Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
q8C81ARGsr.exe

Overview

General Information

Sample name:q8C81ARGsr.exe
(renamed file extension from exe_e5bb2eb8811d1e3c414055ecf98e83377043d39066d7b77bfb7d654c83c04069 to exe, renamed because original name is a hash value)
Original sample name:miisclient.exe_e5bb2eb8811d1e3c414055ecf98e83377043d39066d7b77bfb7d654c83c04069
Analysis ID:1579772
MD5:e5ac4faaa91455612f18e634d788ee76
SHA1:7d8aa7af0e0e20ab9872493fec5eaea2da6cefb6
SHA256:e5bb2eb8811d1e3c414055ecf98e83377043d39066d7b77bfb7d654c83c04069
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

.NET source code contains potential unpacker
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • q8C81ARGsr.exe (PID: 1988 cmdline: "C:\Users\user\Desktop\q8C81ARGsr.exe" MD5: E5AC4FAAA91455612F18E634D788EE76)
    • WerFault.exe (PID: 1496 cmdline: C:\Windows\system32\WerFault.exe -u -p 1988 -s 768 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: q8C81ARGsr.exeStatic PE information: certificate valid
Source: q8C81ARGsr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: mscorlib.pdb source: WER239D.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER239D.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER239D.tmp.dmp.4.dr
Source: Binary string: C:\__w\1\s\src\dev\sync\UI\MmsMainFrame\obj\amd64\miisclient.pdb source: q8C81ARGsr.exe
Source: Binary string: miisclient.pdb source: WER239D.tmp.dmp.4.dr
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1988 -s 768
Source: q8C81ARGsr.exeStatic PE information: No import functions for PE file found
Source: q8C81ARGsr.exe, 00000000.00000000.2025082509.000001C24D9C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemiisclient.exeZ vs q8C81ARGsr.exe
Source: q8C81ARGsr.exeBinary or memory string: OriginalFilenamemiisclient.exeZ vs q8C81ARGsr.exe
Source: classification engineClassification label: sus24.evad.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\q8C81ARGsr.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1988
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\9c43ee39-7885-4078-9e0e-72b42aa6d78cJump to behavior
Source: q8C81ARGsr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: q8C81ARGsr.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\q8C81ARGsr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\q8C81ARGsr.exe "C:\Users\user\Desktop\q8C81ARGsr.exe"
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1988 -s 768
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: q8C81ARGsr.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: q8C81ARGsr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: q8C81ARGsr.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: q8C81ARGsr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: q8C81ARGsr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mscorlib.pdb source: WER239D.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER239D.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER239D.tmp.dmp.4.dr
Source: Binary string: C:\__w\1\s\src\dev\sync\UI\MmsMainFrame\obj\amd64\miisclient.pdb source: q8C81ARGsr.exe
Source: Binary string: miisclient.pdb source: WER239D.tmp.dmp.4.dr

Data Obfuscation

barindex
Source: q8C81ARGsr.exe, MmsMainFrame.cs.Net Code: CreateMenu
Source: q8C81ARGsr.exeStatic PE information: 0x81E8D070 [Mon Jan 24 21:49:36 2039 UTC]
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeMemory allocated: 1C24DCF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeMemory allocated: 1C267730000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeQueries volume information: C:\Users\user\Desktop\q8C81ARGsr.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\q8C81ARGsr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1579772 Sample: q8C81ARGsr.exe_e5bb2eb8811d... Startdate: 23/12/2024 Architecture: WINDOWS Score: 24 10 .NET source code contains potential unpacker 2->10 6 q8C81ARGsr.exe 2->6         started        process3 process4 8 WerFault.exe 19 16 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
q8C81ARGsr.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1579772
    Start date and time:2024-12-23 08:02:14 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 56s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:q8C81ARGsr.exe
    (renamed file extension from exe_e5bb2eb8811d1e3c414055ecf98e83377043d39066d7b77bfb7d654c83c04069 to exe, renamed because original name is a hash value)
    Original Sample Name:miisclient.exe_e5bb2eb8811d1e3c414055ecf98e83377043d39066d7b77bfb7d654c83c04069
    Detection:SUS
    Classification:sus24.evad.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.181.1, 20.109.210.53, 13.107.246.63
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • VT rate limit hit for: q8C81ARGsr.exe
    TimeTypeDescription
    02:03:31API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8610863934969754
    Encrypted:false
    SSDEEP:192:YiLSMONZlzA0biwMLsbaWuzuiFoZ24lO82j:xLSZNZlzbbiwMLsba3zuiFoY4lO82j
    MD5:798A067EED675F6B7479ADCA9E8CB4BB
    SHA1:5C55BD02544780A5CD2B7C0E04ED14DC46D8C38B
    SHA-256:9360945AC5689DBB230845BB12D6E840405E4575A7BA71C263530524FC41BFD3
    SHA-512:EC53C4D5758F2E452DD8B59C91A4C6926CD0B0DF71CF003FA71045616B925D6E5CCCF47B4CEAB83369E7974F94DEDF246672829899A6D65049B2E24FA631F2A4
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.4.1.0.9.8.4.3.9.8.5.1.5.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.4.1.0.9.8.4.8.3.6.0.2.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.9.f.d.0.9.f.e.-.b.5.5.b.-.4.e.8.7.-.8.4.8.0.-.8.e.7.8.f.c.d.8.1.c.6.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.a.c.a.8.1.2.0.-.5.d.b.c.-.4.3.b.4.-.b.d.0.0.-.9.f.d.3.f.0.2.f.4.1.9.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.q.8.C.8.1.A.R.G.s.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.m.i.i.s.c.l.i.e.n.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.c.4.-.0.0.0.1.-.0.0.1.4.-.d.6.5.9.-.d.f.b.5.0.8.5.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.c.5.8.c.b.d.e.e.9.1.6.e.a.c.3.0.b.f.a.9.e.9.c.4.5.b.0.0.a.d.3.0.0.0.0.0.0.0.0.!.0.0.0.0.7.d.8.a.a.7.a.f.0.e.0.e.2.0.a.b.9.8.7.2.4.9.3.f.e.c.5.e.a.e.a.2.d.a.6.c.e.f.b.6.!.q.8.C.8.1.A.R.G.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 16 streams, Mon Dec 23 07:03:04 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):185985
    Entropy (8bit):2.788390828178518
    Encrypted:false
    SSDEEP:1536:GR2K3FtDMadoZ9jCC8jH/Aa32smXh5+vMDa/s0:GfFVMa01CCqH32x3+vV/j
    MD5:752804D2C9C49027C6FE5ED17E55A427
    SHA1:B0D00C14A4D89EC026E3291CD19BB6D1FD49488D
    SHA-256:EAB5443DC5C19223D287B4C1DD287765BC98B49AB86A473E32B4D0642BB35A2B
    SHA-512:EEB5F1C931E29A69A1F3DE209CC1C845EABE79A3874FF5D9A0AA485C9045EAB16F1AD665BAE2A7FEB17D8DB9BC68ACB8CCEC0074A9441539815936B9E9F014B1
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......(.ig............$...............D.......$...4...........X............@..........l.......8...........T...........................l...........X...............................................................................eJ..............Lw......................T...........'.ig.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8736
    Entropy (8bit):3.707651346114403
    Encrypted:false
    SSDEEP:192:R6l7wVeJWAh96YEISIKn1mgmfrH4dvTprw89bszEfvkm:R6lXJWW96YEtTn1mgmfrH4dvTsQfp
    MD5:6A137644B7F2E8E50850703EFCBD1FFC
    SHA1:B7EDF6672A94C1E07BBFC1D8FDC234BA11B656CA
    SHA-256:E94C188889BFDCC3FD236EE9F1E7D3590A514C6A3A9E0B4CAF6172C8BF669C64
    SHA-512:203291DD093819B12BE4FD88E0E72293CB343A93910B5E9223E62BBA2BB5655233A8510DD590C5654C3A2B1C23617471A0D68877A6909442B43294CF02FC5B44
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.9.8.8.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4722
    Entropy (8bit):4.485205218629076
    Encrypted:false
    SSDEEP:48:cvIwWl8zsnNJg771I9ciiWpW8VYgYm8M4JAFCsFYyq8584bKnoioZivMKd:uIjfnnI7aj7VUJAFaB9oioZiDd
    MD5:4DF15C4FB5C49D0BF7B1D123B0EAE8CD
    SHA1:22DBAFB8951E6EB466466E82FC3896D2C3EABAD6
    SHA-256:96FFDAA531EF299A69D622E135CE7B8CBBAA54B941FFDFE7319750BEE1F94797
    SHA-512:59B9AE0A7B1A0C73CED7A7884F587E42B6923E9A9C2CBD5AC4B6B4B4A985168DDBEEEA7020DB55D37C86AD65D49C1D7D1553300A32A96DC04FC4DC513213F06A
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="643565" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.421822734942922
    Encrypted:false
    SSDEEP:6144:ySvfpi6ceLP/9skLmb0OTPWSPHaJG8nAgeMZMMhA2fX4WABlEnNF0uhiTw:BvloTPW+EZMM6DFyn03w
    MD5:D21AD9FC38F7F7C9D5F9C90ABDF9AD53
    SHA1:31B780B68E2AC9CFFFB4A2700279C4E2A1C6B79D
    SHA-256:627FE4E56EEF22C18270D752986BF52809B098FB4601159A2BDDCB62A4135D86
    SHA-512:C373A17F88B048EFB693B06471644DE172A3E3BF226BDD88B37B9FF291ADFD1483E8160974ECB250D6E54FB1A80FEBCC43E6D629E06148BE85A5F3EDE2F151EB
    Malicious:false
    Reputation:low
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmR99..U..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
    Entropy (8bit):6.118191304789742
    TrID:
    • Win64 Executable GUI Net Framework (217006/5) 49.88%
    • Win64 Executable GUI (202006/5) 46.43%
    • Win64 Executable (generic) (12005/4) 2.76%
    • Generic Win/DOS Executable (2004/3) 0.46%
    • DOS Executable Generic (2002/1) 0.46%
    File name:q8C81ARGsr.exe
    File size:475'584 bytes
    MD5:e5ac4faaa91455612f18e634d788ee76
    SHA1:7d8aa7af0e0e20ab9872493fec5eaea2da6cefb6
    SHA256:e5bb2eb8811d1e3c414055ecf98e83377043d39066d7b77bfb7d654c83c04069
    SHA512:7f5f9ddd40adf41c1526f69e6f2c695204c4225f828507da56ac7684b2482a5c9962bb7bdc204ff92af3beae3fb0821427555251badfae445b4dbf07d4eecb97
    SSDEEP:12288:df+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++4:dNoK
    TLSH:9AA4D74F1F86DC0DC0A21CB9FD8271F9553DACE2C1A4AA2317D4BC0E36F9590679E296
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...p............."...0......N........... .....@..... .......................`......M.....`...@......@............... .....
    Icon Hash:4c963369c473138c
    Entrypoint:0x140000000
    Entrypoint Section:
    Digitally signed:true
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x81E8D070 [Mon Jan 24 21:49:36 2039 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:
    Signature Valid:true
    Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 06/04/2023 20:29:22 02/04/2024 20:29:22
    Subject Chain
    • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Version:3
    Thumbprint MD5:78F1AD3248A045F895EFB93607E3E9F2
    Thumbprint SHA-1:F8B9D82E2E34F627E0FDF6739B051553561690E0
    Thumbprint SHA-256:19869C9DE6A81B7D78F82F98054394C847B0079A1D359775A0726474D81B0105
    Serial:330000035C95F3485B4A046ACF00000000035C
    Instruction
    dec ebp
    pop edx
    nop
    add byte ptr [ebx], al
    add byte ptr [eax], al
    add byte ptr [eax+eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x4dec.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x71a000x27c0.rsrc
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x6e7a40x38.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x6c8350x6ca00452f6bfce76c631bbe241c4253f1c76aFalse0.29451057249712315data5.962647807367529IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x700000x4dec0x4e00fac14549952dbe1e44e08fa3bdd3086fFalse0.9165164262820513data7.748573900036439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x701a00x1babPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9895524495270366
    RT_ICON0x71d5c0x1077PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced1.0026097271648873
    RT_ICON0x72de40x8e9PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced1.0048224462954845
    RT_ICON0x736e00x778PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced1.0057531380753137
    RT_ICON0x73e680x4d3PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.0089068825910932
    RT_ICON0x7434c0x3aePNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced1.0116772823779194
    RT_GROUP_ICON0x7470c0x5adata0.6444444444444445
    RT_VERSION0x747780x474data0.4421052631578947
    RT_MANIFEST0x74bfc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:03:03
    Start date:23/12/2024
    Path:C:\Users\user\Desktop\q8C81ARGsr.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\q8C81ARGsr.exe"
    Imagebase:0x1c24d950000
    File size:475'584 bytes
    MD5 hash:E5AC4FAAA91455612F18E634D788EE76
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:02:03:04
    Start date:23/12/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 1988 -s 768
    Imagebase:0x7ff6c9140000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly