Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
stsvc.exe

Overview

General Information

Sample name:stsvc.exe
Analysis ID:1589842
MD5:54c9491e0087766f83c6e67cbd568f2b
SHA1:f2e8823382c00a1c0ff3c44e727bbe7ba1a5eab4
SHA256:80995c3d41b7ab5178e77baeea0fa6fde3429a439c553e4a00fc1eef763cc415
Tags:exeghd78sgithubuser-JAMESWT_MHT
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
One or more processes crash
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • stsvc.exe (PID: 7524 cmdline: "C:\Users\user\Desktop\stsvc.exe" MD5: 54C9491E0087766F83C6E67CBD568F2B)
    • WerFault.exe (PID: 7628 cmdline: C:\Windows\system32\WerFault.exe -u -p 7524 -s 168 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: stsvc.exeVirustotal: Detection: 29%Perma Link
Source: stsvc.exeReversingLabs: Detection: 18%
Source: stsvc.exeJoe Sandbox ML: detected
Source: stsvc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\stsvc.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7524 -s 168
Source: classification engineClassification label: mal52.winEXE@2/5@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7524
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\12ced6ec-cdd9-4503-81b5-ed9e12c311c1Jump to behavior
Source: stsvc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\stsvc.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: stsvc.exeVirustotal: Detection: 29%
Source: stsvc.exeReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Users\user\Desktop\stsvc.exe "C:\Users\user\Desktop\stsvc.exe"
Source: C:\Users\user\Desktop\stsvc.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7524 -s 168
Source: C:\Users\user\Desktop\stsvc.exeSection loaded: apphelp.dllJump to behavior
Source: stsvc.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: stsvc.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: stsvc.exeStatic file information: File size 16345600 > 1048576
Source: stsvc.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x347e00
Source: stsvc.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xa41200
Source: stsvc.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1b2c00
Source: stsvc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: stsvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: stsvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: stsvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: stsvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: stsvc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: stsvc.exeStatic PE information: section name: .fptable
Source: stsvc.exeStatic PE information: section name: _RDATA
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: stsvc.exeBinary or memory string: 2vmCI
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\stsvc.exeCode function: 0_2_00007FF71E751A04 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF71E751A04
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
stsvc.exe29%VirustotalBrowse
stsvc.exe18%ReversingLabsWin64.Trojan.Midie
stsvc.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1589842
      Start date and time:2025-01-13 08:33:21 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 5s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:stsvc.exe
      Detection:MAL
      Classification:mal52.winEXE@2/5@0/0
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.65.92, 13.107.246.45, 20.190.159.4, 52.149.20.212
      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target stsvc.exe, PID 7524 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      02:34:51API Interceptor1x Sleep call for process: WerFault.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0017.t-0009.t-msedge.nethttps://encryption-deme-group.lomiraxen.ru/PdoodjcL/#Mvercauteren.william@deme-group.comGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://mrohailkhan.com/energyaustralia/auth/auhs1/Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      http://satelite.nv-ec.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://support.te-wt.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://www.support.ue-vt.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://www.lforgot.xw-er.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://support.wt-nx.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      No context
      No context
      No context
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.6346052468984715
      Encrypted:false
      SSDEEP:96:iyFh/KAFsEhGg1yHpSsQXIDcQUc6kcE/cw3aw7a7u+HbHg6ZAX/d5FMT2SlPkpXi:Bj/1FsI0qgV52fjEzuiFeZ24lO8z5
      MD5:F4BA595FDD7C9CC7DFF6C8164427D567
      SHA1:4098D6DDDCA196EB3BCDFA97EFD9874B7BF17A3B
      SHA-256:3B63CB2C13DED5453A970CB5F2DD935D88636968E95AE5849BC5C3BBD1BCE3B9
      SHA-512:B55608E7D4D6B0084B220F217E4D9B6838E5DDE69FB13C67C0F8EDE76FC4AB9C4574F68E6C205DE0E331A4B4F3C611972F27C44FDF1231D217FBE17964EF99A7
      Malicious:true
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.2.2.7.2.7.4.6.1.2.4.4.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.2.2.7.2.7.4.8.9.3.6.9.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.7.4.7.0.1.0.a.-.1.8.3.e.-.4.3.e.9.-.8.2.f.1.-.6.5.3.3.c.2.1.9.7.f.0.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.3.f.e.4.b.9.0.-.6.3.c.e.-.4.0.9.e.-.a.f.6.9.-.1.3.6.d.0.e.f.e.5.9.5.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.t.s.v.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.4.-.0.0.0.1.-.0.0.1.4.-.3.b.2.d.-.2.6.9.7.8.d.6.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.2.a.7.5.6.0.1.0.7.0.e.b.5.b.a.1.5.6.8.c.6.3.1.a.b.7.a.3.7.6.d.0.0.0.0.f.f.f.f.!.0.0.0.0.f.2.e.8.8.2.3.3.8.2.c.0.0.a.1.c.0.f.f.3.c.4.4.e.7.2.7.b.b.e.7.b.a.1.a.5.e.a.b.4.!.s.t.s.v.c...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.2././.1.4.:.0.8.:.5.9.:.3.7.!.f.9.a.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Mon Jan 13 07:34:34 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):28404
      Entropy (8bit):2.6110878080558884
      Encrypted:false
      SSDEEP:192:fikTOWEORugrHA6JRDqpluQa8YKdsdIsOTFxUa421Ibjs:TSmRpg6JRSs3dy3Zojs
      MD5:B8AD5A37691EFD05FD024FB15696B64F
      SHA1:164CA2FC389261CB46231F4F061C28A30EB8E717
      SHA-256:A9CF73C00915BEE71E07D2DEFE0B94EC3221174A57F93824F295B3512CA1B5EB
      SHA-512:FC8F7E0BEFBA9FBA32A5FD774E2005E96D114C86BC251E85728E46475D3984E67A2F264B13B8FCB9CF24996ADE0116EA9A343569C37A0431A688D1C6E37406A4
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .........g............4........... ...<.......t...............T.......8...........T................h..........\...........H...............................................................................eJ..............Lw......................T.......d.....g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8794
      Entropy (8bit):3.69436521548398
      Encrypted:false
      SSDEEP:192:R6l7wVeJkbt2H6YNGkSn4Ugmf5xdNvWpDP89bzz0fC5ARm:R6lXJYt2H6YsPn4Ugmf5rNjzAfCl
      MD5:A983C823FCFB10BBD3BDDF5B75E25BD6
      SHA1:C0D394915F7F21F5E35FCAA9BC49A9677072C3E7
      SHA-256:41570ACF47F78E460C324E711AC3B07070618F8E0EC9230A60E67B9528790A7D
      SHA-512:94EFC7B0F9782BDFC7C8887D2421CBAA030A3CA322B80B0C9AE97BFE215F94B91F15654929225611B763C9959603994751F00BB52D3F22373A6DA3C4DDA70273
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.2.4.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4742
      Entropy (8bit):4.421448690697396
      Encrypted:false
      SSDEEP:48:cvIwWl8zsIJg771I9WCcWpW8VY9/Ym8M4JQYgFpyq8vuYkaxz13d:uIjfOI7JCV7VsiJmWYaxz13d
      MD5:95FFE88D980905588265BFF309CB6652
      SHA1:842C9717F9E948E38008E0BE0F0DBFF60B9C9D8D
      SHA-256:0FEE466EF77A32549D1C9322014CF7B5022D82982920453BF214B4C41AA52DD4
      SHA-512:13E52A867CCBCC49BD218B4732F35459C8B6BCD345929C89BD1E08A9F540B9E09E88363A9D99C1273A7F7F4C7CA57F78E936BF2CFB7DB464D6EB779BE924BE7E
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="673837" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.416641205436575
      Encrypted:false
      SSDEEP:6144:Rcifpi6ceLPL9skLmb0mtSWSPtaJG8nAgex285i2MMhA20X4WABlGuNy5+:ui58tSWIZBk2MM6AFBwo
      MD5:8F0BE7C3DE8BFCA7234842F2E3AD6B9E
      SHA1:8165FD2A209EC72BDFDC20BA27D4A8A368B907BA
      SHA-256:D7F55C670F4F9A9E530B8A17627DA70905B8C91251A2A111230B2B2F2A917B81
      SHA-512:91F003C98A1A631FADEC5B53156A48CAB94D52F42DEF4334F2E0F39231AECF6633D0F1BAED291CAB6CBF176AFE9ECBEDA708004AF75B9B3C0917A5FE59EA393A
      Malicious:false
      Reputation:low
      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm~....e..............................................................................................................................................................................................................................................................................................................................................U...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32+ executable (GUI) x86-64, for MS Windows
      Entropy (8bit):7.685330835577847
      TrID:
      • Win64 Executable GUI (202006/5) 91.80%
      • Win64 Executable (generic) (12005/4) 5.46%
      • Clipper DOS Executable (2020/12) 0.92%
      • Generic Win/DOS Executable (2004/3) 0.91%
      • DOS Executable Generic (2002/1) 0.91%
      File name:stsvc.exe
      File size:16'345'600 bytes
      MD5:54c9491e0087766f83c6e67cbd568f2b
      SHA1:f2e8823382c00a1c0ff3c44e727bbe7ba1a5eab4
      SHA256:80995c3d41b7ab5178e77baeea0fa6fde3429a439c553e4a00fc1eef763cc415
      SHA512:275bef6c614b4e88a5fd9a350987b74e5b8bb6c17b155baa5204b3479d258ac6e9abebe87d1ec82272f71262334dc11b77c160fa047416adbd97a69dd774e544
      SSDEEP:393216:k8oy3mBlO804aw9tFhJMyUw/SZSRghMsppopHe:kkneacbfUw/tRghMs/o
      TLSH:A1F6DF87C3A386D4B683603C941A1B63CB60B1146E6579B4B9F51240DF47EED2FF2A27
      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....H]g.........."......~4...........3........@..........................................`A.......................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x1403319f0
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
      Time Stamp:0x675D48F9 [Sat Dec 14 08:59:37 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:7bb4e8cef6a9f350a8f5dc71e7b3773c
      Instruction
      dec eax
      sub esp, 28h
      call 00007FB220926B60h
      dec eax
      add esp, 28h
      jmp 00007FB2209269CFh
      int3
      int3
      dec eax
      mov dword ptr [esp+18h], ebx
      push ebp
      dec eax
      mov ebp, esp
      dec eax
      sub esp, 30h
      dec eax
      mov eax, dword ptr [00C0B228h]
      dec eax
      mov ebx, 2DDFA232h
      cdq
      sub eax, dword ptr [eax]
      add byte ptr [eax+3Bh], cl
      ret
      jne 00007FB220926BC6h
      dec eax
      and dword ptr [ebp+10h], 00000000h
      dec eax
      lea ecx, dword ptr [ebp+10h]
      call dword ptr [00A4D2C2h]
      dec eax
      mov eax, dword ptr [ebp+10h]
      dec eax
      mov dword ptr [ebp-10h], eax
      call dword ptr [00A4D244h]
      mov eax, eax
      dec eax
      xor dword ptr [ebp-10h], eax
      call dword ptr [00A4D230h]
      mov eax, eax
      dec eax
      lea ecx, dword ptr [ebp+18h]
      dec eax
      xor dword ptr [ebp-10h], eax
      call dword ptr [00A4D328h]
      mov eax, dword ptr [ebp+18h]
      dec eax
      lea ecx, dword ptr [ebp-10h]
      dec eax
      shl eax, 20h
      dec eax
      xor eax, dword ptr [ebp+18h]
      dec eax
      xor eax, dword ptr [ebp-10h]
      dec eax
      xor eax, ecx
      dec eax
      mov ecx, FFFFFFFFh
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xd7e8e80x28.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf510000x1b4.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf410000xc288.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xf520000x4db9c.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0xd7a4800x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xd716100x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xd7ebb00x2a0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x347cfe0x347e009b8308ae033d17184b7d0889ac8a6fd9unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x3490000xa4106c0xa41200215c3fb8d00de6c134532bd775ef06aaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xd8b0000x1b55d00x1b2c008a7cb1aa5654e18a9b7013af3b2999e4False0.44319876725129387data6.027864960311715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0xf410000xc2880xc40048933653d7cd9e66e07e910254a8ec2fFalse0.5079520089285714data6.013971460555883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .fptable0xf4e0000x1000x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0xf4f0000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      _RDATA0xf500000x2800x4009cd446243021a91ba34f527950852f0aFalse0.2861328125data3.176486894987455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0xf510000x1b40x2008bc6933525dfd0a4a0ba84393d09b2fcFalse0.48828125data5.109292165198166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xf520000x4db9c0x4dc00fdf2c44289926eb8d4abba8252429febFalse0.015370654139871383data5.433782792971454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0xf510580x15bASCII text, with CRLF line terminatorsEnglishUnited States0.5446685878962536
      DLLImport
      KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReleaseSRWLockExclusive, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualProtect, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jan 13, 2025 08:34:28.395006895 CET1.1.1.1192.168.2.70x1b55No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Jan 13, 2025 08:34:28.395006895 CET1.1.1.1192.168.2.70x1b55No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:02:34:33
      Start date:13/01/2025
      Path:C:\Users\user\Desktop\stsvc.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\stsvc.exe"
      Imagebase:0x7ff71e420000
      File size:16'345'600 bytes
      MD5 hash:54C9491E0087766F83C6E67CBD568F2B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:02:34:34
      Start date:13/01/2025
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 7524 -s 168
      Imagebase:0x7ff71aec0000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1573189350.00007FF71E421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E420000, based on PE: true
        • Associated: 00000000.00000002.1573137714.00007FF71E420000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1573547791.00007FF71E769000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1573547791.00007FF71F169000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1573547791.00007FF71F1A7000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1574432727.00007FF71F1AB000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1574589147.00007FF71F35C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1574589147.00007FF71F35F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1574648229.00007FF71F361000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1574667809.00007FF71F370000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71e420000_stsvc.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: f3b889a287d29c62c99feaed70c6a214b09c3d6754627ac580f0f2a0a97d7011
        • Instruction ID: 84e4fadc4b38c09654da77546949c5115c3559c55e23fca2aaaacd213960856a
        • Opcode Fuzzy Hash: f3b889a287d29c62c99feaed70c6a214b09c3d6754627ac580f0f2a0a97d7011
        • Instruction Fuzzy Hash: CE114C22B14F418AFB00DB64E8442F873B4FB58768F840E35DA6D467A4DF38D1988390