Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q5f5spSfp9.exe

Overview

General Information

Sample name:Q5f5spSfp9.exe
renamed because original name is a hash value
Original sample name:eb81725b56f6ae5e22c4601f64c4874a.exe
Analysis ID:1581588
MD5:eb81725b56f6ae5e22c4601f64c4874a
SHA1:cff55d88860e2b651657a55aac7bc59691be55cf
SHA256:ce28312f0dc81afe104577d6043fb639dcbcd86668233ec0d5a3ccd7838ecd48
Tags:exeuser-abuse_ch
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
HTTP GET or POST without a user agent
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • Q5f5spSfp9.exe (PID: 2852 cmdline: "C:\Users\user\Desktop\Q5f5spSfp9.exe" MD5: EB81725B56F6AE5E22C4601F64C4874A)
    • conhost.exe (PID: 3428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 356 cmdline: C:\Windows\system32\WerFault.exe -u -p 2852 -s 368 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Q5f5spSfp9.exeVirustotal: Detection: 34%Perma Link
Source: Q5f5spSfp9.exeReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: Q5f5spSfp9.exeJoe Sandbox ML: detected
Source: Q5f5spSfp9.exe, 00000000.00000002.1672454622.00007FF653684000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_2b14862b-0
Source: Q5f5spSfp9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 3542
Source: unknownNetwork traffic detected: HTTP traffic on port 3542 -> 49706
Source: global trafficTCP traffic: 192.168.2.8:49706 -> 141.11.185.137:3542
Source: global trafficHTTP traffic detected: GET /version HTTP/1.1Host: 141.11.185.137:3542Accept: */*
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: unknownTCP traffic detected without corresponding DNS query: 141.11.185.137
Source: global trafficHTTP traffic detected: GET /version HTTP/1.1Host: 141.11.185.137:3542Accept: */*
Source: Q5f5spSfp9.exe, 00000000.00000002.1669788805.000002D3C2A4C000.00000004.00000020.00020000.00000000.sdmp, Q5f5spSfp9.exe, 00000000.00000002.1669677365.000000E8C2EFB000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/version
Source: Q5f5spSfp9.exe, 00000000.00000002.1669788805.000002D3C2A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/version2
Source: Q5f5spSfp9.exe, 00000000.00000002.1669788805.000002D3C2A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.11.185.137:3542/versionGh
Source: Q5f5spSfp9.exe, 00000000.00000002.1672454622.00007FF653684000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://141.11.18HARDWARE
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: Q5f5spSfp9.exe, 00000000.00000002.1672454622.00007FF653684000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html

System Summary

barindex
Source: Q5f5spSfp9.exeStatic PE information: section name: .?'N
Source: Q5f5spSfp9.exeStatic PE information: section name: .Rv
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2852 -s 368
Source: classification engineClassification label: mal88.troj.evad.winEXE@3/6@0/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3428:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2852
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\34210b9c-f798-44d3-abdd-eff1f76155efJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Q5f5spSfp9.exeVirustotal: Detection: 34%
Source: Q5f5spSfp9.exeReversingLabs: Detection: 28%
Source: unknownProcess created: C:\Users\user\Desktop\Q5f5spSfp9.exe "C:\Users\user\Desktop\Q5f5spSfp9.exe"
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2852 -s 368
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: mswsock.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Q5f5spSfp9.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Q5f5spSfp9.exeStatic file information: File size 7979008 > 1048576
Source: Q5f5spSfp9.exeStatic PE information: Raw size of .gJQ is bigger than: 0x100000 < 0x799000
Source: Q5f5spSfp9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section where entry point is pointing to: .gJQ
Source: Q5f5spSfp9.exeStatic PE information: section name: .?'N
Source: Q5f5spSfp9.exeStatic PE information: section name: .Rv
Source: Q5f5spSfp9.exeStatic PE information: section name: .gJQ

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeMemory written: PID: 2852 base: 7FFBCB910008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeMemory written: PID: 2852 base: 7FFBCB7AD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeMemory written: PID: 2852 base: 7FFBCB92000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeMemory written: PID: 2852 base: 7FFBCB7DCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 3542
Source: unknownNetwork traffic detected: HTTP traffic on port 3542 -> 49706
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSection loaded: OutputDebugStringW count: 1969
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSpecial instruction interceptor: First address: 7FF6543FEF15 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Q5f5spSfp9.exe, 00000000.00000002.1669788805.000002D3C2A4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllk
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF653D550A9Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtQueryInformationProcess: Direct from: 0x7FF653D067D9Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Indirect: 0x7FF653CB41E2Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF653CDC72CJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtClose: Direct from: 0x7FF653CDB40C
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF653D517BFJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtQueryInformationProcess: Direct from: 0x7FF653CECA32Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF6543E995FJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtMapViewOfSection: Direct from: 0x7FF65439730BJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtQueryInformationProcess: Direct from: 0x7FF653D2149FJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtSetInformationThread: Direct from: 0x7FF6543FC74CJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtOpenFile: Direct from: 0x7FF65413970DJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtQueryInformationProcess: Direct from: 0x7FF65439612BJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF6543A875EJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtSetInformationProcess: Direct from: 0x7FF653CD1A63Jump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF653CD19BDJump to behavior
Source: C:\Users\user\Desktop\Q5f5spSfp9.exeNtProtectVirtualMemory: Direct from: 0x7FF653CE49C9Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
1
Credential API Hooking
321
Security Software Discovery
Remote Services1
Credential API Hooking
11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Q5f5spSfp9.exe35%VirustotalBrowse
Q5f5spSfp9.exe29%ReversingLabs
Q5f5spSfp9.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://141.11.185.137:3542/versionGh0%Avira URL Cloudsafe
http://141.11.185.137:3542/version20%Avira URL Cloudsafe
http://141.11.18HARDWARE0%Avira URL Cloudsafe
http://141.11.185.137:3542/version0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://141.11.185.137:3542/versionfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://141.11.18HARDWAREQ5f5spSfp9.exe, 00000000.00000002.1672454622.00007FF653684000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.5.drfalse
    high
    http://141.11.185.137:3542/version2Q5f5spSfp9.exe, 00000000.00000002.1669788805.000002D3C2A4C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://141.11.185.137:3542/versionGhQ5f5spSfp9.exe, 00000000.00000002.1669788805.000002D3C2A4C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.haxx.se/docs/http-cookies.htmlQ5f5spSfp9.exe, 00000000.00000002.1672454622.00007FF653684000.00000002.00000001.01000000.00000003.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      141.11.185.137
      unknownUnited Kingdom
      7470TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHfalse
      IP
      127.0.0.1
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1581588
      Start date and time:2024-12-28 09:34:13 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 37s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Q5f5spSfp9.exe
      renamed because original name is a hash value
      Original Sample Name:eb81725b56f6ae5e22c4601f64c4874a.exe
      Detection:MAL
      Classification:mal88.troj.evad.winEXE@3/6@0/2
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.89.179.12, 40.126.53.18, 20.109.210.53, 13.107.246.63
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target Q5f5spSfp9.exe, PID 2852 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      TimeTypeDescription
      03:35:33API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      141.11.185.137TbxHhK6lsS.exeGet hashmaliciousUnknownBrowse
      • 141.11.185.137:3542/version
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      TRUEINTERNET-AS-APTRUEINTERNETCoLtdTHTbxHhK6lsS.exeGet hashmaliciousUnknownBrowse
      • 141.11.185.137
      db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
      • 171.103.158.89
      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 171.103.5.185
      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 180.214.218.62
      nshkarm5.elfGet hashmaliciousMiraiBrowse
      • 223.24.239.97
      sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 61.91.50.103
      2.elfGet hashmaliciousUnknownBrowse
      • 223.24.215.80
      jew.ppc.elfGet hashmaliciousUnknownBrowse
      • 171.102.72.219
      arm6.elfGet hashmaliciousUnknownBrowse
      • 223.24.239.68
      x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 171.103.83.108
      No context
      No context
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.825002946209616
      Encrypted:false
      SSDEEP:96:ggFqBKXzzFsGBMhqGhiXSKQXIDcQbDc6bMCDbcEVzcw3VQd6+HbHg/8BRTf3o8Fa:NdFY051PzhUjpBzuiFeZ24lO8pX
      MD5:1CE2C6208E900CFCC8A2E5B7EF7E2E7B
      SHA1:2D30D7BA8A922594BDEB66F4A23757700FD99DC3
      SHA-256:023ABD73A2D99DEE96B88B75ADD8001D534101C59CC21293D25499ACFC0B4AA6
      SHA-512:381DCFBC700A634C8E1F3F0825A2D9581AE5807EB1A89B4D1CFD9D8011AE038F55F6427BCE6D62A0EE1945539E6E251E47CFB26F83847DF173044449DED9F289
      Malicious:true
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.8.4.8.5.2.0.0.4.4.3.0.7.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.8.4.8.5.2.0.8.5.6.7.9.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.2.6.5.a.1.0.5.-.3.6.8.c.-.4.d.c.0.-.8.3.f.9.-.5.0.b.2.4.7.e.c.d.6.1.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.a.8.5.4.9.a.-.1.f.0.1.-.4.6.7.0.-.9.f.9.c.-.7.c.5.d.7.3.d.6.e.f.f.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.Q.5.f.5.s.p.S.f.p.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.2.4.-.0.0.0.1.-.0.0.1.4.-.7.a.4.0.-.9.c.6.9.0.3.5.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.a.4.8.3.9.4.8.b.3.6.a.2.b.c.a.e.a.f.3.1.b.1.c.4.a.8.e.2.1.2.2.0.0.0.0.f.f.f.f.!.0.0.0.0.c.f.f.5.5.d.8.8.8.6.0.e.2.b.6.5.1.6.5.7.a.5.5.a.a.c.7.b.c.5.9.6.9.1.b.e.5.5.c.f.!.Q.5.f.5.s.p.S.f.p.9...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.2././.2.8.:.0.5.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Sat Dec 28 08:35:20 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):91152
      Entropy (8bit):1.5115039605887073
      Encrypted:false
      SSDEEP:192:0Ho1SFO+AOjS7a08GK1qlwDT7c8n2Po9Ytcli0l:Np4jS7a7p1qKom8of
      MD5:09117320AFCA2F23AEE9A86962E588DE
      SHA1:55C75249D6B0E6B367EE8F4EB0D10774AB54B6E3
      SHA-256:5EB20F6F773D5C3A091B4FE284487EF84818F86C96B5B1B16418ECAE55B7F400
      SHA-512:223DBABB258D5E6492FDC19C5E29D18AA48010EAA5D9547130F513A9AC876740CDFB3F68F5DC2B59D624E1CBA42DE5C05EE0FE420C31FC48C6E959FBEBF19A62
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......H.og............$...............,............<..........T.......8...........T...........p....U......................................................................................................eJ......\.......Lw......................T.......$...@.og.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8826
      Entropy (8bit):3.6991807906286454
      Encrypted:false
      SSDEEP:192:R6l7wVeJEfPFp46YSTLTgmf4JFhpDM89brSNf0QZm:R6lXJ0PFp46YGPgmf4btrIfm
      MD5:7622C7B7EFCF7B9E9852080F50CB4D35
      SHA1:264944EF746832E043F395C92FFFC18A921E74E9
      SHA-256:9490E5BD72470023CC11B41DA8D9A73A8C4D2276063DBA8FCB809E4BDC64B401
      SHA-512:0B27C9E74B3A10989BF659025B49E80D82D15013AC9F219AF74A522E063D3799553F3D6D96479E7D0963EF4DAC672DB472CACACB128192796081608FB231A099
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.5.2.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4766
      Entropy (8bit):4.451506385665476
      Encrypted:false
      SSDEEP:48:cvIwWl8zs+Jg771I9vcWpW8VY0Ym8M4JI9yJsFEyq8v9yJBb/3d:uIjf0I7MV7VIJpWsb/3d
      MD5:CACB73A791AF7BC20E71410E8AF0EB87
      SHA1:3E58079805872D46FA40672211FFC4C4D10D7C0E
      SHA-256:A1856B6800FD3AC02243CF754D3FBE77F7044A47568E1CFAD9AE0A1085574D04
      SHA-512:3E24A243B86988EF7CF0248E55898BEA6958CE480B269DA1D192EC90EC4E77DFAFBAE700EA3E96597F5AF46E02E58E7B47892D39429F802996289F64FC595D0C
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="650858" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.372200921372187
      Encrypted:false
      SSDEEP:6144:CFVfpi6ceLP/9skLmb0ByWWSPtaJG8nAge35OlMMhA2AX4WABlguNziL:KV17yWWI/glMM6kF7Vq
      MD5:AA381AA6DE565D3F6020759A5D70995A
      SHA1:E12BA3BB2FBF31D97B521151DB9E954EC8652FB6
      SHA-256:4DE337055977803D18D2D78B0212C73DA31AF8131C7588C5DCAEF15A41BBC61B
      SHA-512:6C28A42727184D216403C2E7E8FA862F9829FA300D48C6A5E9A353FA4221C548EED53445EC3ADE1FCC1569EDBB54397DA123160D50F2AF97B509DDB0D47FC4F8
      Malicious:false
      Reputation:low
      Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj..m.Y...............................................................................................................................................................................................................................................................................................................................................|.Y........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\Q5f5spSfp9.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):29
      Entropy (8bit):3.620936064750772
      Encrypted:false
      SSDEEP:3:jhMZvLVLyn:FgvBLyn
      MD5:B75633D66A88E5680C6BB255399254B2
      SHA1:8B41DCEBFD52F58E40232C00D44C703650FBD2CE
      SHA-256:35D596D6F7F4C37B96F18660C901B4F4F5A274C982A0D05991BE7D704B8382EF
      SHA-512:48D3E3164C7FDB851E775D8E21E1B73652F5FE0B6A6399B3874A7557D5901B224B7C4880855BFE2224EED764FD9B9366F2521C64424070489104C5D8D9548090
      Malicious:false
      Reputation:low
      Preview:.. Attempting to connect.....
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):7.988841262691024
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Q5f5spSfp9.exe
      File size:7'979'008 bytes
      MD5:eb81725b56f6ae5e22c4601f64c4874a
      SHA1:cff55d88860e2b651657a55aac7bc59691be55cf
      SHA256:ce28312f0dc81afe104577d6043fb639dcbcd86668233ec0d5a3ccd7838ecd48
      SHA512:d9fa960836ea6ac0f7ce00ca27ad1b24e73b942c2b12cf476859979f2e9cbc7f5f03b6ed98cee87b27db6c95bea605703b217c4837a595833a5c76f06089fa03
      SSDEEP:196608:C97Ow590+tLss5Y5AyKVH1vjHIT5Iaosb6c:hw57Ls3A510T5LRb/
      TLSH:FE86338DE9A3B7FEC44AD7F1C087B47DB06D37859A630C0A2B981A109D5250D2E77BC6
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....og.........."....*.(....8.......m........@..........................................`................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x1406d19c2
      Entrypoint Section:.gJQ
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x676F92FB [Sat Dec 28 05:56:11 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:6123cc4f0fae004f33be7838cf2627be
      Instruction
      push F4BE5E1Ch
      pushfd
      dec eax
      neg dword ptr [esp+08h]
      add dword ptr [esp+08h], 90A1BC80h
      cmp word ptr [esp+08h], 0F9Ch
      call 00007F4A556EF33Eh
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x6e1b400x1f4.gJQ
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe5e0000x1e0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe548800x771c.gJQ
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe5c0000x154c.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe547400x140.gJQ
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x6c10000x1a8.Rv
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x8269b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x840000x1cc940x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa10000x3668c80x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x4080000x4e240x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .?'N0x40d0000x2b3b190x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .Rv 0x6c10000x12d80x140070cae7c9c4cb2d4173669909e5c85a8cFalse0.0341796875data0.21576160737838812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .gJQ0x6c30000x798f9c0x799000e6f4f114497e52133016d9a78f8280aeunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .reloc0xe5c0000x154c0x1600cbd3587d9bd0dc2dfc17bed2dd27a940False0.19176136363636365data5.450007979100464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0xe5e0000x1e00x2006d136ad0e2c9a76cd03cc00ea739b0b0False0.5390625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0xe5e0580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
      DLLImport
      KERNEL32.dllGetCurrentProcessId
      USER32.dllGetAsyncKeyState
      ADVAPI32.dllCryptEncrypt
      MSVCP140.dll?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
      WS2_32.dllhtonl
      WLDAP32.dll
      CRYPT32.dllCertCreateCertificateChainEngine
      Normaliz.dllIdnToAscii
      VCRUNTIME140.dllmemcpy
      VCRUNTIME140_1.dll__CxxFrameHandler4
      api-ms-win-crt-runtime-l1-1-0.dll__sys_nerr
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr
      api-ms-win-crt-heap-l1-1-0.dllrealloc
      api-ms-win-crt-utility-l1-1-0.dllqsort
      api-ms-win-crt-convert-l1-1-0.dllstrtoul
      api-ms-win-crt-environment-l1-1-0.dllgetenv
      api-ms-win-crt-stdio-l1-1-0.dll_read
      api-ms-win-crt-filesystem-l1-1-0.dll_access
      api-ms-win-crt-time-l1-1-0.dll_time64
      api-ms-win-crt-string-l1-1-0.dllstrncmp
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      api-ms-win-crt-conio-l1-1-0.dll_getch
      KERNEL32.dllGetSystemTimeAsFileTime
      KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Dec 28, 2024 09:35:19.404658079 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:19.524154902 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:19.524247885 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:19.525038004 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:19.644573927 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850645065 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850675106 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850714922 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850728035 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850745916 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850759983 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850792885 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:20.850846052 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:20.850847006 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850861073 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850881100 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850893021 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.850929022 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:20.850929022 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:20.970344067 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.970371962 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:20.970454931 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:21.051747084 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.051800966 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.051887989 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:21.055929899 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.055958033 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.056005001 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:21.064238071 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.064316034 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.064361095 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:21.072649002 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.072845936 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.072887897 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:21.080960035 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.081094980 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.081140041 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:21.089325905 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:21.141901970 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:26.850177050 CET354249706141.11.185.137192.168.2.8
      Dec 28, 2024 09:35:26.850246906 CET497063542192.168.2.8141.11.185.137
      Dec 28, 2024 09:35:35.355674028 CET497063542192.168.2.8141.11.185.137
      • 141.11.185.137:3542
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.849706141.11.185.13735422852C:\Users\user\Desktop\Q5f5spSfp9.exe
      TimestampBytes transferredDirectionData
      Dec 28, 2024 09:35:19.525038004 CET65OUTGET /version HTTP/1.1
      Host: 141.11.185.137:3542
      Accept: */*
      Dec 28, 2024 09:35:20.850645065 CET1236INHTTP/1.1 200 OK
      Content-Type: application/json
      Data: 606808280860d230ea3850aa68a2da38da684028d268e23058a240aa603058b258ba6830403870aa403870b268bad2b26038e2300820ea287828
      Access: 0808482060009238825810a200c29a30b2080020ba08a23830c200a2085018ba30da2838285830a2285830ba00da92ba0858a2386040aa201048
      Date: Sat, 28 Dec 2024 08:35:20 GMT
      Connection: keep-alive
      Keep-Alive: timeout=5
      Transfer-Encoding: chunked
      Data Raw: 36 39 30 65 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 56 6d 30 77 64 32 51 79 55 58 6c 56 57 47 78 57 56 30 64 34 57 46 6c 55 52 6e 64 55 4d 56 70 7a 57 6b 5a 4f 57 46 4a 73 62 44 4e 58 61 32 4d 31 56 6a 46 4b 63 32 4a 45 54 6c 68 68 4d 6b 30 78 56 6a 42 61 53 32 4d 79 53 6b 56 55 62 47 68 6f 54 56 56 77 56 56 5a 74 63 45 74 54 4d 55 6c 35 55 32 74 57 56 57 4a 48 61 47 39 55 56 6c 5a 33 56 6c 5a 61 64 47 4e 46 5a 46 52 4e 62 45 70 4a 56 6d 31 30 63 32 46 57 53 6e 52 56 61 7a 6c 61 56 6a 4e 6f 61 46 70 57 57 6d 46 6b 52 31 5a 48 56 32 31 34 55 32 4a 48 64 7a 46 57 61 32 51 77 59 7a 4a 47 63 31 4e 75 55 6c 5a 68 65 6d 78 68 56 6d 70 4f 55 32 46 47 56 58 68 58 62 55 5a 72 55 6a 41 31 52 31 64 72 57 6e 64 57 4d 44 46 46 55 6c 52 47 56 31 5a 46 62 33 64 57 61 6b 5a 68 56 30 5a 4f 63 6d 46 48 61 46 4e 6c 62 58 68 58 56 6d 30 78 4e 46 6c 56 4d 48 68 58 62 6b 35 59 59 6c 56 61 63 56 5a 74 63 7a 46 6c 52 6c 70 59 5a 55 68 6b 56 30 31 45 52 6c 64 5a 4d 46 70 7a 56 6a 46 61 4e 6c 46 59 61 46 64 53 52 58 42 49 [TRUNCATED]
      Data Ascii: 690e{"message":"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


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:03:35:12
      Start date:28/12/2024
      Path:C:\Users\user\Desktop\Q5f5spSfp9.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\Q5f5spSfp9.exe"
      Imagebase:0x7ff653600000
      File size:7'979'008 bytes
      MD5 hash:EB81725B56F6AE5E22C4601F64C4874A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:03:35:13
      Start date:28/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6ee680000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:03:35:19
      Start date:28/12/2024
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 2852 -s 368
      Imagebase:0x7ff699f20000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly