Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Base64.exe

Overview

General Information

Sample name:Base64.exe
Analysis ID:1579401
MD5:1622226f04adfc7b0c1ceec4b0b4236f
SHA1:b0c6852d56a507e82da9760789c6708f6f332290
SHA256:7a1d47b6f3c6d03bf7da12a84360ec19edeca08292c3b60156f8063ee639f1aa
Tags:CobaltStrikeexeuser-kafan_shengui
Infos:

Detection

CobaltStrike
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
One or more processes crash
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • Base64.exe (PID: 2228 cmdline: "C:\Users\user\Desktop\Base64.exe" MD5: 1622226F04ADFC7B0C1CEEC4B0B4236F)
    • conhost.exe (PID: 6508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 1248 cmdline: C:\Windows\system32\WerFault.exe -u -p 2228 -s 192 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
No configs have been found
SourceRuleDescriptionAuthorStrings
Base64.exeJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2443301107.00000023D70FC000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
      00000000.00000002.2443544938.00007FF781852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
        00000000.00000000.2029846522.00007FF781852000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
          Process Memory Space: Base64.exe PID: 2228JoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.Base64.exe.7ff781850000.0.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
              0.2.Base64.exe.7ff781850000.0.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Base64.exeAvira: detected
                Source: Base64.exeVirustotal: Detection: 16%Perma Link
                Source: Base64.exeReversingLabs: Detection: 13%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.2% probability
                Source: C:\Users\user\Desktop\Base64.exeCode function: 0_2_00007FF781851000 VirtualAlloc,CryptStringToBinaryA,VirtualProtect,VirtualFree,VirtualFree,0_2_00007FF781851000
                Source: Base64.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\16651\source\repos\Base64\x64\Release\Base64.pdb source: Base64.exe
                Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
                Source: C:\Users\user\Desktop\Base64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2228 -s 192
                Source: classification engineClassification label: mal68.troj.winEXE@3/5@0/0
                Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2228
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6508:120:WilError_03
                Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3fa9ea68-d9f7-4d76-b317-e6421a2ec28eJump to behavior
                Source: Base64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Base64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Base64.exeVirustotal: Detection: 16%
                Source: Base64.exeReversingLabs: Detection: 13%
                Source: unknownProcess created: C:\Users\user\Desktop\Base64.exe "C:\Users\user\Desktop\Base64.exe"
                Source: C:\Users\user\Desktop\Base64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Base64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2228 -s 192
                Source: C:\Users\user\Desktop\Base64.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Base64.exeSection loaded: vcruntime140.dllJump to behavior
                Source: Base64.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Base64.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Base64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\16651\source\repos\Base64\x64\Release\Base64.pdb source: Base64.exe
                Source: Base64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Base64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Base64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Base64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Base64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: Amcache.hve.4.drBinary or memory string: VMware
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\Base64.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Base64.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Base64.exeCode function: 0_2_00007FF781851960 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF781851960
                Source: C:\Users\user\Desktop\Base64.exeCode function: 0_2_00007FF781851960 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF781851960
                Source: C:\Users\user\Desktop\Base64.exeCode function: 0_2_00007FF781851B08 SetUnhandledExceptionFilter,0_2_00007FF781851B08
                Source: C:\Users\user\Desktop\Base64.exeCode function: 0_2_00007FF781851408 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF781851408
                Source: C:\Users\user\Desktop\Base64.exeCode function: 0_2_00007FF781851838 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF781851838
                Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Base64.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Base64.exe.7ff781850000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Base64.exe.7ff781850000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2443301107.00000023D70FC000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2443544938.00007FF781852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2029846522.00007FF781852000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Base64.exe PID: 2228, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                1
                Process Injection
                1
                Virtualization/Sandbox Evasion
                OS Credential Dumping1
                System Time Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Process Injection
                LSASS Memory31
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                DLL Side-Loading
                Security Account Manager1
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Base64.exe17%VirustotalBrowse
                Base64.exe13%ReversingLabs
                Base64.exe100%AviraHEUR/AGEN.1317301
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://upx.sf.netAmcache.hve.4.drfalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1579401
                  Start date and time:2024-12-22 05:29:07 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Base64.exe
                  Detection:MAL
                  Classification:mal68.troj.winEXE@3/5@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 2
                  • Number of non-executed functions: 1
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.189.173.20, 20.231.128.66, 4.175.87.197, 13.107.246.63
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  23:30:38API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.6531036359334809
                  Encrypted:false
                  SSDEEP:96:B7FBsks6Qs6hgoW7JfuQXIDcQhc6UYcECAcw3a+HbHg/JgmZAX/d5FMT2SlPkpXz:9Y6Qw0vFUAfjJzuiFuZ24lO8rb
                  MD5:37AE74000A1B85828B173C070E071B34
                  SHA1:1D81F9DAB418E293F76622739315F30741FA0299
                  SHA-256:5D69C658A5820648EF3F962F065B922DD7B6E9BDB99A0AADEF40A2873463B5DA
                  SHA-512:AD974709C5D91BCE1794B20A568EF560E76F6CECAF180CDBB189162A5BBD2A929D8DB33595E43FC05B5DEBD364D024CC948EE8C647A9C2EE272064BCE3745126
                  Malicious:true
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.3.1.5.3.9.7.5.4.4.2.4.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.3.1.5.3.9.7.8.8.7.9.9.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.2.0.a.3.7.9.-.e.7.0.0.-.4.e.9.4.-.b.8.1.9.-.a.c.1.f.8.8.a.c.a.2.0.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.7.7.d.3.b.2.-.5.8.3.e.-.4.0.1.f.-.a.8.6.5.-.3.f.b.7.e.1.8.8.8.d.f.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.B.a.s.e.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.b.4.-.0.0.0.1.-.0.0.1.4.-.1.7.f.3.-.c.4.2.7.2.a.5.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.e.2.b.9.b.d.2.d.0.3.1.7.d.b.a.2.6.e.3.2.e.b.2.8.0.2.d.7.2.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.b.0.c.6.8.5.2.d.5.6.a.5.0.7.e.8.2.d.a.9.7.6.0.7.8.9.c.6.7.0.8.f.6.f.3.3.2.2.9.0.!.B.a.s.e.6.4...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.3././.1.1././.2.4.:.0.1.:.2.4.:.5.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Sun Dec 22 04:29:57 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):53886
                  Entropy (8bit):1.4910655781852
                  Encrypted:false
                  SSDEEP:96:5v8HczW2TEP/4ki76NtjPcZ91qusrzcjAnUfimSM7rqkddcQPmnyhtv+kM3WIHNi:SHBYkOKt45sH3I7rqkjJekV9b/
                  MD5:5D261A5243AD06B947A819C43EBF6C60
                  SHA1:CF614DF9568AB47FFC68B9C624A2CBCDC0153AE5
                  SHA-256:63086B549C682BC62624629BE0DEF325D997F1AB30890E61847B043236F0B711
                  SHA-512:77CC0BA96B3591FA96AAEF3EEC7E4DC65C87BFF640FE2B259F568B9251C07C2443C6F54DD9369AB97FDF3C71DECDEA3D0CCE5E436B15B6DD4A628034F5FF42AF
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... ........gg........................d...........$....!..........T.......8...........T...............v.......................................................................................................eJ..............Lw......................T............gg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8528
                  Entropy (8bit):3.700565791001288
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJMqML6YEIX5I+gmfoXpr089bw1Rf7wm:R6lXJBg6YEo5I+gmfobwzfJ
                  MD5:0E23EA165800654FB813F54E4EA5825C
                  SHA1:4CD9F76C91FBAA7CFAF6A178D34155CA2F76199B
                  SHA-256:CF3F0D19D9D27847A3174E822B0709AB9E015FD265838E1942D3839063310EF3
                  SHA-512:6700992A790EE4A034853C9CF5562BE4A38F2318959D0C9CD33C063ADA3714CC7458894F3781FEFF1BCCEE652894366D449C80CE3E9A0D4125BA0203B7E9C8D7
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.2.8.<./.P.i.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4657
                  Entropy (8bit):4.481173351231124
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg771I91dBOWpW8VYBYm8M4JxGSHFwpGyq85iGoSkEkx8W1ECpd:uIjfdI7+dBv7VtJxGnpGDGgE7W1jpd
                  MD5:E343328FEF54D1728DC4FE30729F90A2
                  SHA1:FAF3A235AB671AE883A05639F8C60D7D730159DB
                  SHA-256:E4F6E8B51D790B66BF7647B78D86DEFFE4F253E1C507D048F8373ABCFFD84493
                  SHA-512:3D5B876E89D46EA0509E768C1C6ED6EDD74B2A63E37EAE00AF8C342354442928C43FA8BF441892CB28C2E23512A8FFC62A44571CA56830B2687A46F6DD38C5EC
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="641972" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.421617640652345
                  Encrypted:false
                  SSDEEP:6144:rSvfpi6ceLP/9skLmb0OTfWSPHaJG8nAgeMZMMhA2fX4WABlEnNg0uhiTw:WvloTfW+EZMM6DFyK03w
                  MD5:283DA487E9E8A39593D12731635927AD
                  SHA1:E101116FEBBE3D5DA2791A90A199C53165AB19CC
                  SHA-256:40CA605A62117A1B34E09096ED39E3F6E1803E73DC411BAF23D6B4E3362A0EB1
                  SHA-512:154C930B12FD6AC534E4EBEACF9A40AA7BD857AEF091D4FF955AA68DA7BF10654773D6A101D9AE228CB06D588644058B09EEEABC2E58F4C430B7A285EBB52C8D
                  Malicious:false
                  Reputation:low
                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmz..(*T...............................................................................................................................................................................................................................................................................................................................................i..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32+ executable (console) x86-64, for MS Windows
                  Entropy (8bit):5.077287003077472
                  TrID:
                  • Win64 Executable Console (202006/5) 92.65%
                  • Win64 Executable (generic) (12005/4) 5.51%
                  • Generic Win/DOS Executable (2004/3) 0.92%
                  • DOS Executable Generic (2002/1) 0.92%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Base64.exe
                  File size:12'288 bytes
                  MD5:1622226f04adfc7b0c1ceec4b0b4236f
                  SHA1:b0c6852d56a507e82da9760789c6708f6f332290
                  SHA256:7a1d47b6f3c6d03bf7da12a84360ec19edeca08292c3b60156f8063ee639f1aa
                  SHA512:bba57da2a9d3cee009d5b71ae299458fd7e897bc38f2404dd76731ec413d4cfdbceed654fe042d85ba16696be8b326e29d52cfdf908837b66784dd20ab3f23b0
                  SSDEEP:192:zf60gXWMU3Ba9chWAqCSRKJxMF8/HW4HsUW3Q5tfqXU/iU:F/3B8ckADxMFiHs31H
                  TLSH:66423905BF9189EBD32D427EC87709DFE466B210839363CF936805261F96152335A3DE
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L..j-o.j-o.j-o.cU..`-o.8En.h-o.8Ej.x-o.8Ek.`-o.8El.h-o..Kn.o-o.j-n.[-o..Df.k-o..D..k-o..Dm.k-o.Richj-o.........PE..d...f._e...
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x1400013f4
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows cui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x655FFB66 [Fri Nov 24 01:24:54 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:c28ff7916aa0d92c2e2feac9b5188025
                  Instruction
                  dec eax
                  sub esp, 28h
                  call 00007F3DB04F6770h
                  dec eax
                  add esp, 28h
                  jmp 00007F3DB04F61A7h
                  int3
                  int3
                  inc eax
                  push ebx
                  dec eax
                  sub esp, 20h
                  dec eax
                  mov ebx, ecx
                  xor ecx, ecx
                  call dword ptr [00000C57h]
                  dec eax
                  mov ecx, ebx
                  call dword ptr [00000C56h]
                  call dword ptr [00000C40h]
                  dec eax
                  mov ecx, eax
                  mov edx, C0000409h
                  dec eax
                  add esp, 20h
                  pop ebx
                  dec eax
                  jmp dword ptr [00000C24h]
                  dec eax
                  mov dword ptr [esp+08h], ecx
                  dec eax
                  sub esp, 38h
                  mov ecx, 00000017h
                  call 00007F3DB04F6CCCh
                  test eax, eax
                  je 00007F3DB04F6339h
                  mov ecx, 00000002h
                  int 29h
                  dec eax
                  lea ecx, dword ptr [00002C7Fh]
                  call 00007F3DB04F63DFh
                  dec eax
                  mov eax, dword ptr [esp+38h]
                  dec eax
                  mov dword ptr [00002D66h], eax
                  dec eax
                  lea eax, dword ptr [esp+38h]
                  dec eax
                  add eax, 08h
                  dec eax
                  mov dword ptr [00002CF6h], eax
                  dec eax
                  mov eax, dword ptr [00002D4Fh]
                  dec eax
                  mov dword ptr [00002BC0h], eax
                  dec eax
                  mov eax, dword ptr [esp+40h]
                  dec eax
                  mov dword ptr [00002CC4h], eax
                  mov dword ptr [00002B9Ah], C0000409h
                  mov dword ptr [00002B94h], 00000001h
                  mov dword ptr [00002B9Eh], 00000001h
                  mov eax, 00000008h
                  Programming Language:
                  • [IMP] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2c2c0xb4.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x1e0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x174.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x1c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x26d00x70.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x27400x100.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x1a0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xeb80x1000afc1161dda4e3dfbfada8a8b9a35b7ceFalse0.608154296875data5.745532697782869IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x20000x12ca0x1400f6c329a0cf124e351f605f5a5be2a823False0.4763671875data4.845112219170932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x40000x6380x20016ce509009a9e9bbb2099571d1c6e8adFalse0.08984375data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .pdata0x50000x1740x20086ae31cd5a8848f098f3c76f5784124cFalse0.44140625data2.904851083127445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x60000x1e00x200d223c232889289f7388583adeff234e1False0.525390625data4.697597008251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x70000x1c0x2001eca56e00d4a85cd81e27fa78976b5dbFalse0.083984375data0.4075837537346487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_MANIFEST0x60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                  DLLImport
                  KERNEL32.dllVirtualAlloc, VirtualFree, VirtualProtect, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetModuleHandleW
                  CRYPT32.dllCryptStringToBinaryA
                  VCRUNTIME140.dllmemset, __C_specific_handler
                  api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, terminate, _register_thread_local_exe_atexit_callback, _c_exit, _register_onexit_function, _cexit, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, __p___argc, _set_app_type, _seh_filter_exe, __p___argv, _initialize_onexit_table
                  api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                  api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                  api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:23:29:57
                  Start date:21/12/2024
                  Path:C:\Users\user\Desktop\Base64.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\Base64.exe"
                  Imagebase:0x7ff781850000
                  File size:12'288 bytes
                  MD5 hash:1622226F04ADFC7B0C1CEEC4B0B4236F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2443301107.00000023D70FC000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2443544938.00007FF781852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000000.2029846522.00007FF781852000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:23:29:57
                  Start date:21/12/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6d64d0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:23:29:57
                  Start date:21/12/2024
                  Path:C:\Windows\System32\WerFault.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\WerFault.exe -u -p 2228 -s 192
                  Imagebase:0x7ff6f6020000
                  File size:570'736 bytes
                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:23.6%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:27.9%
                    Total number of Nodes:68
                    Total number of Limit Nodes:1
                    execution_graph 371 7ff78185125c 375 7ff781851b08 SetUnhandledExceptionFilter 371->375 319 7ff781851278 320 7ff781851291 __scrt_initialize_crt 319->320 321 7ff781851299 __scrt_acquire_startup_lock 320->321 322 7ff7818513cf 320->322 324 7ff7818513d9 321->324 328 7ff7818512b7 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 321->328 351 7ff781851960 IsProcessorFeaturePresent 322->351 325 7ff781851960 __scrt_fastfail 9 API calls 324->325 326 7ff7818513e4 325->326 329 7ff7818513ec _exit 326->329 327 7ff7818512dc 328->327 330 7ff781851362 __p___argv __p___argc _get_initial_narrow_environment 328->330 333 7ff78185135a _register_thread_local_exe_atexit_callback 328->333 339 7ff781851000 330->339 333->330 336 7ff78185138f 337 7ff781851399 __scrt_uninitialize_crt 336->337 338 7ff781851394 _cexit 336->338 337->327 338->337 340 7ff781851030 339->340 340->340 341 7ff781851083 VirtualAlloc 340->341 342 7ff7818510c6 CryptStringToBinaryA VirtualProtect 341->342 343 7ff781851121 341->343 344 7ff781851128 VirtualFree 342->344 345 7ff781851110 VirtualFree 342->345 357 7ff781851170 343->357 344->343 345->343 349 7ff781851ab4 GetModuleHandleW 350 7ff78185138b 349->350 350->326 350->336 352 7ff781851985 __scrt_fastfail 351->352 353 7ff781851993 memset RtlCaptureContext RtlLookupFunctionEntry 352->353 354 7ff7818519cd RtlVirtualUnwind 353->354 355 7ff781851a09 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 353->355 354->355 356 7ff781851a8d __scrt_fastfail 355->356 356->324 358 7ff78185117a 357->358 359 7ff78185114d 358->359 360 7ff78185143c IsProcessorFeaturePresent 358->360 359->349 361 7ff781851453 360->361 366 7ff781851510 RtlCaptureContext 361->366 367 7ff78185152a RtlLookupFunctionEntry 366->367 368 7ff781851466 367->368 369 7ff781851540 RtlVirtualUnwind 367->369 370 7ff781851408 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 368->370 369->367 369->368 376 7ff7818513f4 379 7ff781851838 376->379 380 7ff78185185b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 379->380 381 7ff7818513fd 379->381 380->381 382 7ff781851194 383 7ff7818511a4 pre_c_initialization 382->383 395 7ff78185160c 383->395 385 7ff781851960 __scrt_fastfail 9 API calls 386 7ff78185124a __scrt_initialize_default_local_stdio_options 385->386 387 7ff7818511c9 pre_c_initialization _RTC_Initialize 393 7ff78185122c pre_c_initialization 387->393 403 7ff7818518f8 InitializeSListHead 387->403 393->385 394 7ff78185123a 393->394 396 7ff781851657 395->396 397 7ff781851621 395->397 396->387 398 7ff7818516d9 397->398 401 7ff78185162a __scrt_initialize_onexit_tables 397->401 399 7ff781851960 __scrt_fastfail 9 API calls 398->399 400 7ff7818516e3 399->400 401->396 402 7ff781851647 _initialize_onexit_table 401->402 402->396 404 7ff7818513a6 405 7ff781851ab4 __scrt_is_managed_app GetModuleHandleW 404->405 406 7ff7818513ad 405->406 407 7ff7818513ec _exit 406->407 408 7ff7818513b1 406->408 409 7ff781851e82 _seh_filter_exe

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00007FF781851DEC 22 Function_00007FF781851E0C 0->22 1 Function_00007FF7818518E8 2 Function_00007FF781851AB4 3 Function_00007FF7818513F4 36 Function_00007FF781851838 3->36 4 Function_00007FF781851776 5 Function_00007FF7818518F0 6 Function_00007FF781851170 27 Function_00007FF781851408 6->27 33 Function_00007FF781851510 6->33 7 Function_00007FF78185125C 12 Function_00007FF7818518E4 7->12 25 Function_00007FF781851B08 7->25 8 Function_00007FF781851918 9 Function_00007FF781851B18 10 Function_00007FF781851958 11 Function_00007FF7818517A4 26 Function_00007FF781851908 11->26 13 Function_00007FF7818516E4 14 Function_00007FF7818513A6 14->2 15 Function_00007FF781851EA0 16 Function_00007FF781851820 30 Function_00007FF7818517D0 16->30 17 Function_00007FF781851920 17->8 32 Function_00007FF781851910 17->32 18 Function_00007FF781851960 18->10 19 Function_00007FF78185160C 19->18 38 Function_00007FF781851D44 19->38 20 Function_00007FF78185190C 21 Function_00007FF781851B8C 23 Function_00007FF781851948 24 Function_00007FF781851BC8 28 Function_00007FF781851194 28->1 28->5 28->12 28->16 28->17 28->18 28->19 28->20 28->26 31 Function_00007FF781851B50 28->31 34 Function_00007FF78185193C 28->34 37 Function_00007FF7818518F8 28->37 29 Function_00007FF781851950 35 Function_00007FF781851278 35->2 35->11 35->13 35->18 35->23 35->29 39 Function_00007FF781851584 35->39 40 Function_00007FF781851000 35->40 41 Function_00007FF7818515C0 35->41 42 Function_00007FF781851780 35->42 39->38 40->6 41->24 41->26 42->38 43 Function_00007FF781851E82

                    Control-flow Graph

                    APIs
                    Strings
                    • b'/EiD5PDoyAAAAEFRQVBSUVZIMdJlSItSYEiLUhhIi1IgSItyUEgPt0pKTTHJSDHArDxhfAIsIEHByQ1BAcHi7VJBUUiLUiCLQjxIAdBmgXgYCwJ1couAiAAAAEiFwHRnSAHQUItIGESLQCBJAdDjVkj/yUGLNIhIAdZNMclIMcCsQcHJDUEBwTjgdfFMA0wkCEU50XXYWESLQCRJAdBmQYsMSESLQBxJAdBBiwSISAHQQVhBWF5ZWkFYQVlBWkiD7C, xrefs: 00007FF781851025
                    Memory Dump Source
                    • Source File: 00000000.00000002.2443522928.00007FF781851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF781850000, based on PE: true
                    • Associated: 00000000.00000002.2443502887.00007FF781850000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2443544938.00007FF781852000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2443571058.00007FF781855000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff781850000_Base64.jbxd
                    Yara matches
                    Similarity
                    • API ID: Virtual$Free$AllocBinaryCryptProtectString
                    • String ID: b'/EiD5PDoyAAAAEFRQVBSUVZIMdJlSItSYEiLUhhIi1IgSItyUEgPt0pKTTHJSDHArDxhfAIsIEHByQ1BAcHi7VJBUUiLUiCLQjxIAdBmgXgYCwJ1couAiAAAAEiFwHRnSAHQUItIGESLQCBJAdDjVkj/yUGLNIhIAdZNMclIMcCsQcHJDUEBwTjgdfFMA0wkCEU50XXYWESLQCRJAdBmQYsMSESLQBxJAdBBiwSISAHQQVhBWF5ZWkFYQVlBWkiD7C
                    • API String ID: 3647951008-267588638
                    • Opcode ID: 9e2463299bdb41e2d1994dd4e79f4d35062fc818be1d2a34cdef6188d01fc00c
                    • Instruction ID: f52529a708eeea4993ecfa0560f9815bd047c1f99ec4e8eb38ff4d7ad4a7dad4
                    • Opcode Fuzzy Hash: 9e2463299bdb41e2d1994dd4e79f4d35062fc818be1d2a34cdef6188d01fc00c
                    • Instruction Fuzzy Hash: 41417F62F18B8582E710CB29E8153BDB361FB99B54F54A224DB8D53712EF78E2E4C700

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2443522928.00007FF781851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF781850000, based on PE: true
                    • Associated: 00000000.00000002.2443502887.00007FF781850000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2443544938.00007FF781852000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2443571058.00007FF781855000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff781850000_Base64.jbxd
                    Yara matches
                    Similarity
                    • API ID: __scrt_fastfail__scrt_is_nonwritable_in_current_image$__p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                    • String ID:
                    • API String ID: 1818695170-0
                    • Opcode ID: ae335f83093c94fb68e732563092da6a35bc802c6c3ee060811f1cb31f958e84
                    • Instruction ID: 5df445c4b186a4144d6259a358ecbf156371ca08aea1e7771bc0cba4a7bb4033
                    • Opcode Fuzzy Hash: ae335f83093c94fb68e732563092da6a35bc802c6c3ee060811f1cb31f958e84
                    • Instruction Fuzzy Hash: 56313A21A0C54282EB10BB6094733FAA291FF457A4FE44135E64EC76D7DEEDA824C770
                    Memory Dump Source
                    • Source File: 00000000.00000002.2443522928.00007FF781851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF781850000, based on PE: true
                    • Associated: 00000000.00000002.2443502887.00007FF781850000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2443544938.00007FF781852000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2443571058.00007FF781855000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff781850000_Base64.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 998d2646f2761270a67542b359778b175d27e11790de35eb66b11f52108b7811
                    • Instruction ID: 0263353beaba3afde8138a685606947577939e49881cd641facd880837cf4acc
                    • Opcode Fuzzy Hash: 998d2646f2761270a67542b359778b175d27e11790de35eb66b11f52108b7811
                    • Instruction Fuzzy Hash: F0A00121A49802D0E704AB10A8625A5A222FB60360FA50171C00D81460EEBCA465C261