Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Sykom_CopySykom_Copy

Overview

General Information

Sample name:Sykom_CopySykom_Copy
Analysis ID:1568228
MD5:d2a80125d357e528e25483694ccaa344
SHA1:6b20ab3c42010daa02b5cb8fe7d1a4a1827e044f
SHA256:43ff8805b23d0aafeeddbcadaf0021184991c72a24a430eca928b50455722d52
Infos:

Detection

PureLog Stealer
Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • Sykom_CopySykom_Copy.exe (PID: 7040 cmdline: "C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exe" MD5: D2A80125D357E528E25483694CCAA344)
    • WerFault.exe (PID: 6212 cmdline: C:\Windows\system32\WerFault.exe -u -p 7040 -s 964 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
SourceRuleDescriptionAuthorStrings
Sykom_CopySykom_CopyJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.1160358663.000001D575F72000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: Sykom_CopySykom_CopyStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: Sykom_CopySykom_CopyStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7040 -s 964
      Source: Sykom_CopySykom_CopyStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: Sykom_CopySykom_Copy, AGBEFAFKIBGIOHAHKCEDONLPOHEBDJGCNECG.csCryptographic APIs: 'CreateDecryptor'
      Source: Sykom_CopySykom_Copy, AGBEFAFKIBGIOHAHKCEDONLPOHEBDJGCNECG.csCryptographic APIs: 'CreateDecryptor'
      Source: classification engineClassification label: mal52.troj.evad.win@2/4@0/10
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7040
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeMutant created: NULL
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\51368128-5e1d-44e6-b9ac-d2550b5fa958
      Source: Sykom_CopySykom_CopyStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: Sykom_CopySykom_CopyStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeFile read: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exe
      Source: unknownProcess created: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exe "C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exe"
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7040 -s 964
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: mscoree.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: apphelp.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: kernel.appcore.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: version.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: uxtheme.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: textshaping.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: textinputframework.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: coreuicomponents.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: coremessaging.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: ntmarta.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: coremessaging.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeSection loaded: wintypes.dll
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
      Source: Sykom_CopySykom_CopyStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Sykom_CopySykom_CopyStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Sykom_CopySykom_CopyStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: Sykom_CopySykom_Copy, AGBEFAFKIBGIOHAHKCEDONLPOHEBDJGCNECG.cs.Net Code: Type.GetTypeFromHandle(ADLNHKEIOPCJFIJLKBMNDOLNGMCEMBODPPIO.HOLJABKAKECAJNEGOHJDPNGEPOBNPPBMCIGN(16777359)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(ADLNHKEIOPCJFIJLKBMNDOLNGMCEMBODPPIO.HOLJABKAKECAJNEGOHJDPNGEPOBNPPBMCIGN(16777249)),Type.GetTypeFromHandle(ADLNHKEIOPCJFIJLKBMNDOLNGMCEMBODPPIO.HOLJABKAKECAJNEGOHJDPNGEPOBNPPBMCIGN(16777291))})
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeMemory allocated: 1D5762B0000 memory reserve | memory write watch
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeMemory allocated: 1D577E10000 memory reserve | memory write watch
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess queried: DebugPort
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeProcess queried: DebugPort
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exeQueries volume information: C:\Users\user\Downloads\BIUmXCsiTl\Sykom_CopySykom_Copy.exe VolumeInformation

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Sykom_CopySykom_Copy, type: SAMPLE
      Source: Yara matchFile source: 00000001.00000000.1160358663.000001D575F72000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Sykom_CopySykom_Copy, type: SAMPLE
      Source: Yara matchFile source: 00000001.00000000.1160358663.000001D575F72000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      2
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory2
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Software Packing
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS11
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      52.168.117.173
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1568228
      Start date and time:2024-12-04 13:17:40 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:24
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      Analysis Mode:stream
      Analysis stop reason:Timeout
      Sample name:Sykom_CopySykom_Copy
      Detection:MAL
      Classification:mal52.troj.evad.win@2/4@0/10
      • Exclude process from analysis (whitelisted): SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 13.107.5.88
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: Sykom_CopySykom_Copy
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.0098507072222318
      Encrypted:false
      SSDEEP:
      MD5:C5DD0D4E12FB053E6E0FD38CB4FCD385
      SHA1:0E0B783AF19A60815108E8FE10DA4A570B31B50F
      SHA-256:12F16255FAF6FF13CDB9572C4666E3718393E3C7F8FD8C7ED4975711F5F1DC39
      SHA-512:59EAD44D95566800375D511E24EC226C866518FCAB2F6C710AB9EB50BAA5BECF920CBED079857A87D7E687F50AB2E50DCF304878462023549AE79F18B081D288
      Malicious:false
      Reputation:unknown
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.7.8.8.3.0.5.5.0.9.9.3.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.7.8.8.3.0.5.9.6.7.9.2.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.7.8.0.8.5.b.-.3.4.3.0.-.4.b.f.6.-.a.0.8.5.-.0.e.b.0.d.d.a.a.9.0.b.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.3.5.a.f.1.d.-.6.d.3.1.-.4.4.1.b.-.a.8.e.9.-.8.d.f.9.8.0.e.9.0.7.4.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.y.k.o.m._.C.o.p.y.S.y.k.o.m._.C.o.p.y...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.y.k.o.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.8.0.-.0.0.0.1.-.0.0.1.7.-.5.5.1.c.-.a.1.9.c.4.6.4.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.3.1.9.3.6.e.2.c.d.0.9.0.4.0.d.3.7.3.0.0.8.e.4.9.6.5.0.1.c.c.7.0.0.0.0.0.0.0.0.!.0.0.0.0.6.b.2.0.a.b.3.c.4.2.0.1.0.d.a.a.0.2.b.5.c.b.8.f.e.7.d.1.a.4.a.1.8.2.7.e.0.4.4.f.!.S.y.k.o.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 16 streams, Wed Dec 4 12:18:25 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):321623
      Entropy (8bit):3.0726678651040036
      Encrypted:false
      SSDEEP:
      MD5:C940FC7CC52E32A27C5ED56FC716640B
      SHA1:9ADD0C7AF5462AC719D19C8C1C9010C70F069ADB
      SHA-256:FFFDB62FD5F753BAC124CAD4DFD84C68681AA84EB0AC088B337CB5C0ED7D9D37
      SHA-512:8D4B6E4F5632584AA79D554C6B4D49C7539570C59E87965DDDD6B989C12B525554E81F32170EF82C8E1F5D3F703AB05F0045EEF98E4F2F7B1E2047EDFBC4E600
      Malicious:false
      Reputation:unknown
      Preview:MDMP..a..... ........HPg............................4.......$............................a..........l.......8...........T...........0&..'.......................t!..............................................................................eJ......."......Lw......................T............HPg............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):10072
      Entropy (8bit):3.7136901710052657
      Encrypted:false
      SSDEEP:
      MD5:AE0F0FFAFBDE44E62DA601C0A5A8AC9A
      SHA1:62A1C8CE818DC743C51EA894530C2C2B0430F036
      SHA-256:410A444076E507C929F2CB9216D666B053DD66FADCDD3DED0C52B0C864FC80ED
      SHA-512:F6E81560A2C98DE1ED542354655668F16FF1B1ECA100DEF24C9D42025A2C857177077008593FECE7DCC29EBF84862B4791C156A9C7A876EE12813A2BD3DBAC8C
      Malicious:false
      Reputation:unknown
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.4.0.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4882
      Entropy (8bit):4.521669585133942
      Encrypted:false
      SSDEEP:
      MD5:6442689B6F6A968C710BC0FFCC4FE331
      SHA1:61C5C21A83C806573ABACD753F8FF1B8D05B4268
      SHA-256:91BF0490AEC9F79C8B37B0728A0F3687A48899B055E4C1A581A05E4D8214093C
      SHA-512:906FA56BB6F1DDE43D153DCAEFE2F56021CE3752956D2D78CA9EF1A31D5F35912D096E323B7F7E8F2ACB1408D4F5ECC9225592A2DF8899914A3C2E365F3F1FFD
      Malicious:false
      Reputation:unknown
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="616521" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):6.0549908684012905
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:Sykom_CopySykom_Copy
      File size:110'592 bytes
      MD5:d2a80125d357e528e25483694ccaa344
      SHA1:6b20ab3c42010daa02b5cb8fe7d1a4a1827e044f
      SHA256:43ff8805b23d0aafeeddbcadaf0021184991c72a24a430eca928b50455722d52
      SHA512:ac22d86408f8f0bdfa5771ab61d14031b7c1cfd38fceeaeda0467950baf943d0f84745b6454bb0302ca5dec570f7733e04609ca40333ddea0ad0fc8ace04ff39
      SSDEEP:3072:NeE7w3xxd5pYvgQ+U5+15xESRHhUXJLF9pLq:NtE3xxd5pYvgQ+U5+1Hkx9
      TLSH:96B3F5027BCBB961DABA7673046153854271EB2A6D17DB0B6CC8225B7E623CD1FC36C1
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T..a..............0.................. ........@.. ....................................`................................
      Entrypoint:0x419e0e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x61828C54 [Wed Nov 3 13:19:16 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x19dc00x4b.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x2a50.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x19d770x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x17e140x18000f70b4abefe3d6efb4e333f944254c70aFalse0.4785868326822917data6.143888679083028IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x1a0000x2a500x2c00b8a63c596e604d9ffdd69be1df7a67c4False0.12198153409090909data3.5014513173260338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x1e0000xc0x2004545e7f2ce027f68a5c569a1adefe072False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x1a1300x2318Device independent bitmap graphic, 50 x 86 x 32, image size 00.06578361531611754
      RT_GROUP_ICON0x1c4480x14data1.1
      RT_VERSION0x1c45c0x406data0.4
      RT_MANIFEST0x1c8640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain