12A579079BC948175E0FA095C57505A31D2E6
      SHA-256:5F79BBA763720B27AF88F2DDB8AA892702B0AC2CF7D5671EFA03A3365DDDF698
      SHA-512:EAA2BD36EE78BF9084B7864F08AA7F0ECE667BA70DEC464BE27C3DE07451FEDEC39580B212C0E2EEA3ADB878DDCED2E4DA2AB8454792D21B885C61537E825681
      Malicious:true
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.3.2.1.3.9.3.0.5.3.4.7.3.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.3.2.1.3.9.3.6.1.5.9.6.7.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.9.3.e.e.6.5.-.d.c.f.7.-.4.6.2.7.-.b.c.7.5.-.8.0.7.b.5.7.6.1.2.0.b.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.5.9.c.2.6.7.-.8.3.3.b.-.4.6.3.9.-.b.4.f.8.-.2.6.5.8.5.6.d.1.7.7.4.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.P.O.4.9.1.2.0...s.c.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.d.i.y.h.c.c.t.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.3.4.-.0.0.0.1.-.0.0.1.4.-.2.b.a.e.-.c.a.7.e.0.7.4.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.f.8.d.7.5.6.8.c.f.1.7.3.1.b.1.1.0.4.f.1.f.6.a.d.7.6.2.f.0.9.4.0.0.0.0.0.0.0.0.!.0.0.0.0.e.2.0.d.0.c.6.3.c.d.2.0.b.2.2.7.1.4.2.f.7.0.3.7.6.b.1.3.0.4.0.d.1.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Fri Nov 29 02:36:33 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):369596
      Entropy (8bit):3.439105888791963
      Encrypted:false
      SSDEEP:1536:P2z7fCIzapN4uE2aOFSVXHxTtF4ZiLTgWlsR9AyXHQTJCDXtTJY/qAFpnqqCOuBu:PaFzc4uEqFyuILTgTXHh9qvJC257b
      MD5:F6C6FCD2AD2650A8B36B9430A3C288B2
      SHA1:E9C01A74D81811D40A5D86ECBA5D6C652D78A354
      SHA-256:3C66573EFBBA6E9187C1224BCD04D98F21F96BB764D78777AFE4F32488C594A6
      SHA-512:96830E5D6067483CA0B9C5D52FBF32894FB2F2FCB269352DEF6E4C7CB34053A17914A9975D29E19654FC1F58CE3465A5C89039446D715869AB1236ED2F94223E
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... ........(Ig......................... ..........<....+......4+...u..........`.......8...........T...........x`..DC...........+...........-..............................................................................eJ......H.......GenuineIntel............T.......4....(Ig.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8422
      Entropy (8bit):3.704706764241001
      Encrypted:false
      SSDEEP:192:R6l7wVeJqfzb606YEIvSU94lLgmfZ5xyzprj89byZHlsfUmm:R6lXJi606YEASU94LgmfAKygf8
      MD5:7BE1A480E1BCC28DB34BA8FBCD3F4D5E
      SHA1:F17D458C5CF03DAA475CBAD954F428AEC3B84CA0
      SHA-256:7FF5415E849097FA21BE25DD2DF075285CE38633ED4ECC49734BBB92B932DC65
      SHA-512:01D0B5C5648D24C9DAD9FD1C857BC17599F6251AA38C03EA46F72E54FDEC6758217E746735225B2A92EABE7472B979B6919240222AB70A4D1081852770688247
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.4.0.4.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4780
      Entropy (8bit):4.510210466170629
      Encrypted:false
      SSDEEP:48:cvIwWl8zsZJg77aI9ve7FWpW8VYgYm8M4JnYFr+q8vAs9wvFvd:uIjfrI7QI7VoJ2Kh9wvFvd
      MD5:D7E99D8662FD5FE600B6140E67C1F4F5
      SHA1:4FC893129E3313EBD03CB646CAE6DC23F2ABF47C
      SHA-256:BC75B48E484659B4FB05A7CAA47E6D0228244C5EB956F1B971CC060B70D01EA8
      SHA-512:1E22BDCA9D01CB8F260D8D56ABF239CA16DA2BF69C1393548FB001B892B5596C24E1484477DCD2C27B9CEACF8AF0B715AB5B15DF49EECB215B37E2A81D717159
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="608739" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.421718545343795
      Encrypted:false
      SSDEEP:6144:kSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNn0uhiTw:vvloTMW+EZMM6DFy103w
      MD5:E61BB64E00820201590864645CFBC04B
      SHA1:946E91D1A6522C0AC548D24B60ED77336841DE28
      SHA-256:269BD48B2EA613B37E7FF90230C61C62EEDA973ABAEF0249C36F2E0B685240B6
      SHA-512:562923E7EA8E71588498D404DB8F672D85539EE2929203DE404EFE326CFFC93DC0E068E480DE9E6B6D14EDC6AA0782A860327B6F23B46EC766BC268A7B360B07
      Malicious:false
      Reputation:low
      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.x...B..............................................................................................................................................................................................................................................................................................................................................?.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):4.97165190616697
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:rPO49120.scr.exe
      File size:11'264 bytes
      MD5:9f7b3b8d4066b235e9238a1e84a2619c
      SHA1:e20d0c63cd20b227142f70376b13040d1666db13
      SHA256:b7228f1612c886d9e36fe88d67561c3f99398f65094d7721c773a3d9a4cc5238
      SHA512:f335a1e134a178a66e2536aaefa5e29791f60247eeaab17e879f59dc8a7034e6852e5ed39a8e4fe744f1938ccfb83a4cd24b50183207c683a46df357f8cd1fbb
      SSDEEP:192:A5/T1MJg4lNGgLkGzRBx7NzVNkDH1l+lhXRsasN+V/32:AVGdBLkGF5kz1l+lhXRsasN+V/3
      TLSH:F432A2D0EFD5C622D9E10BFAE86E4A404734A612A776CF6CF884D34A5C4161CDBD26F4
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Hg............................n/... ...@....@.. ....................................`................................
      Icon Hash:125ada12e9cc368b
      Entrypoint:0x402f6e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x6748E4DA [Thu Nov 28 21:47:06 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x2f200x4b.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x16f2.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000xf740x1000678fb3ccceb9f361f287879f3c434166False0.580322265625data5.340693070350521IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x40000x16f20x18007c510ab591fc5820a834524c3f060a12False0.2635091145833333data4.384835571668362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x60000xc0x200da38bbbfd65412440a100e71e23c67dbFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x41300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.21060037523452158
      RT_GROUP_ICON0x51d80x14data1.1
      RT_VERSION0x51ec0x31cdata0.42839195979899497
      RT_MANIFEST0x55080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      TimestampSource PortDest PortSource IPDest IP
      Nov 29, 2024 03:36:30.801700115 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:30.801740885 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:30.801814079 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:30.812932014 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:30.812947989 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:32.347574949 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:32.347726107 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:32.478933096 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:32.478960037 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:32.479304075 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:32.535552979 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:32.645704031 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:32.687335968 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:33.107247114 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:33.107342005 CET443497045.23.51.54192.168.2.5
      Nov 29, 2024 03:36:33.107404947 CET49704443192.168.2.55.23.51.54
      Nov 29, 2024 03:36:33.132323980 CET49704443192.168.2.55.23.51.54
      TimestampSource PortDest PortSource IPDest IP
      Nov 29, 2024 03:36:30.515223980 CET5551253192.168.2.51.1.1.1
      Nov 29, 2024 03:36:30.792555094 CET53555121.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Nov 29, 2024 03:36:30.515223980 CET192.168.2.51.1.1.10xd213Standard query (0)www.new.eventawardsrussia.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Nov 29, 2024 03:36:30.792555094 CET1.1.1.1192.168.2.50xd213No error (0)www.new.eventawardsrussia.com5.23.51.54A (IP address)IN (0x0001)false
      • www.new.eventawardsrussia.com
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.5497045.23.51.544434404C:\Users\user\Desktop\rPO49120.scr.exe
      TimestampBytes transferredDirectionData
      2024-11-29 02:36:32 UTC106OUTGET /wp-includes/N1j7IGsuRMa.php HTTP/1.1
      Host: www.new.eventawardsrussia.com
      Connection: Keep-Alive
      2024-11-29 02:36:33 UTC240INHTTP/1.1 200 OK
      Server: nginx/1.26.1
      Date: Fri, 29 Nov 2024 02:36:32 GMT
      Content-Type: text/html; charset=UTF-8
      Content-Length: 295
      Connection: close
      Set-Cookie: 396539c1ee079a1c42d1829d3f342f3akey=d41d8cd98f00b204e9800998ecf8427e
      2024-11-29 02:36:33 UTC295INData Raw: 3c 70 72 65 20 61 6c 69 67 6e 3d 63 65 6e 74 65 72 3e 3c 66 6f 72 6d 20 6d 65 74 68 6f 64 3d 70 6f 73 74 3e 50 61 73 73 77 6f 72 64 3c 62 72 3e 3c 69 6e 70 75 74 20 74 79 70 65 3d 70 61 73 73 77 6f 72 64 20 6e 61 6d 65 3d 70 61 73 73 20 73 74 79 6c 65 3d 27 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 77 68 69 74 65 73 6d 6f 6b 65 3b 62 6f 72 64 65 72 3a 31 70 78 20 73 6f 6c 69 64 20 23 46 46 46 3b 6f 75 74 6c 69 6e 65 3a 6e 6f 6e 65 3b 27 20 72 65 71 75 69 72 65 64 3e 3c 69 6e 70 75 74 20 74 79 70 65 3d 73 75 62 6d 69 74 20 6e 61 6d 65 3d 27 77 61 74 63 68 69 6e 67 27 20 76 61 6c 75 65 3d 27 73 75 62 6d 69 74 27 20 73 74 79 6c 65 3d 27 62 6f 72 64 65 72 3a 6e 6f 6e 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 36 41 44 31 35 3b 63
      Data Ascii: <pre align=center><form method=post>Password<br><input type=password name=pass style='background-color:whitesmoke;border:1px solid #FFF;outline:none;' required><input type=submit name='watching' value='submit' style='border:none;background-color:#56AD15;c


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:21:36:29
      Start date:28/11/2024
      Path:C:\Users\user\Desktop\rPO49120.scr.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\rPO49120.scr.exe"
      Imagebase:0x170000
      File size:11'264 bytes
      MD5 hash:9F7B3B8D4066B235E9238A1E84A2619C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:21:36:32
      Start date:28/11/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2468
      Imagebase:0x330000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:8.9%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:0%
        Total number of Nodes:37
        Total number of Limit Nodes:1
        execution_graph 13408 aaa230 13412 aaa328 13408->13412 13422 aaa318 13408->13422 13409 aaa23f 13413 aaa339 13412->13413 13416 aaa35c 13412->13416 13432 aa85e4 13413->13432 13416->13409 13417 aaa354 13417->13416 13418 aaa560 GetModuleHandleW 13417->13418 13419 aaa58d 13418->13419 13419->13409 13423 aaa339 13422->13423 13426 aaa35c 13422->13426 13424 aa85e4 GetModuleHandleW 13423->13424 13425 aaa344 13424->13425 13425->13426 13430 aaa5b0 GetModuleHandleW 13425->13430 13431 aaa5c0 GetModuleHandleW 13425->13431 13426->13409 13427 aaa354 13427->13426 13428 aaa560 GetModuleHandleW 13427->13428 13429 aaa58d 13428->13429 13429->13409 13430->13427 13431->13427 13433 aaa518 GetModuleHandleW 13432->13433 13435 aaa344 13433->13435 13435->13416 13436 aaa5c0 13435->13436 13439 aaa5b0 13435->13439 13437 aa85e4 GetModuleHandleW 13436->13437 13438 aaa5d4 13436->13438 13437->13438 13438->13417 13440 aa85e4 GetModuleHandleW 13439->13440 13441 aaa5d4 13440->13441 13441->13417 13442 aac5c0 13443 aac606 13442->13443 13444 aac6f3 13443->13444 13447 aacba8 13443->13447 13450 aacb99 13443->13450 13453 aac7fc 13447->13453 13451 aacbd6 13450->13451 13452 aac7fc DuplicateHandle 13450->13452 13451->13444 13452->13451 13454 aacc10 DuplicateHandle 13453->13454 13456 aacbd6 13454->13456 13456->13444

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 790 aaa328-aaa337 791 aaa339-aaa346 call aa85e4 790->791 792 aaa363-aaa367 790->792 799 aaa348 791->799 800 aaa35c 791->800 794 aaa37b-aaa3bc 792->794 795 aaa369-aaa373 792->795 801 aaa3c9-aaa3d7 794->801 802 aaa3be-aaa3c6 794->802 795->794 848 aaa34e call aaa5b0 799->848 849 aaa34e call aaa5c0 799->849 800->792 803 aaa3fb-aaa3fd 801->803 804 aaa3d9-aaa3de 801->804 802->801 809 aaa400-aaa407 803->809 806 aaa3e9 804->806 807 aaa3e0-aaa3e7 call aa9654 804->807 805 aaa354-aaa356 805->800 808 aaa498-aaa4a5 805->808 813 aaa3eb-aaa3f9 806->813 807->813 820 aaa4ab-aaa510 808->820 810 aaa409-aaa411 809->810 811 aaa414-aaa41b 809->811 810->811 814 aaa428-aaa431 call aa9664 811->814 815 aaa41d-aaa425 811->815 813->809 821 aaa43e-aaa443 814->821 822 aaa433-aaa43b 814->822 815->814 840 aaa512-aaa558 820->840 823 aaa461-aaa465 821->823 824 aaa445-aaa44c 821->824 822->821 846 aaa468 call aaa890 823->846 847 aaa468 call aaa8c0 823->847 824->823 826 aaa44e-aaa45e call aa9674 call aa9684 824->826 826->823 827 aaa46b-aaa46e 830 aaa470-aaa48e 827->830 831 aaa491-aaa497 827->831 830->831 841 aaa55a-aaa55d 840->841 842 aaa560-aaa58b GetModuleHandleW 840->842 841->842 843 aaa58d-aaa593 842->843 844 aaa594-aaa5a8 842->844 843->844 846->827 847->827 848->805 849->805
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID: HandleModule
        • String ID: pNt$pNt
        • API String ID: 4139908857-171419089
        • Opcode ID: 4a27e06bdcf00901c04f22feec658eabc262982f8c2fcdbf3d4ad82ce9a0ee0e
        • Instruction ID: 56021fdfa9b1f725e416c8cb33285f7245678da4bf2a5e8654dd43c2e0791e24
        • Opcode Fuzzy Hash: 4a27e06bdcf00901c04f22feec658eabc262982f8c2fcdbf3d4ad82ce9a0ee0e
        • Instruction Fuzzy Hash: 43817770A00B058FDB24DF29D14575ABBF1FF99304F008A2DE48ADBA90D779E949CB91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 945 aacccf-aaccdd 946 aacc78-aacca4 DuplicateHandle 945->946 947 aaccdf-aacdfe 945->947 949 aaccad-aaccca 946->949 950 aacca6-aaccac 946->950 950->949
        APIs
        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00AACBD6,?,?,?,?,?), ref: 00AACC97
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID: DuplicateHandle
        • String ID:
        • API String ID: 3793708945-0
        • Opcode ID: 9e1816b49fa1a91f75186d892a3094246fddcb215a468241c1ce276cca955ff9
        • Instruction ID: 2c976baebff95e23fd35e067570f0b10aa3c4318b225bca5e28ec001fbf0338f
        • Opcode Fuzzy Hash: 9e1816b49fa1a91f75186d892a3094246fddcb215a468241c1ce276cca955ff9
        • Instruction Fuzzy Hash: B3410AB5A442409FE710DF64E958BA9BFA5E785750F10C43EED0A9B384DAB84D42CF60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 963 aac7fc-aacca4 DuplicateHandle 966 aaccad-aaccca 963->966 967 aacca6-aaccac 963->967 967->966
        APIs
        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00AACBD6,?,?,?,?,?), ref: 00AACC97
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID: DuplicateHandle
        • String ID:
        • API String ID: 3793708945-0
        • Opcode ID: 25ff7e78110b1961335fb304bc226b2ccdd8b0eb9b96eb6c7233c421c7e60f6c
        • Instruction ID: b4792e2bcca3914c797d0336b80b50e60b02db7d937b6f963dee669a8f84d990
        • Opcode Fuzzy Hash: 25ff7e78110b1961335fb304bc226b2ccdd8b0eb9b96eb6c7233c421c7e60f6c
        • Instruction Fuzzy Hash: 5621E6B5900248EFDB10CF9AD584ADEFBF5FB48320F14841AE918A7350D379A954CFA4

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 970 aacc08-aacc75 971 aacc78-aacca4 DuplicateHandle 970->971 972 aaccad-aaccca 971->972 973 aacca6-aaccac 971->973 973->972
        APIs
        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00AACBD6,?,?,?,?,?), ref: 00AACC97
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID: DuplicateHandle
        • String ID:
        • API String ID: 3793708945-0
        • Opcode ID: 234aeb61c1781c6bdbf9576eceadaedb4d9710c3b0cae9dfbc72784c8c8f1daf
        • Instruction ID: e419a3ec56f7b8994e68a8becc8e07d255b01ee0745cf6a4d5f224d757716117
        • Opcode Fuzzy Hash: 234aeb61c1781c6bdbf9576eceadaedb4d9710c3b0cae9dfbc72784c8c8f1daf
        • Instruction Fuzzy Hash: E52103B5900208AFDB10CFAAD584ADEBBF4EB48320F14841AE918A7350C378A950CFA0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 976 aa85e4-aaa558 978 aaa55a-aaa55d 976->978 979 aaa560-aaa58b GetModuleHandleW 976->979 978->979 980 aaa58d-aaa593 979->980 981 aaa594-aaa5a8 979->981 980->981
        APIs
        • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,?,00AAA344), ref: 00AAA57E
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID: HandleModule
        • String ID:
        • API String ID: 4139908857-0
        • Opcode ID: 3434c1ab0de6a35775bc78a06f13449c54ec95b08d645ff27dcd686235f02824
        • Instruction ID: 203fcb7e13c9a81bb1fcb6bc4eeb2a9368b20fe4ee11de3e4c6c0a5ed37770f9
        • Opcode Fuzzy Hash: 3434c1ab0de6a35775bc78a06f13449c54ec95b08d645ff27dcd686235f02824
        • Instruction Fuzzy Hash: 781102B5C003498FDB20DF9AC444AAEFBF4EB89314F10842AD419A7250D379A945CFA5
        Memory Dump Source
        • Source File: 00000000.00000002.3042329823.000000000074D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0074D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_74d000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9865ee79f3fd2c7d1a54307d95ec89cd498be7bce2ffa36c067ac45555707e1a
        • Instruction ID: 3916882905e9db10d7419f5de26f61e023d6111f80a48cfccc93dde97a2efb43
        • Opcode Fuzzy Hash: 9865ee79f3fd2c7d1a54307d95ec89cd498be7bce2ffa36c067ac45555707e1a
        • Instruction Fuzzy Hash: FE21D071604204DFCB24DF24D984B26BB65EB88314F20C569D98A4B2A6C37EDC06CA61
        Memory Dump Source
        • Source File: 00000000.00000002.3042329823.000000000074D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0074D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_74d000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
        • Instruction ID: 842eb0843b3b993622d17168fe2011a0bc9f4a84b5a9462d5d465436ffe710a0
        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
        • Instruction Fuzzy Hash: BD119075504284DFDB15CF14D5C4B15FF61FB48314F24C6ADD8494B666C33AD84ACB62
        Memory Dump Source
        • Source File: 00000000.00000002.3042286891.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_73d000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3aed85634b4e8282f007f2127db15082446c6ee8dc573c7511f0ee286a59a528
        • Instruction ID: 183e124ec7e131196eafcb969cfe7fec93d1203f78700dbf8150721886664c8c
        • Opcode Fuzzy Hash: 3aed85634b4e8282f007f2127db15082446c6ee8dc573c7511f0ee286a59a528
        • Instruction Fuzzy Hash: CD01A2310043449AF7308B29ED84B67FF98EF56324F18C42AED494A287C77D9C40CA71
        Memory Dump Source
        • Source File: 00000000.00000002.3042286891.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_73d000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 33c06e5f344dcf0a68738aadd7490d7e3d3acac1325e118e8ced8977cce497bc
        • Instruction ID: 0d2d345600315208fd736feb3f1a431b6445aa6840623e03bbadb50216672f2c
        • Opcode Fuzzy Hash: 33c06e5f344dcf0a68738aadd7490d7e3d3acac1325e118e8ced8977cce497bc
        • Instruction Fuzzy Hash: B7F06272404344AEE7208B16DD84B62FF98EF56734F18C45AED484B287C3799C44CA75
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f44c8a172d3a994a42a5712481fb51921faaee86adea38d99d9e57dfa53539e5
        • Instruction ID: 65bbd2fc1fff8efef92b98c3be1038ef28f2b42693ac72e0f91dd6973b414fd5
        • Opcode Fuzzy Hash: f44c8a172d3a994a42a5712481fb51921faaee86adea38d99d9e57dfa53539e5
        • Instruction Fuzzy Hash: 021282B0409746EAD710CF65F96C1893EB1FB81338B92422DD2A56F2E5DBBC194ACF44
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e6ee6f78e4c346ec13d60e3f31a889e7a93a0409194fe2972ab1406a5f13cc05
        • Instruction ID: 63309ab868f129c8598624d11a5fc2faabf104ec6baa15f1c5e539358ed5ad88
        • Opcode Fuzzy Hash: e6ee6f78e4c346ec13d60e3f31a889e7a93a0409194fe2972ab1406a5f13cc05
        • Instruction Fuzzy Hash: 21A15D36E00215CFCF05DFB4C98459EBBB2FF86300B15856AE806AB2A1EB75ED15CB50
        Memory Dump Source
        • Source File: 00000000.00000002.3042668186.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_aa0000_rPO49120.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 18c8df933902341cb7922c861f074c05c99b76f8de9dd60a4c2b953ff8f5a9cd
        • Instruction ID: 0b64155101a4f246951dde5cc7a4c2f2306ba59587e7cd41f5d12da2a3ffa65e
        • Opcode Fuzzy Hash: 18c8df933902341cb7922c861f074c05c99b76f8de9dd60a4c2b953ff8f5a9cd
        • Instruction Fuzzy Hash: 45318D9285C6928FDB22477F587A3D12F51975F318B0482CAE1A88B5D3F35C49BBC392