Edit tour

Windows Analysis Report
17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe

Overview

General Information

Sample name:17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Analysis ID:1676014
MD5:86484e736db019bcfe73f6207e54de45
SHA1:5d4e4034d8f696c0a2df223cfe783f8a49d6aec2
SHA256:4834fbf15b384b95c93e0c7f59dccbf930fc97b85c0b8c92af5c6ef6b6ecab70
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Score:4
Range:0 - 100
Confidence:60%

Signatures

AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: mscorlib.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.977428386.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, WERE.tmp.dmp.5.dr
Source: Binary string: System.ni.pdbRSDS source: WERE.tmp.dmp.5.dr
Source: Binary string: C:\Users\sinso\source\repos\Migrator\Migrator\obj\Debug\Migrator.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Source: Binary string: mscorlib.ni.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: Migrator.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: System.pdb4 source: WERE.tmp.dmp.5.dr
Source: Binary string: System.Core.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.976686429.000000000069A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb` source: WERE.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERE.tmp.dmp.5.dr
Source: Binary string: orlib.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.976686429.000000000069A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdb source: WERE.tmp.dmp.5.dr
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeCode function: 0_2_008908480_2_00890848
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeCode function: 0_2_008904250_2_00890425
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 1044
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.976686429.000000000065E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000000.907250512.0000000000174000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMigrator.exe2 vs 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeBinary or memory string: OriginalFilenameMigrator.exe2 vs 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Source: classification engineClassification label: clean4.winEXE@3/6@0/0
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6960:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6956
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4de6c4ff-e53c-4170-a92b-836d4707595aJump to behavior
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeFile read: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe "C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe"
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 1044
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mscorlib.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.977428386.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, WERE.tmp.dmp.5.dr
Source: Binary string: System.ni.pdbRSDS source: WERE.tmp.dmp.5.dr
Source: Binary string: C:\Users\sinso\source\repos\Migrator\Migrator\obj\Debug\Migrator.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Source: Binary string: mscorlib.ni.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: Migrator.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: System.pdb4 source: WERE.tmp.dmp.5.dr
Source: Binary string: System.Core.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.976686429.000000000069A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb` source: WERE.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERE.tmp.dmp.5.dr
Source: Binary string: orlib.pdb source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, 00000000.00000002.976686429.000000000069A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WERE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERE.tmp.dmp.5.dr
Source: Binary string: System.Core.ni.pdb source: WERE.tmp.dmp.5.dr
Source: 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeStatic PE information: 0xF184067F [Mon May 26 16:51:11 2098 UTC]
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeMemory allocated: 890000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeMemory allocated: B00000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1676014 Sample: 17458240837a12bc11d27275f94... Startdate: 28/04/2025 Architecture: WINDOWS Score: 4 5 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe 1 2->5         started        process3 7 WerFault.exe 22 16 5->7         started        9 conhost.exe 5->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe1%VirustotalBrowse
17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.5.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1676014
    Start date and time:2025-04-28 09:08:16 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 6s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
    Detection:CLEAN
    Classification:clean4.winEXE@3/6@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 3
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173, 20.190.190.196, 52.149.20.212, 69.192.44.226
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe, PID 6956 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    03:09:23API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):1.0150804366298902
    Encrypted:false
    SSDEEP:192:p+P2EAUJMb0BU/HviaOsUzuiFoZ24IO800:cPpTJzBU/KaEzuiFoY4IO83
    MD5:A4327B9A7CCF754DE1F6878E1CFAD545
    SHA1:F36D3B0C0C527C9E09DA4830EA0EC987414AC7C2
    SHA-256:36D4C4AF383132020DF520A23643D5977CBFFF612D8BA7A66BED957F09FE5D77
    SHA-512:DE5C5CFDDD0C449EBBE60EEC06DF8EDE32C15ABFC384C150174F559182390BE1601E8E17AA543E72A132F3FFF9816CF89703ECE12CB96B30810842B53C2E29BB
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.9.0.2.9.7.7.5.9.9.6.0.2.7.7.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.9.0.2.9.7.7.6.1.0.0.7.1.4.7.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.8.8.7.2.6.a.9.-.3.d.6.4.-.4.e.6.b.-.b.2.b.e.-.0.0.1.5.6.1.4.7.d.f.8.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.6.8.3.2.9.4.-.2.f.8.e.-.4.1.5.a.-.8.a.d.0.-.d.c.a.b.3.d.2.c.3.7.b.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.4.5.8.2.4.0.8.3.7.a.1.2.b.c.1.1.d.2.7.2.7.5.f.9.4.c.d.e.d.5.7.b.8.8.a.d.f.7.3.2.5.8.7.2.0.5.6.3.e.4.5.6.5.3.2.1.5.2.7.c.1.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.i.g.r.a.t.o.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.2.c.-.0.0.0.1.-.0.0.1.8.-.9.9.8.7.-.7.f.7.4.0.c.b.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.0.4.0.b.3.c.d.6.c.b.7.5.6.f.c.c.4.2.c.a.9.c.a.4.c.b.c.b.2.c.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8592
    Entropy (8bit):3.708374851449056
    Encrypted:false
    SSDEEP:192:R6l7wVeJBp6wGXUig6YKdSUcgmfZuRprB89btisfzvm:R6lXJP6nXfg6YwSUcgmf8Cthfi
    MD5:5C75101166CF7C7930701ED9EA5742E6
    SHA1:2D2AED8F137B8268FD66A913AFB65994215537C3
    SHA-256:350C12408CD9F629FCA58B1E0B10B02F9334D181210BC43E200FA5AB7DEE6DAC
    SHA-512:D1DF7AAF8A2AF99B1B732F763000D079A04269E42FFE01BB4BB0776290B59E6D3ADC84FA227AA69C610B64470116BDDA6ADB90279007961221D42B1CB95758BA
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.5.6.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):5003
    Entropy (8bit):4.607989634739078
    Encrypted:false
    SSDEEP:48:cvIwWl8zsGJg77aI9J2WpW8VYfYm8M4JSalTJFf+q8vpe8aXwaX6d:uIjfcI7rX7VTJSal3K08aXwaX6d
    MD5:610E9B64D7669BF97D1901002DA47605
    SHA1:2A00D6283211CFC882E3B70E214766AF67B4ED39
    SHA-256:A3DEA321A9D5B1BE99F020CD9017979FA86EC73FF5869E2C2232D6064737B685
    SHA-512:CF10B2914E270565BF616D817C5A7C47D985DDB76CF90096062258AFE85EEAA6DB5629BD93E16C4BFE183B0B348FEA39B6800A0FEAF02303BD6553D218B6C9D6
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="825012" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 15 streams, Mon Apr 28 07:09:20 2025, 0x1205a4 type
    Category:dropped
    Size (bytes):180564
    Entropy (8bit):3.9266491360129465
    Encrypted:false
    SSDEEP:1536:zIqVDrLBhXx+luJ8vLTg4SVXJopHAkQqFKCDbtTFe15G85h96ix1uBojRypN4uEg:BV9elTvLTg4y5aRzxBeycdxDU4uEqrE
    MD5:17653407E8D0C260CBB4198495CF3FDF
    SHA1:C7242C9E1BEB975AD0C2F4F825D5AB674A01D503
    SHA-256:2D24AA8DB8EC455D651406A3AD526DF8CC4350D34BF61DEAB23049BF9A968043
    SHA-512:D55EB9386FF58DABB7E5F81F96B916210FF4FF1D6A452E5FB900B4253FC2DC6FF5B09A42F7635C5EDA3F91CC5C991360E7B7FEA70A7F98DEF26128593DC47331
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........).h....................................$...T............;..........`.......8...........T...........()..,...........x...........d...............................................................................eJ..............GenuineIntel............T.......,....).h.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.397879923969531
    Encrypted:false
    SSDEEP:6144:1l4fiJoH0ncNXiUjt10qiG/gaocYGBoaUMMhA2NX4WABlquNvgOBSqa:L4vFiMYQUMM6VFNtgU
    MD5:8FAFF7C6D8CC9D343785A65986517B36
    SHA1:CD15FA2509145E4A1556E7BFF23A6E52054DF675
    SHA-256:32BF1CD0018EC5F0050A57DD983F6FF0D85D78ECB864031E7DED630C3478BD6F
    SHA-512:93DA66699BD4C3F0C98651BC58F23596C2EDC8D1C34B944DCFFD705226398BE2E8387258DCDED12BDFC0FB322E084768F7A48150134AD8E8CAA323C9932A6E55
    Malicious:false
    Reputation:low
    Preview:regfJ...J....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...v...................................................................................................................................................................................................................................................................................................................................................B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
    File Type:ASCII text, with CRLF, LF line terminators
    Category:dropped
    Size (bytes):600
    Entropy (8bit):4.991981551018042
    Encrypted:false
    SSDEEP:12:fhpwzwZYeVKTjcSKu+jKu/G8drPO8BTCi51ce:ppAwZYeV3vu+OubrPO8oiPce
    MD5:162CABF8F2CE5DC02F73ADA86D838F76
    SHA1:07909BA6C1D3089C374C61BF0E4D635C13C1B6F5
    SHA-256:25263139458BC1FDB09AEDC2659151ED1F526D264DDF3E3A879476086C321322
    SHA-512:3E18F0F08BE9FBEC793AC6FBE071629BBE3F3EA0866EC62C4F70E8D95D74099F32FFC6012DDE8D3EC67AA25327A857E355378F764509E239CD1FA11EF5DA4D5C
    Malicious:false
    Reputation:low
    Preview:.Unhandled Exception: System.IO.DirectoryNotFoundException: Could not find a part of the path 'C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ScheduledJobs'... at System.IO.__Error.WinIOError(Int32 errorCode, String maybeFullPath).. at System.IO.FileSystemEnumerableIterator`1.CommonInit().. at System.IO.FileSystemEnumerableIterator`1..ctor(String path, String originalUserPath, String searchPattern, SearchOption searchOption, SearchResultHandler`1 resultHandler, Boolean checkHost).. at System.IO.Directory.GetDirectories(String path).. at Migrator.Program.Main(String[] args).
    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):4.400738155486314
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
    File size:5'632 bytes
    MD5:86484e736db019bcfe73f6207e54de45
    SHA1:5d4e4034d8f696c0a2df223cfe783f8a49d6aec2
    SHA256:4834fbf15b384b95c93e0c7f59dccbf930fc97b85c0b8c92af5c6ef6b6ecab70
    SHA512:f4cce4657a942c0c3d5431924eb48aafa34fa6482cce72b14fc879aa6b5757ec417cc7fc2fbd53ba9ab5e3d5cc22bfc081258ec971c6155663169b65e12816f1
    SSDEEP:96:qdwxQyIdJ9Q55+BPm8fVe1J8uRswWDzNt:uxJ9A5om8fVe1J8uGwWF
    TLSH:FCC1C50053D49B3AFA7F4B739CA357402274F751E817AB5E19C8621B3D263684E13B31
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..............+... ...@....@.. ....................................`................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x402b06
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0xF184067F [Mon May 26 16:51:11 2098 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2ab10x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x5ac.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x2a1c0x38.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000xb0c0xc00988ac5d57890e0ddad1614ae55ee8c11False0.5413411458333334data5.08291425174072IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x40000x5ac0x600fb84e3b5cb71d47ae75b4dc8ab7c1361False0.4147135416666667data4.055314398061827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x60000xc0x200828ce7ac1e5e282996af0b0284cdf72cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x40900x31cdata0.4271356783919598
    RT_MANIFEST0x43bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
    DLLImport
    mscoree.dll_CorExeMain
    DescriptionData
    Translation0x0000 0x04b0
    Comments
    CompanyName
    FileDescriptionMigrator
    FileVersion1.0.0.0
    InternalNameMigrator.exe
    LegalCopyrightCopyright 2024
    LegalTrademarks
    OriginalFilenameMigrator.exe
    ProductNameMigrator
    ProductVersion1.0.0.0
    Assembly Version1.0.0.0
    No network behavior found
    Target ID:0
    Start time:03:09:17
    Start date:28/04/2025
    Path:C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe"
    Imagebase:0x170000
    File size:5'632 bytes
    MD5 hash:86484E736DB019BCFE73F6207E54DE45
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:03:09:17
    Start date:28/04/2025
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff74be10000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:03:09:19
    Start date:28/04/2025
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 1044
    Imagebase:0x550000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Executed Functions

    Memory Dump Source
    • Source File: 00000000.00000002.977131031.0000000000890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_890000_17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f49.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b2f53297085ac9cc8521b98048459ea6154f97e851340069b334ad7b9e9ec59f
    • Instruction ID: fdb04bd8469708bc0ee034781bbe9f38ba48eac966c6284f8799be07bbf4926c
    • Opcode Fuzzy Hash: b2f53297085ac9cc8521b98048459ea6154f97e851340069b334ad7b9e9ec59f
    • Instruction Fuzzy Hash: B151B371E052588FDB19CFAAC85069DBFF2AF89300F19C16AD848EB266DB345846CF51
    Memory Dump Source
    • Source File: 00000000.00000002.977131031.0000000000890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_890000_17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f49.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0d44c95c20a11210d54ac5f213e8ac985a5a3dade2bc84ca1bde0fd7d41c80c1
    • Instruction ID: 0028cbe082acd968ab330b0527f3b8c9ec29f3d3d5d9a580981d29886fa765b1
    • Opcode Fuzzy Hash: 0d44c95c20a11210d54ac5f213e8ac985a5a3dade2bc84ca1bde0fd7d41c80c1
    • Instruction Fuzzy Hash: 0CD1AF74E01218CFDB54DFA9C984A9EBBF2FF89310F15D1A9D818AB215DB309981CF51
    Memory Dump Source
    • Source File: 00000000.00000002.977131031.0000000000890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00890000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_890000_17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f49.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a878bd3c922dfeffc47eedd2cf19d332145ef01218cc737cb7b099c947be3262
    • Instruction ID: 4e90eea780e667431b89bea56ff051e2cb2f22bdd6dfd639f66a8d320571fd5d
    • Opcode Fuzzy Hash: a878bd3c922dfeffc47eedd2cf19d332145ef01218cc737cb7b099c947be3262
    • Instruction Fuzzy Hash: 3A119378E012188FDB50DFA8C990A9DBBF1FF49310F2591A9D409E7315D730A985CF54