Play interactive tourEdit tour

Analysis Report PAD.Console.Host.exe

Overview

General Information

Sample Name:PAD.Console.Host.exe
Analysis ID:371286
MD5:986b1583582c9066b383add3724b1a93
SHA1:ddac4618e14e025ce5b1f01bce1d44f54abd391e
SHA256:e32a092fef4c7fc1b9a1175fbb714ba52c16f530ad9a4636b7e90d3484905e23
Infos:

Most interesting Screenshot:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Binary contains a suspicious time stamp
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • PAD.Console.Host.exe (PID: 5856 cmdline: 'C:\Users\user\Desktop\PAD.Console.Host.exe' MD5: 986B1583582C9066B383ADD3724B1A93)
    • WerFault.exe (PID: 5316 cmdline: C:\Windows\system32\WerFault.exe -u -p 5856 -s 772 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: PAD.Console.Host.exeStatic PE information: certificate valid
Source: PAD.Console.Host.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Binary string: UxTheme.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb8 source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: WindowsBase.ni.pdbRSDS source: WEREC7.tmp.dmp.3.dr
Source: Binary string: clr.pdb source: WerFault.exe, 00000003.00000003.235670474.000001DCC33F9000.00000004.00000001.sdmp
Source: Binary string: System.ni.pdb0 source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: gdi32.pdb8 source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.pdb8 source: WerFault.exe, 00000003.00000003.239373058.000001DCC3DE0000.00000004.00000001.sdmp
Source: Binary string: System.Xaml.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: kernel32.pdb source: WerFault.exe, 00000003.00000003.236034318.000001DCC337D000.00000004.00000001.sdmp
Source: Binary string: msvcrt.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: ntdll.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: win32u.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: ntdll.pdb0 source: WerFault.exe, 00000003.00000003.236720544.000001DCC3371000.00000004.00000001.sdmp
Source: Binary string: mscoree.pdb source: WerFault.exe, 00000003.00000003.235595906.000001DCC3377000.00000004.00000001.sdmp
Source: Binary string: imm32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: kernelbase.pdb0 source: WerFault.exe, 00000003.00000003.236381058.000001DCC3383000.00000004.00000001.sdmp
Source: Binary string: WindowsBase.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: kernelbase.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: PresentationCore.ni.pdbT source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.pdbPo22 source: WEREC7.tmp.dmp.3.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WEREC7.tmp.dmp.3.dr
Source: Binary string: D:\a\1\s\src\WinAutomation.Console.Host\obj\AnyCPU\Release\PAD.Console.Host.pdb source: PAD.Console.Host.exe
Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000003.00000003.239396367.000001DCC3DE6000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: DWrite.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationCore.ni.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: combase.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS] source: WEREC7.tmp.dmp.3.dr
Source: Binary string: kernel32.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: kernelbase.pdb source: WerFault.exe, 00000003.00000003.236381058.000001DCC3383000.00000004.00000001.sdmp
Source: Binary string: msvcp120_clr0400.amd64.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: kernel32.pdb0 source: WerFault.exe, 00000003.00000003.236034318.000001DCC337D000.00000004.00000001.sdmp
Source: Binary string: PAD.Console.Host.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdbRSDSD source: WEREC7.tmp.dmp.3.dr
Source: Binary string: rpcrt4.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: mscorlib.pdb| source: WerFault.exe, 00000003.00000003.239396367.000001DCC3DE6000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: PresentationNative_v0400.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.ni.pdb, source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: combase.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: .pdb% source: WerFault.exe, 00000003.00000002.245494035.000001DCC1688000.00000004.00000020.sdmp
Source: Binary string: PAD.Console.Host.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: WindowsBase.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: sechost.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.Core.ni.pdb0 source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: rpcrt4.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\PAD.Console.Host.pdba source: PAD.Console.Host.exe, 00000000.00000002.248478672.0000019532370000.00000004.00000020.sdmp
Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: se.pdb source: WerFault.exe, 00000003.00000002.245494035.000001DCC1688000.00000004.00000020.sdmp
Source: Binary string: gdi32full.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: diasymreader.pdbz source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationCore.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\symbols\exe\PAD.Console.Host.pdb source: PAD.Console.Host.exe, 00000000.00000002.248478672.0000019532370000.00000004.00000020.sdmp
Source: Binary string: mscoreei.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: gdi32.pdb source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: msvcr120_clr0400.amd64.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb8 source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: mscorlib.pdb@q source: WEREC7.tmp.dmp.3.dr
Source: Binary string: mscoreei.pdb0 source: WerFault.exe, 00000003.00000003.235641497.000001DCC33A7000.00000004.00000001.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.ni.pdbRSDS source: WEREC7.tmp.dmp.3.dr
Source: Binary string: clrjit.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: mscoree.pdb0 source: WerFault.exe, 00000003.00000003.235595906.000001DCC3377000.00000004.00000001.sdmp
Source: Binary string: version.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: mscoree.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: clr.pdb0 source: WerFault.exe, 00000003.00000003.235670474.000001DCC33F9000.00000004.00000001.sdmp
Source: Binary string: user32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.ni.pdbRSDS~J source: WEREC7.tmp.dmp.3.dr
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: PAD.Console.Host.pdb< source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: System.Xaml.ni.pdbRSDS| source: WEREC7.tmp.dmp.3.dr
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000003.00000003.235641497.000001DCC33A7000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: wpfgfx_v0400.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: System.Xaml.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: ntdll.pdb source: WerFault.exe, 00000003.00000003.236720544.000001DCC3371000.00000004.00000001.sdmp
Source: Binary string: System.Core.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: System.Xaml.pdb0Toq source: WEREC7.tmp.dmp.3.dr
Source: Binary string: System.ni.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: PAD.Console.Host.exeString found in binary or memory: http://metro.mahapps.com/winfx/xaml/controls
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
Source: WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5856 -s 772
Source: PAD.Console.Host.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: PAD.Console.Host.exe, 00000000.00000002.249601389.000001954C6B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PAD.Console.Host.exe
Source: PAD.Console.Host.exe, 00000000.00000002.248320990.000001953230D000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PAD.Console.Host.exe
Source: PAD.Console.Host.exe, 00000000.00000002.248838933.00000195325C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PAD.Console.Host.exe
Source: classification engineClassification label: sus23.winEXE@2/4@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5856
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC7.tmpJump to behavior
Source: PAD.Console.Host.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PAD.Console.Host.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeFile read: C:\Users\user\Desktop\PAD.Console.Host.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\PAD.Console.Host.exe 'C:\Users\user\Desktop\PAD.Console.Host.exe'
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5856 -s 772
Source: C:\Users\user\Desktop\PAD.Console.Host.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: PAD.Console.Host.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: PAD.Console.Host.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: PAD.Console.Host.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: PAD.Console.Host.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: UxTheme.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb8 source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: WindowsBase.ni.pdbRSDS source: WEREC7.tmp.dmp.3.dr
Source: Binary string: clr.pdb source: WerFault.exe, 00000003.00000003.235670474.000001DCC33F9000.00000004.00000001.sdmp
Source: Binary string: System.ni.pdb0 source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: gdi32.pdb8 source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.pdb8 source: WerFault.exe, 00000003.00000003.239373058.000001DCC3DE0000.00000004.00000001.sdmp
Source: Binary string: System.Xaml.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: kernel32.pdb source: WerFault.exe, 00000003.00000003.236034318.000001DCC337D000.00000004.00000001.sdmp
Source: Binary string: msvcrt.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: ntdll.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: win32u.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: ntdll.pdb0 source: WerFault.exe, 00000003.00000003.236720544.000001DCC3371000.00000004.00000001.sdmp
Source: Binary string: mscoree.pdb source: WerFault.exe, 00000003.00000003.235595906.000001DCC3377000.00000004.00000001.sdmp
Source: Binary string: imm32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: kernelbase.pdb0 source: WerFault.exe, 00000003.00000003.236381058.000001DCC3383000.00000004.00000001.sdmp
Source: Binary string: WindowsBase.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: kernelbase.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: PresentationCore.ni.pdbT source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.pdbPo22 source: WEREC7.tmp.dmp.3.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WEREC7.tmp.dmp.3.dr
Source: Binary string: D:\a\1\s\src\WinAutomation.Console.Host\obj\AnyCPU\Release\PAD.Console.Host.pdb source: PAD.Console.Host.exe
Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000003.00000003.239396367.000001DCC3DE6000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: DWrite.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationCore.ni.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: combase.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS] source: WEREC7.tmp.dmp.3.dr
Source: Binary string: kernel32.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: kernelbase.pdb source: WerFault.exe, 00000003.00000003.236381058.000001DCC3383000.00000004.00000001.sdmp
Source: Binary string: msvcp120_clr0400.amd64.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: kernel32.pdb0 source: WerFault.exe, 00000003.00000003.236034318.000001DCC337D000.00000004.00000001.sdmp
Source: Binary string: PAD.Console.Host.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdbRSDSD source: WEREC7.tmp.dmp.3.dr
Source: Binary string: rpcrt4.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: mscorlib.pdb| source: WerFault.exe, 00000003.00000003.239396367.000001DCC3DE6000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: PresentationNative_v0400.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.ni.pdb, source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: combase.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: .pdb% source: WerFault.exe, 00000003.00000002.245494035.000001DCC1688000.00000004.00000020.sdmp
Source: Binary string: PAD.Console.Host.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: WindowsBase.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: sechost.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.Core.ni.pdb0 source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: rpcrt4.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\PAD.Console.Host.pdba source: PAD.Console.Host.exe, 00000000.00000002.248478672.0000019532370000.00000004.00000020.sdmp
Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: se.pdb source: WerFault.exe, 00000003.00000002.245494035.000001DCC1688000.00000004.00000020.sdmp
Source: Binary string: gdi32full.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: diasymreader.pdbz source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationCore.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\symbols\exe\PAD.Console.Host.pdb source: PAD.Console.Host.exe, 00000000.00000002.248478672.0000019532370000.00000004.00000020.sdmp
Source: Binary string: mscoreei.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: gdi32.pdb source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: msvcr120_clr0400.amd64.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb8 source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: mscorlib.pdb@q source: WEREC7.tmp.dmp.3.dr
Source: Binary string: mscoreei.pdb0 source: WerFault.exe, 00000003.00000003.235641497.000001DCC33A7000.00000004.00000001.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.ni.pdbRSDS source: WEREC7.tmp.dmp.3.dr
Source: Binary string: clrjit.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: mscoree.pdb0 source: WerFault.exe, 00000003.00000003.235595906.000001DCC3377000.00000004.00000001.sdmp
Source: Binary string: version.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: mscoree.pdb8 source: WerFault.exe, 00000003.00000003.239383257.000001DCC3DD1000.00000004.00000040.sdmp
Source: Binary string: System.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: clr.pdb0 source: WerFault.exe, 00000003.00000003.235670474.000001DCC33F9000.00000004.00000001.sdmp
Source: Binary string: user32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: PresentationFramework.ni.pdbRSDS~J source: WEREC7.tmp.dmp.3.dr
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000003.00000003.239450850.000001DCC3DD0000.00000004.00000040.sdmp
Source: Binary string: PAD.Console.Host.pdb< source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp
Source: Binary string: System.Xaml.ni.pdbRSDS| source: WEREC7.tmp.dmp.3.dr
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000003.00000003.235641497.000001DCC33A7000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.239426915.000001DCC3DD5000.00000004.00000040.sdmp
Source: Binary string: wpfgfx_v0400.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: System.Xaml.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: ntdll.pdb source: WerFault.exe, 00000003.00000003.236720544.000001DCC3371000.00000004.00000001.sdmp
Source: Binary string: System.Core.pdb source: WerFault.exe, 00000003.00000002.247017137.000001DCC40C0000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr
Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000003.00000003.239432363.000001DCC3DD8000.00000004.00000040.sdmp
Source: Binary string: System.Xaml.pdb0Toq source: WEREC7.tmp.dmp.3.dr
Source: Binary string: System.ni.pdb source: WerFault.exe, 00000003.00000003.239418733.000001DCC3E13000.00000004.00000001.sdmp, WEREC7.tmp.dmp.3.dr

Data Obfuscation:

barindex
Binary contains a suspicious time stamp
Source: initial sampleStatic PE information: 0xB0A82132 [Sun Dec 2 08:09:22 2063 UTC]
Source: C:\Windows\System32\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: WerFault.exe, 00000003.00000002.246285694.000001DCC3460000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW`N?
Source: PAD.Console.Host.exe, 00000000.00000002.249601389.000001954C6B0000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.246756275.000001DCC3F60000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: WerFault.exe, 00000003.00000002.246255526.000001DCC33F0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: PAD.Console.Host.exe, 00000000.00000002.249601389.000001954C6B0000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.246756275.000001DCC3F60000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: PAD.Console.Host.exe, 00000000.00000002.249601389.000001954C6B0000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.246756275.000001DCC3F60000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000003.00000002.246255526.000001DCC33F0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW_
Source: PAD.Console.Host.exe, 00000000.00000002.249601389.000001954C6B0000.00000002.00000001.sdmp, WerFault.exe, 00000003.00000002.246756275.000001DCC3F60000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeQueries volume information: C:\Users\user\Desktop\PAD.Console.Host.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PAD.Console.Host.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Timestomp1NTDSSystem Information Discovery12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 371286 Sample: PAD.Console.Host.exe Startdate: 18/03/2021 Architecture: WINDOWS Score: 23 10 Binary contains a suspicious time stamp 2->10 6 PAD.Console.Host.exe 2->6         started        process3 process4 8 WerFault.exe 20 9 6->8         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
PAD.Console.Host.exe0%VirustotalBrowse
PAD.Console.Host.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://metro.mahapps.com/winfx/xaml/controls0%VirustotalBrowse
http://metro.mahapps.com/winfx/xaml/controls0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
    high
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
      high
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.oWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.oWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphoneWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephoneWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovinceWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                      high
                      http://metro.mahapps.com/winfx/xaml/controlsPAD.Console.Host.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationWerFault.exe, 00000003.00000003.238500946.000001DCC4100000.00000004.00000001.sdmpfalse
                              high
                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:371286
                              Start date:18.03.2021
                              Start time:15:34:30
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 5m 50s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:PAD.Console.Host.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:25
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:SUS
                              Classification:sus23.winEXE@2/4@0/0
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 36.6% (good quality ratio 31.7%)
                              • Quality average: 60.5%
                              • Quality standard deviation: 29.6%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 4
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 104.43.193.48, 20.50.102.62, 52.147.198.201, 23.211.6.115, 104.42.151.234, 23.210.248.85, 168.61.161.212, 51.103.5.186, 92.122.213.247, 92.122.213.194, 20.54.26.129, 51.104.139.180
                              • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus17.cloudapp.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                              • Execution Graph export aborted for target PAD.Console.Host.exe, PID 5856 because it is empty
                              • Report size getting too big, too many NtSetInformationFile calls found.
                              TimeTypeDescription
                              15:35:28API Interceptor1x Sleep call for process: WerFault.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_PAD.Console.Host_9ec855389ca69f49c05f38a6ebe0d67763a569_91cfef93_148c1c44\Report.wer
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):13526
                              Entropy (8bit):3.7795341765126143
                              Encrypted:false
                              SSDEEP:192:4U/JA/BEFo4HRHEDNQPa1v5Vlbk/u7sJS274ltbfo7:TCEWgRHEDmalZg/u7sJX4ltbo7
                              MD5:F2D816F02524E56E564762DADEEB0BDA
                              SHA1:29D47A83D6629EF47B0CB11C277AFD514F804E8F
                              SHA-256:95DC7AF3E7A8DB1EE92C9B0E127585B88A190A996C8238CA35BF8C880CB39B75
                              SHA-512:E9F73A13FD7F4B2C03A436871174A99D4693534EE141FD53AC7C70D9E0027CBA66A1F1EB933E5DD3B040EF8CFE3D76DFF1726107F567D085FC70F702C0AD2129
                              Malicious:false
                              Reputation:low
                              Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.0.5.8.0.5.2.4.8.0.0.7.8.6.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.0.5.8.0.5.2.6.7.5.3.9.0.8.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.d.2.5.8.6.6.-.e.f.6.5.-.4.0.e.6.-.8.5.9.6.-.b.3.2.b.4.b.4.d.0.8.d.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.2.f.3.3.3.8.f.-.7.8.7.d.-.4.8.7.5.-.8.d.5.f.-.c.2.9.b.6.5.1.b.8.c.7.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.P.A.D...C.o.n.s.o.l.e...H.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.A.D...C.o.n.s.o.l.e...H.o.s.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.e.0.-.0.0.0.1.-.0.0.1.6.-.0.f.6.c.-.4.6.f.a.4.6.1.c.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.b.f.c.9.2.8.8.1.8.d.d.c.9.d.3.4.b.5.d.d.6.6.a.2.6.f.b.6.7.3.f.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.a.c.4.6.1.8.e.1.4.e.0.2.5.c.e.5.b.1.f.0.1.b.c.e.1.d.4.4.f.5.4.a.
                              C:\ProgramData\Microsoft\Windows\WER\Temp\WER1281.tmp.WERInternalMetadata.xml
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8564
                              Entropy (8bit):3.702603363160761
                              Encrypted:false
                              SSDEEP:192:Rrl7r3GLNiscimg6YIi6avgmfjs4aSIzCpr389boIyf0P4m:RrlsNigX6Yd6avgmf44aSIDodfM
                              MD5:C3C6A07EF2EAD4E5B0A582704636712C
                              SHA1:9D76DEACF3C72CB38FA527CC7A2B28C6CD7BD775
                              SHA-256:5ED4745A149D2F1E6C3EC992C29E3B77DC571FEA28EB1B1E855D84ABC953D778
                              SHA-512:E254C2659BEFD70A2CE7E13036B0725C847F42B647C02C8A6D71256A94B9A9AF1A3D9A3873921AC70C7D6D6D546F19A1229C9F12997E052B6C9E88490B47FBDC
                              Malicious:false
                              Reputation:low
                              Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.5.6.<./.P.i.d.>.......
                              C:\ProgramData\Microsoft\Windows\WER\Temp\WER134D.tmp.xml
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4747
                              Entropy (8bit):4.5091373071172685
                              Encrypted:false
                              SSDEEP:48:cvIwSD8zsKJgtBI9thWSC8Ba8fm8M4JwWFUNFvgyq85TzUbdeYWVwqd:uITfYXwSNxJw0pbMYWVDd
                              MD5:223336D8D50791C04692B28B4E6901B5
                              SHA1:A48C014F322DFE1BAE4F46DB6BAF0EB32770E780
                              SHA-256:F6CB8DEFAFDE7C89C05640128125E8BAD1AE7D836E085738E04B51E6DDCA58C5
                              SHA-512:B18507B18D7FC41A72E91080C54DA939496A1B950DC0EA9A77A516E7D3FE3C2E75075C2375498DE4E5A02923837D72CD45888AF7E4D02378BC7717DD7037D815
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="907666" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                              C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC7.tmp.dmp
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Mini DuMP crash report, 15 streams, Thu Mar 18 22:35:25 2021, 0x1205a4 type
                              Category:dropped
                              Size (bytes):346984
                              Entropy (8bit):3.5763634691253894
                              Encrypted:false
                              SSDEEP:3072:Fq1gVZVEeVtWKsaMQhv5kM4CUNXT0F0+1jcqPZkl9cbrgxQHOFmXUGgkANTfu5XP:o/tZ68iPZdzuIEk/
                              MD5:E4846A9F2D06834A82CBCC97E258A379
                              SHA1:0431B76386A34F181D4B71661374DF9730B178B4
                              SHA-256:AD571A388DA3F6D0E5E06B28AD8711D967FA8BAC8683AEFE6555005B08B10205
                              SHA-512:7FBC44DDF5C15787D3DCF4C905CB78264597C7EE3108BC43DBA9AA89C328CBD1433D0FEE2A4EA62351DB7D8D74E505F34849BBA107D34CDE9CFDA1CB90644CD1
                              Malicious:false
                              Reputation:low
                              Preview: MDMP....... .........S`...................U...........B....... ......Lw......................T.............S`.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...a.m.d.6.4.,.1.0...0...1.7.1.3.4...1.......................................................................................................

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):5.4351279854112216
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              • Win32 Executable (generic) a (10002005/4) 49.97%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:PAD.Console.Host.exe
                              File size:402824
                              MD5:986b1583582c9066b383add3724b1a93
                              SHA1:ddac4618e14e025ce5b1f01bce1d44f54abd391e
                              SHA256:e32a092fef4c7fc1b9a1175fbb714ba52c16f530ad9a4636b7e90d3484905e23
                              SHA512:07917046b9df3557179fadfabe90dcf0351172793365024396df185b44fcfb61c28dddcf87dd09733b1e65fa0a6106a16c19213195819c145628f59febecca34
                              SSDEEP:6144:aSj0ICwwj1hMd2UOkd/lD+XMfdnKFX739m5m:f521kdoXMfdnKFjYI
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2!............"...0.................. ... ....@.. .......................@......MH....`................................

                              File Icon

                              Icon Hash:69e6c08088c662b9

                              General

                              Entrypoint:0x411f12
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                              Time Stamp:0xB0A82132 [Sun Dec 2 08:09:22 2063 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Signature Valid:true
                              Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                              Signature Validation Error:The operation completed successfully
                              Error Number:0
                              Not Before, Not After
                              • 12/15/2020 1:31:45 PM 12/2/2021 1:31:45 PM
                              Subject Chain
                              • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                              Version:3
                              Thumbprint MD5:658DCC2A890351DF97DC9F05146283C0
                              Thumbprint SHA-1:ABDCA79AF9DD48A0EA702AD45260B3C03093FB4B
                              Thumbprint SHA-256:E39CC80A0DF6F2BED821D11B49717306138C1D19FD20190336BF1C4297638A79
                              Serial:33000001DF6BF02E92A74AB4D00000000001DF
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x11ec00x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x4fdf4.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x602000x2388
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x620000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x11e200x38.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xff180x10000False0.392715454102data6.07419741486IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x120000x4fdf40x4fe00False0.226272129304data4.96384044067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x620000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x122000x468GLS_BINARY_LSB_FIRST
                              RT_ICON0x126780x988data
                              RT_ICON0x130100x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                              RT_ICON0x140c80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                              RT_ICON0x166800x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                              RT_ICON0x1a8b80x94a8data
                              RT_ICON0x23d700x10828dBase III DBT, version number 0, next free block index 40
                              RT_ICON0x345a80x25228dBase IV DBT of \200\001.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4280973550, next used block 4281039343
                              RT_ICON0x597e00x7f7ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                              RT_GROUP_ICON0x617700x84data
                              RT_VERSION0x618040x3f0SysEx File - OctavePlateau
                              RT_MANIFEST0x61c040x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright (C) Microsoft Corporation. All rights reserved.
                              Assembly Version2.6.158.21069
                              InternalNamePAD.Console.Host.exe
                              FileVersion2.6.158.21069
                              CompanyNameMicrosoft
                              CommentsPAD.Console.Host
                              ProductNamePower Automate Desktop
                              ProductVersion2.6.00158.21069
                              FileDescriptionPower Automate Desktop
                              OriginalFilenamePAD.Console.Host.exe

                              Network Behavior

                              Download Network PCAP: filteredfull

                              TimestampSource PortDest PortSource IPDest IP
                              Mar 18, 2021 15:35:13.449748039 CET53537848.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:13.554727077 CET6530753192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:13.604279041 CET53653078.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:14.167216063 CET6434453192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:14.221322060 CET53643448.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:14.293314934 CET6206053192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:14.345887899 CET53620608.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:14.415211916 CET6180553192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:14.488044977 CET53618058.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:15.380436897 CET5479553192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:15.434096098 CET53547958.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:16.355431080 CET4955753192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:16.407566071 CET53495578.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:17.372389078 CET6173353192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:17.421873093 CET53617338.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:17.485935926 CET6544753192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:17.545881987 CET53654478.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:18.417500019 CET5244153192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:18.468183041 CET53524418.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:19.561724901 CET6217653192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:19.619771957 CET53621768.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:20.544275045 CET5959653192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:20.605056047 CET53595968.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:21.518605947 CET6529653192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:21.571640968 CET53652968.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:22.765125990 CET6318353192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:22.815016031 CET53631838.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:28.103554010 CET6015153192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:28.161474943 CET53601518.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:37.870836020 CET5696953192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:37.920301914 CET53569698.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:39.223443985 CET5516153192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:39.285598993 CET53551618.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:39.907850981 CET5475753192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:39.957206011 CET53547578.8.8.8192.168.2.5
                              Mar 18, 2021 15:35:49.203974009 CET4999253192.168.2.58.8.8.8
                              Mar 18, 2021 15:35:49.253549099 CET53499928.8.8.8192.168.2.5
                              Mar 18, 2021 15:36:09.802470922 CET6007553192.168.2.58.8.8.8
                              Mar 18, 2021 15:36:09.860512972 CET53600758.8.8.8192.168.2.5
                              Mar 18, 2021 15:36:13.619652987 CET5501653192.168.2.58.8.8.8
                              Mar 18, 2021 15:36:13.670550108 CET53550168.8.8.8192.168.2.5
                              Mar 18, 2021 15:36:22.463787079 CET6434553192.168.2.58.8.8.8
                              Mar 18, 2021 15:36:22.527530909 CET53643458.8.8.8192.168.2.5
                              Mar 18, 2021 15:36:38.225544930 CET5712853192.168.2.58.8.8.8
                              Mar 18, 2021 15:36:38.286155939 CET53571288.8.8.8192.168.2.5
                              Mar 18, 2021 15:36:51.017592907 CET5479153192.168.2.58.8.8.8
                              Mar 18, 2021 15:36:51.070549011 CET53547918.8.8.8192.168.2.5
                              Mar 18, 2021 15:36:53.209806919 CET5046353192.168.2.58.8.8.8
                              Mar 18, 2021 15:36:53.282887936 CET53504638.8.8.8192.168.2.5

                              Code Manipulations

                              Statistics

                              CPU Usage

                              050100s020406080100

                              Click to jump to process

                              Memory Usage

                              050100s0.005101520MB

                              Click to jump to process

                              High Level Behavior Distribution

                              • File
                              • Registry

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              Start time:15:35:20
                              Start date:18/03/2021
                              Path:C:\Users\user\Desktop\PAD.Console.Host.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Users\user\Desktop\PAD.Console.Host.exe'
                              Imagebase:0x19532170000
                              File size:402824 bytes
                              MD5 hash:986B1583582C9066B383ADD3724B1A93
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low
                              Start time:15:35:22
                              Start date:18/03/2021
                              Path:C:\Windows\System32\WerFault.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\WerFault.exe -u -p 5856 -s 772
                              Imagebase:0x7ff7a1750000
                              File size:494488 bytes
                              MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:moderate

                              Disassembly

                              Code Analysis

                              Executed Functions

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.250294916.00007FFA1D920000.00000040.00000001.sdmp, Offset: 00007FFA1D920000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffa1d920000_PAD.jbxd
                              Similarity
                              • API ID:
                              • String ID: XOlu$XOlu
                              • API String ID: 0-1625184270
                              • Opcode ID: 95b1f81877615ecc88285f5721ac3ef2d721982610c52a8ff4d998855e7b2c1c
                              • Instruction ID: 5c265267f52ad041f9f6c7a15014ff639d2c3150ad9540e39c6ee6664240c0fd
                              • Opcode Fuzzy Hash: 95b1f81877615ecc88285f5721ac3ef2d721982610c52a8ff4d998855e7b2c1c
                              • Instruction Fuzzy Hash: AA028826A0CF9A0FE755A72C68425F93BD6EF97330B05817AE04CC7583FD18B8068B91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.250294916.00007FFA1D920000.00000040.00000001.sdmp, Offset: 00007FFA1D920000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffa1d920000_PAD.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a9c538a93eae2dd748a27436c2039140df76ef6f70cf3af59ff2b574f5fa9843
                              • Instruction ID: 128417a7e94457c8e42ccdac516f1e8c4ebca1abacadf632dcfd3ab4f327cbb8
                              • Opcode Fuzzy Hash: a9c538a93eae2dd748a27436c2039140df76ef6f70cf3af59ff2b574f5fa9843
                              • Instruction Fuzzy Hash: EF41841BA58A760BE711376DB4025FD6B45DFD3331B018136D14C894D3AE98A8CA4EBE
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.250294916.00007FFA1D920000.00000040.00000001.sdmp, Offset: 00007FFA1D920000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffa1d920000_PAD.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 354f01d8ce5ebb516876f539e010e8e95e4a66c324d938ff76434fa90d37b473
                              • Instruction ID: 222bcf3699fb506a58a0a8463958ec335e24dc8118719885dcb5b6b79917bb82
                              • Opcode Fuzzy Hash: 354f01d8ce5ebb516876f539e010e8e95e4a66c324d938ff76434fa90d37b473
                              • Instruction Fuzzy Hash: 67213A16D1DAA30BFB55736960035FE1A869F93330F068235E05C899E3BD8CB8840DAE
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.250294916.00007FFA1D920000.00000040.00000001.sdmp, Offset: 00007FFA1D920000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffa1d920000_PAD.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 04e746eee780099a747c8caf0122a4e744a56c821617e9797b6991c8324a2c36
                              • Instruction ID: e9744755852ec5e97982721529bbc40f53394f4e98925686db28ff71ffd61cfd
                              • Opcode Fuzzy Hash: 04e746eee780099a747c8caf0122a4e744a56c821617e9797b6991c8324a2c36
                              • Instruction Fuzzy Hash: DC014B6541E7C10FE34357748C665617FA4AF13220F4A85EBE4CCCA4E3E65C9689C763
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Non-executed Functions