Windows
Analysis Report
17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe
Overview
General Information
Sample name: | 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe |
Analysis ID: | 1676014 |
MD5: | 86484e736db019bcfe73f6207e54de45 |
SHA1: | 5d4e4034d8f696c0a2df223cfe783f8a49d6aec2 |
SHA256: | 4834fbf15b384b95c93e0c7f59dccbf930fc97b85c0b8c92af5c6ef6b6ecab70 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 4 |
Range: | 0 - 100 |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe (PID: 6956 cmdline:
"C:\Users\ user\Deskt op\1745824 0837a12bc1 1d27275f94 cded57b88a df73258720 563e456532 1527c12289 f4940e9970 .dat-decod ed.exe" MD5: 86484E736DB019BCFE73F6207E54DE45) conhost.exe (PID: 6960 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) WerFault.exe (PID: 2796 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 956 -s 104 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00890848 | |
Source: | Code function: | 0_2_00890425 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 2 Virtualization/Sandbox Evasion | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Timestomp | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
3% | ReversingLabs |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1676014 |
Start date and time: | 2025-04-28 09:08:16 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe |
Detection: | CLEAN |
Classification: | clean4.winEXE@3/6@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, sppsvc.exe, WerFau lt.exe, SIHClient.exe, SgrmBro ker.exe, conhost.exe, svchost. exe - Excluded IPs from analysis (wh
itelisted): 52.168.117.173, 20 .190.190.196, 52.149.20.212, 6 9.192.44.226 - Excluded domains from analysis
(whitelisted): onedsblobprdeu s16.eastus.cloudapp.azure.com, fs.microsoft.com, login.live. com, slscr.update.microsoft.co m, blobcollector.events.data.t rafficmanager.net, ctldl.windo wsupdate.com, umwatson.events. data.microsoft.com, c.pki.goog , fe3cr.delivery.mp.microsoft. com - Execution Graph export aborted
for target 17458240837a12bc11 d27275f94cded57b88adf732587205 63e4565321527c12289f4940e9970. dat-decoded.exe, PID 6956 beca use it is empty - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
03:09:23 | API Interceptor |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0150804366298902 |
Encrypted: | false |
SSDEEP: | 192:p+P2EAUJMb0BU/HviaOsUzuiFoZ24IO800:cPpTJzBU/KaEzuiFoY4IO83 |
MD5: | A4327B9A7CCF754DE1F6878E1CFAD545 |
SHA1: | F36D3B0C0C527C9E09DA4830EA0EC987414AC7C2 |
SHA-256: | 36D4C4AF383132020DF520A23643D5977CBFFF612D8BA7A66BED957F09FE5D77 |
SHA-512: | DE5C5CFDDD0C449EBBE60EEC06DF8EDE32C15ABFC384C150174F559182390BE1601E8E17AA543E72A132F3FFF9816CF89703ECE12CB96B30810842B53C2E29BB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8592 |
Entropy (8bit): | 3.708374851449056 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJBp6wGXUig6YKdSUcgmfZuRprB89btisfzvm:R6lXJP6nXfg6YwSUcgmf8Cthfi |
MD5: | 5C75101166CF7C7930701ED9EA5742E6 |
SHA1: | 2D2AED8F137B8268FD66A913AFB65994215537C3 |
SHA-256: | 350C12408CD9F629FCA58B1E0B10B02F9334D181210BC43E200FA5AB7DEE6DAC |
SHA-512: | D1DF7AAF8A2AF99B1B732F763000D079A04269E42FFE01BB4BB0776290B59E6D3ADC84FA227AA69C610B64470116BDDA6ADB90279007961221D42B1CB95758BA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5003 |
Entropy (8bit): | 4.607989634739078 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsGJg77aI9J2WpW8VYfYm8M4JSalTJFf+q8vpe8aXwaX6d:uIjfcI7rX7VTJSal3K08aXwaX6d |
MD5: | 610E9B64D7669BF97D1901002DA47605 |
SHA1: | 2A00D6283211CFC882E3B70E214766AF67B4ED39 |
SHA-256: | A3DEA321A9D5B1BE99F020CD9017979FA86EC73FF5869E2C2232D6064737B685 |
SHA-512: | CF10B2914E270565BF616D817C5A7C47D985DDB76CF90096062258AFE85EEAA6DB5629BD93E16C4BFE183B0B348FEA39B6800A0FEAF02303BD6553D218B6C9D6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 180564 |
Entropy (8bit): | 3.9266491360129465 |
Encrypted: | false |
SSDEEP: | 1536:zIqVDrLBhXx+luJ8vLTg4SVXJopHAkQqFKCDbtTFe15G85h96ix1uBojRypN4uEg:BV9elTvLTg4y5aRzxBeycdxDU4uEqrE |
MD5: | 17653407E8D0C260CBB4198495CF3FDF |
SHA1: | C7242C9E1BEB975AD0C2F4F825D5AB674A01D503 |
SHA-256: | 2D24AA8DB8EC455D651406A3AD526DF8CC4350D34BF61DEAB23049BF9A968043 |
SHA-512: | D55EB9386FF58DABB7E5F81F96B916210FF4FF1D6A452E5FB900B4253FC2DC6FF5B09A42F7635C5EDA3F91CC5C991360E7B7FEA70A7F98DEF26128593DC47331 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.397879923969531 |
Encrypted: | false |
SSDEEP: | 6144:1l4fiJoH0ncNXiUjt10qiG/gaocYGBoaUMMhA2NX4WABlquNvgOBSqa:L4vFiMYQUMM6VFNtgU |
MD5: | 8FAFF7C6D8CC9D343785A65986517B36 |
SHA1: | CD15FA2509145E4A1556E7BFF23A6E52054DF675 |
SHA-256: | 32BF1CD0018EC5F0050A57DD983F6FF0D85D78ECB864031E7DED630C3478BD6F |
SHA-512: | 93DA66699BD4C3F0C98651BC58F23596C2EDC8D1C34B944DCFFD705226398BE2E8387258DCDED12BDFC0FB322E084768F7A48150134AD8E8CAA323C9932A6E55 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 600 |
Entropy (8bit): | 4.991981551018042 |
Encrypted: | false |
SSDEEP: | 12:fhpwzwZYeVKTjcSKu+jKu/G8drPO8BTCi51ce:ppAwZYeV3vu+OubrPO8oiPce |
MD5: | 162CABF8F2CE5DC02F73ADA86D838F76 |
SHA1: | 07909BA6C1D3089C374C61BF0E4D635C13C1B6F5 |
SHA-256: | 25263139458BC1FDB09AEDC2659151ED1F526D264DDF3E3A879476086C321322 |
SHA-512: | 3E18F0F08BE9FBEC793AC6FBE071629BBE3F3EA0866EC62C4F70E8D95D74099F32FFC6012DDE8D3EC67AA25327A857E355378F764509E239CD1FA11EF5DA4D5C |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 4.400738155486314 |
TrID: |
|
File name: | 17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe |
File size: | 5'632 bytes |
MD5: | 86484e736db019bcfe73f6207e54de45 |
SHA1: | 5d4e4034d8f696c0a2df223cfe783f8a49d6aec2 |
SHA256: | 4834fbf15b384b95c93e0c7f59dccbf930fc97b85c0b8c92af5c6ef6b6ecab70 |
SHA512: | f4cce4657a942c0c3d5431924eb48aafa34fa6482cce72b14fc879aa6b5757ec417cc7fc2fbd53ba9ab5e3d5cc22bfc081258ec971c6155663169b65e12816f1 |
SSDEEP: | 96:qdwxQyIdJ9Q55+BPm8fVe1J8uRswWDzNt:uxJ9A5om8fVe1J8uGwWF |
TLSH: | FCC1C50053D49B3AFA7F4B739CA357402274F751E817AB5E19C8621B3D263684E13B31 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..............+... ...@....@.. ....................................`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x402b06 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xF184067F [Mon May 26 16:51:11 2098 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2ab1 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4000 | 0x5ac | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x6000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x2a1c | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xb0c | 0xc00 | 988ac5d57890e0ddad1614ae55ee8c11 | False | 0.5413411458333334 | data | 5.08291425174072 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x4000 | 0x5ac | 0x600 | fb84e3b5cb71d47ae75b4dc8ab7c1361 | False | 0.4147135416666667 | data | 4.055314398061827 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x6000 | 0xc | 0x200 | 828ce7ac1e5e282996af0b0284cdf72c | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x4090 | 0x31c | data | 0.4271356783919598 | ||
RT_MANIFEST | 0x43bc | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
Comments | |
CompanyName | |
FileDescription | Migrator |
FileVersion | 1.0.0.0 |
InternalName | Migrator.exe |
LegalCopyright | Copyright 2024 |
LegalTrademarks | |
OriginalFilename | Migrator.exe |
ProductName | Migrator |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:09:17 |
Start date: | 28/04/2025 |
Path: | C:\Users\user\Desktop\17458240837a12bc11d27275f94cded57b88adf73258720563e4565321527c12289f4940e9970.dat-decoded.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x170000 |
File size: | 5'632 bytes |
MD5 hash: | 86484E736DB019BCFE73F6207E54DE45 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 03:09:17 |
Start date: | 28/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff74be10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:09:19 |
Start date: | 28/04/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x550000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|