Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ptEox2MzMA.exe

Overview

General Information

Sample name:ptEox2MzMA.exe
renamed because original name is a hash value
Original sample name:e7c1ce1a8a9f7b49365007a4b89a3876b3ecb648fccc26e177f168af3d365342.exe
Analysis ID:1501754
MD5:555b6132e962a96ef5608b3d60c6b1f2
SHA1:10ff5c1adbb2154de7715017cb11ea27c4bfa603
SHA256:e7c1ce1a8a9f7b49365007a4b89a3876b3ecb648fccc26e177f168af3d365342
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • ptEox2MzMA.exe (PID: 3884 cmdline: "C:\Users\user\Desktop\ptEox2MzMA.exe" MD5: 555B6132E962A96EF5608B3D60C6B1F2)
    • WerFault.exe (PID: 2196 cmdline: C:\Windows\system32\WerFault.exe -u -p 3884 -s 1044 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\ptEox2MzMA.exe, Initiated: true, ProcessId: 3884, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49717
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ptEox2MzMA.exeVirustotal: Detection: 13%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: ptEox2MzMA.exeJoe Sandbox ML: detected
Source: ptEox2MzMA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\verysafe\x64\Release\verysafe.pdb source: ptEox2MzMA.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 8888
Source: global trafficTCP traffic: 192.168.2.6:49717 -> 120.46.149.112:8888
Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D2641000 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,RtlAllocateHeap,memcpy,SleepEx,0_2_00007FF6D2641000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: ptEox2MzMA.exe, 00000000.00000002.2403653800.0000024CDE0EC000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE18A000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000003.2335675147.0000024CDE185000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000002.2403491852.0000009BC19EA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE198000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000003.2335675147.0000024CDE198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey(
Source: ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE198000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000003.2335675147.0000024CDE198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey9
Source: ptEox2MzMA.exe, 00000000.00000002.2403653800.0000024CDE0EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyD~q
Source: ptEox2MzMA.exe, 00000000.00000002.2403491852.0000009BC19EA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyE
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D26410000_2_00007FF6D2641000
Source: C:\Users\user\Desktop\ptEox2MzMA.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3884 -s 1044
Source: classification engineClassification label: mal60.troj.winEXE@2/5@1/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3884
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2b6f1242-9c58-4ade-8ee1-dbca6feb9758Jump to behavior
Source: ptEox2MzMA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ptEox2MzMA.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ptEox2MzMA.exeVirustotal: Detection: 13%
Source: unknownProcess created: C:\Users\user\Desktop\ptEox2MzMA.exe "C:\Users\user\Desktop\ptEox2MzMA.exe"
Source: C:\Users\user\Desktop\ptEox2MzMA.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3884 -s 1044
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: ptEox2MzMA.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ptEox2MzMA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: ptEox2MzMA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\verysafe\x64\Release\verysafe.pdb source: ptEox2MzMA.exe
Source: ptEox2MzMA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ptEox2MzMA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ptEox2MzMA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ptEox2MzMA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ptEox2MzMA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exe TID: 2752Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeThread delayed: delay time: 60000Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: ptEox2MzMA.exe, 00000000.00000002.2403653800.0000024CDE0EC000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE198000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE198000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWC
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\ptEox2MzMA.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D2641978 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D2641978
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D2641B20 SetUnhandledExceptionFilter,0_2_00007FF6D2641B20
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D2641978 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D2641978
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D2641484 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6D2641484
Source: C:\Users\user\Desktop\ptEox2MzMA.exeCode function: 0_2_00007FF6D2641850 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6D2641850
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ptEox2MzMA.exe14%VirustotalBrowse
ptEox2MzMA.exe8%ReversingLabs
ptEox2MzMA.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyE0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey(0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyD~q0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey90%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
171.39.242.20.in-addr.arpa
unknown
unknowntrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://120.46.149.112:8888/safekeyfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://120.46.149.112:8888/safekeyEptEox2MzMA.exe, 00000000.00000002.2403491852.0000009BC19EA000.00000004.00000010.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://120.46.149.112:8888/safekeyD~qptEox2MzMA.exe, 00000000.00000002.2403653800.0000024CDE0EC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.5.drfalse
    • URL Reputation: safe
    unknown
    http://120.46.149.112:8888/safekey9ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE198000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000003.2335675147.0000024CDE198000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://120.46.149.112:8888/safekey(ptEox2MzMA.exe, 00000000.00000002.2403757758.0000024CDE198000.00000004.00000020.00020000.00000000.sdmp, ptEox2MzMA.exe, 00000000.00000003.2335675147.0000024CDE198000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    120.46.149.112
    unknownChina
    4847CNIX-APChinaNetworksInter-ExchangeCNfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1501754
    Start date and time:2024-08-30 12:42:13 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 31s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:ptEox2MzMA.exe
    renamed because original name is a hash value
    Original Sample Name:e7c1ce1a8a9f7b49365007a4b89a3876b3ecb648fccc26e177f168af3d365342.exe
    Detection:MAL
    Classification:mal60.troj.winEXE@2/5@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 2
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.21
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    06:43:30API Interceptor1x Sleep call for process: ptEox2MzMA.exe modified
    06:43:35API Interceptor1x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    120.46.149.112pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112:8888/safekey
    6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112:8888/safekey
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CNIX-APChinaNetworksInter-ExchangeCNpDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112
    6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112
    sora.ppc.elfGet hashmaliciousUnknownBrowse
    • 36.119.225.164
    sora.sh4.elfGet hashmaliciousMiraiBrowse
    • 36.116.144.198
    SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
    • 36.126.70.65
    sora.mips.elfGet hashmaliciousUnknownBrowse
    • 211.103.157.253
    firmware.m68k.elfGet hashmaliciousUnknownBrowse
    • 101.54.87.28
    firmware.sh4.elfGet hashmaliciousUnknownBrowse
    • 110.232.49.249
    KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
    • 116.128.44.170
    KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
    • 117.119.126.204
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.889104645472621
    Encrypted:false
    SSDEEP:192:LG4ZGeCU0MHH/jo5VzuiFgZ24lO8bq9a:LTGeCPMHH/jkzuiFgY4lO8b
    MD5:8E446EB1755D7C9200427AE48C4073C5
    SHA1:BC62EFAAA478E06B16CCAE1CBE947A628845E02C
    SHA-256:81CEBFF10582285F9B39E203808467F5E9558B19B09F417EBA1C75D411C2B36C
    SHA-512:2B04E6A6BC72AC49032405C3F05300D9F4E5B37DDDCADAC971F9BF1527CCF8928041A15A35A1CAE1590A14782E8C03FCF827B224011018C94100AFFADE07AC4B
    Malicious:true
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.2.1.1.3.8.9.4.8.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.2.1.1.8.2.6.9.6.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.2.f.2.4.2.3.b.-.4.3.2.f.-.4.4.a.f.-.8.d.c.5.-.c.4.4.1.5.d.b.d.7.1.b.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.5.4.b.3.8.2.-.c.6.d.2.-.4.c.a.e.-.9.1.a.9.-.3.a.5.e.2.7.3.1.4.7.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.t.E.o.x.2.M.z.M.A...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.2.c.-.0.0.0.1.-.0.0.1.5.-.5.9.1.0.-.d.c.7.2.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.c.f.8.a.d.d.5.0.9.b.4.6.1.0.b.a.5.f.b.f.1.0.4.5.1.9.a.5.f.c.9.0.0.0.0.f.f.f.f.!.0.0.0.0.1.0.f.f.5.c.1.a.d.b.b.2.1.5.4.d.e.7.7.1.5.0.1.7.c.b.1.1.e.a.2.7.c.4.b.f.a.6.0.3.!.p.t.E.o.x.2.M.z.M.A...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.9.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:31 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):142406
    Entropy (8bit):1.3809513319739113
    Encrypted:false
    SSDEEP:384:kXSTxK7MU4jnM3xTX5ajJysPRXx5QIgJMoP5PRWPVZAvE403IH4ahCl:kCTxK+JTlx5QIWMGRWIvE403IH4ahC
    MD5:D0428870009A90830297492CC62D9650
    SHA1:8FA74A8B6D5594024497C4E82921703A46E7368F
    SHA-256:56945BC1F417FDB573E18092B4E659EE4DFD61034BAFD3FE35D182D10F6743F7
    SHA-512:5AF3327626D144D52916AD62BB8741345DE9D223DC5B5851335296217B084560F4F3477D6D7479E792E0536BAB5D9EC2E3937337A0BCB8601427495A0FE0CA26
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......S..f.........................................P..........T.......8...........T...........P)..........................................................................................................eJ......$.......Lw......................T.......,...P..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8782
    Entropy (8bit):3.7083603488939216
    Encrypted:false
    SSDEEP:192:R6l7wVeJZ6THre6Y2DrScbgmfV9pro89b5bkfmTm:R6lXJ4S6YmTbgmfVV5Ifj
    MD5:62A771F4161F32614DC2C3C0810C344C
    SHA1:005AE87E00A55D9FED5BFE182EE2554C409C5DAD
    SHA-256:953374FDBEC3C6A64A6D664E389FB1306008E4DCBE0DDACBA1A98E8695485F53
    SHA-512:5BF4E4C5171F01AEF0A4738B531312AFBE0065FF7DD32231C7860B8673CF82839EA2896F6814F157B81B679EE56073F0778447297930706C9E1FEE14B3E34456
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.8.4.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4677
    Entropy (8bit):4.492266136170324
    Encrypted:false
    SSDEEP:48:cvIwWl8zsmJg771I9gLWpW8VYY9Ym8M4JQYLGLrVFTyq85VL0EE0CaLuLPLuMd:uIjf8I7D67VuJQ1ClyeMd
    MD5:93CA63EB3A6C71DE46DD0108E57194A0
    SHA1:8E5C5D8309B52A948E05CD8F0D613D0F88CB4190
    SHA-256:BBA0401C5E14455B6148D3A50D816E960C067353E45DC673CCFA460491ABEE61
    SHA-512:0AE3D1B301F6ED89A3C74713AC078BAA6858A18AA5258B2C47BE481478EE7C8772BB7D2BEF2CC6AE746CD0F934B3F596D2A61A354C47DE70459FAE8BAE1846B8
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.468707957827632
    Encrypted:false
    SSDEEP:6144:KzZfpi6ceLPx9skLmb0ftZWSP3aJG8nAgeiJRMMhA2zX4WABluuNpjDH5S:MZHttZWOKnMM6bFp/j4
    MD5:0BE95AEA445929D69F26061E9BF9DFC1
    SHA1:2125170C8106065E91073FC7DAEF9F11B9B61F76
    SHA-256:340365DEA9F9FA7A11CB37B0DBCCEC46A42B8373AF29AA9617AE5026D1B6B901
    SHA-512:4BEF742461C77DBAD986050F3F594DB5931AAEAB454C308EDCE36D5D2DCE9759A87D02418482A3F22500B767C43163CAF3067829D9070D7B80AA0B16E1106D78
    Malicious:false
    Reputation:low
    Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmNG.t................................................................................................................................................................................................................................................................................................................................................!.@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):4.912358577528258
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:ptEox2MzMA.exe
    File size:11'264 bytes
    MD5:555b6132e962a96ef5608b3d60c6b1f2
    SHA1:10ff5c1adbb2154de7715017cb11ea27c4bfa603
    SHA256:e7c1ce1a8a9f7b49365007a4b89a3876b3ecb648fccc26e177f168af3d365342
    SHA512:03011bb8b15db0f7d3ada7d170cac1caea33f8c0f6f98a6b4952513dc74f73dcb9092005113fe7884d8acc1048de64859a94963676f79733fac73a3021de29eb
    SSDEEP:192:QP1Ql/QNmkUMJXexq6TjiXQNz3Q5tfXr1:AQl/QoEX6q63D3s
    TLSH:B9322A46FA4588FBDB1C023CC67B068FF075BB01A72253CB67A845252F616E1756628E
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..S6...6...6...?...<.....~.4.....z.%.....{.<.....|.5.....~.3...6.~.......w.7.......7.....}.7...Rich6...................PE..d..
    Icon Hash:00928e8e8686b000
    Entrypoint:0x140001470
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x66D0A24B [Thu Aug 29 16:31:07 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:4cdc3b8103447d926abc4caf8e6617aa
    Instruction
    dec eax
    sub esp, 28h
    call 00007FA6007F417Ch
    dec eax
    add esp, 28h
    jmp 00007FA6007F3C17h
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    xor ecx, ecx
    call dword ptr [00000BB3h]
    dec eax
    mov ecx, ebx
    call dword ptr [00000BA2h]
    call dword ptr [00000BACh]
    dec eax
    mov ecx, eax
    mov edx, C0000409h
    dec eax
    add esp, 20h
    pop ebx
    dec eax
    jmp dword ptr [00000BD0h]
    dec eax
    mov dword ptr [esp+08h], ecx
    dec eax
    sub esp, 38h
    mov ecx, 00000017h
    call dword ptr [00000BB4h]
    test eax, eax
    je 00007FA6007F3DA9h
    mov ecx, 00000002h
    int 29h
    dec eax
    lea ecx, dword ptr [00001C02h]
    call 00007FA6007F3E4Eh
    dec eax
    mov eax, dword ptr [esp+38h]
    dec eax
    mov dword ptr [00001CE9h], eax
    dec eax
    lea eax, dword ptr [esp+38h]
    dec eax
    add eax, 08h
    dec eax
    mov dword ptr [00001C79h], eax
    dec eax
    mov eax, dword ptr [00001CD2h]
    dec eax
    mov dword ptr [00001B43h], eax
    dec eax
    mov eax, dword ptr [esp+40h]
    dec eax
    mov dword ptr [00001C47h], eax
    mov dword ptr [00001B1Dh], C0000409h
    mov dword ptr [00001B17h], 00000001h
    mov dword ptr [00001B21h], 00000001h
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000x180.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x30.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x24100x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22d00x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x1d0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xf5c0x10004d08497b1b3f6eef3ea0651bd0d6d4daFalse0.6376953125zlib compressed data5.9264108765480445IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x20000xffc0x100056944bb7a3f58dc7b4551a165c01dd7dFalse0.40234375data4.285049362930179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x30000x6380x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x40000x1800x200bd5633e4c26b91df3ed71027a0895cebFalse0.447265625data2.9725565801825353IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x50000x1e00x2004dde323af9808a00b376d6895922dc1fFalse0.525390625data4.696122618599126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x60000x300x200dcb89fb73314428549d3dc8cbd054a71False0.125data0.6965265249375858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x50600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllHeapCreate, Sleep, HeapAlloc, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
    WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
    VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, malloc
    api-ms-win-crt-runtime-l1-1-0.dllterminate, _initialize_onexit_table, _cexit, _crt_atexit, __p___argc, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _register_onexit_function, _set_app_type, _seh_filter_exe, _c_exit, __p___argv, _register_thread_local_exe_atexit_callback
    api-ms-win-crt-math-l1-1-0.dll__setusermatherr
    api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Aug 30, 2024 12:43:29.729162931 CEST497178888192.168.2.6120.46.149.112
    Aug 30, 2024 12:43:29.755011082 CEST888849717120.46.149.112192.168.2.6
    Aug 30, 2024 12:43:29.755255938 CEST497178888192.168.2.6120.46.149.112
    Aug 30, 2024 12:43:29.755505085 CEST497178888192.168.2.6120.46.149.112
    Aug 30, 2024 12:43:29.777190924 CEST888849717120.46.149.112192.168.2.6
    Aug 30, 2024 12:43:32.086965084 CEST888849717120.46.149.112192.168.2.6
    Aug 30, 2024 12:43:32.087157011 CEST497178888192.168.2.6120.46.149.112
    Aug 30, 2024 12:43:32.087352037 CEST497178888192.168.2.6120.46.149.112
    Aug 30, 2024 12:43:32.290355921 CEST888849717120.46.149.112192.168.2.6
    TimestampSource PortDest PortSource IPDest IP
    Aug 30, 2024 12:44:01.405061960 CEST5357795162.159.36.2192.168.2.6
    Aug 30, 2024 12:44:02.500503063 CEST5146053192.168.2.61.1.1.1
    Aug 30, 2024 12:44:02.566180944 CEST53514601.1.1.1192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 30, 2024 12:44:02.500503063 CEST192.168.2.61.1.1.10x3266Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 30, 2024 12:44:02.566180944 CEST1.1.1.1192.168.2.60x3266Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
    • 120.46.149.112:8888
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.649717120.46.149.11288883884C:\Users\user\Desktop\ptEox2MzMA.exe
    TimestampBytes transferredDirectionData
    Aug 30, 2024 12:43:29.755505085 CEST96OUTGET /safekey HTTP/1.1
    User-Agent: myapp
    Host: 120.46.149.112:8888
    Cache-Control: no-cache


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:06:43:28
    Start date:30/08/2024
    Path:C:\Users\user\Desktop\ptEox2MzMA.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\ptEox2MzMA.exe"
    Imagebase:0x7ff6d2640000
    File size:11'264 bytes
    MD5 hash:555B6132E962A96EF5608B3D60C6B1F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:5
    Start time:06:43:31
    Start date:30/08/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 3884 -s 1044
    Imagebase:0x7ff6fbc70000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:25.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:25.8%
      Total number of Nodes:66
      Total number of Limit Nodes:3
      execution_graph 379 7ff6d26412d8 383 7ff6d2641b20 SetUnhandledExceptionFilter 379->383 384 7ff6d2641f26 _seh_filter_exe 385 7ff6d2641470 388 7ff6d2641850 385->388 389 7ff6d2641479 388->389 390 7ff6d2641873 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 388->390 390->389 391 7ff6d2641210 392 7ff6d2641220 391->392 404 7ff6d2641688 392->404 394 7ff6d2641978 9 API calls 395 7ff6d26412c5 394->395 396 7ff6d2641244 _RTC_Initialize 402 7ff6d26412a7 396->402 412 7ff6d2641910 InitializeSListHead 396->412 402->394 403 7ff6d26412b5 402->403 405 7ff6d2641699 404->405 410 7ff6d26416cb 404->410 406 7ff6d2641708 405->406 407 7ff6d264169e __scrt_release_startup_lock 405->407 408 7ff6d2641978 9 API calls 406->408 407->410 411 7ff6d26416bb _initialize_onexit_table 407->411 409 7ff6d2641712 408->409 410->396 411->410 329 7ff6d26412f4 330 7ff6d264130d __scrt_initialize_crt 329->330 331 7ff6d264144b 330->331 332 7ff6d2641315 __scrt_acquire_startup_lock 330->332 359 7ff6d2641978 IsProcessorFeaturePresent 331->359 334 7ff6d2641455 332->334 335 7ff6d2641333 __scrt_release_startup_lock 332->335 336 7ff6d2641978 9 API calls 334->336 338 7ff6d2641358 335->338 340 7ff6d26413de _get_initial_narrow_environment __p___argv __p___argc 335->340 343 7ff6d26413d6 _register_thread_local_exe_atexit_callback 335->343 337 7ff6d2641460 336->337 339 7ff6d2641468 _exit 337->339 349 7ff6d2641000 malloc 340->349 343->340 346 7ff6d264140b 347 7ff6d2641410 _cexit 346->347 348 7ff6d2641415 346->348 347->348 348->338 352 7ff6d2641070 InternetOpenW InternetOpenUrlA InternetReadFile 349->352 351 7ff6d2641136 351->351 353 7ff6d264116f HeapCreate RtlAllocateHeap memcpy SleepEx 351->353 352->351 354 7ff6d26411b7 353->354 365 7ff6d26411f0 354->365 357 7ff6d2641acc GetModuleHandleW 358 7ff6d2641407 357->358 358->337 358->346 360 7ff6d264199e 359->360 361 7ff6d26419ac memset RtlCaptureContext RtlLookupFunctionEntry 360->361 362 7ff6d26419e6 RtlVirtualUnwind 361->362 363 7ff6d2641a22 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 361->363 362->363 364 7ff6d2641aa6 363->364 364->334 366 7ff6d26411f9 365->366 367 7ff6d26414b8 IsProcessorFeaturePresent 366->367 368 7ff6d26411c6 366->368 369 7ff6d26414d0 367->369 368->357 374 7ff6d264158c RtlCaptureContext 369->374 375 7ff6d26415a6 RtlLookupFunctionEntry 374->375 376 7ff6d26415bc RtlVirtualUnwind 375->376 377 7ff6d26414e3 375->377 376->375 376->377 378 7ff6d2641484 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 377->378 413 7ff6d2641422 414 7ff6d2641acc GetModuleHandleW 413->414 415 7ff6d2641429 414->415 416 7ff6d2641468 _exit 415->416 417 7ff6d264142d 415->417

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00007FF6D2641928 1 Function_00007FF6D2641968 2 Function_00007FF6D2641F26 3 Function_00007FF6D26417AC 4 Function_00007FF6D2641DB0 3->4 5 Function_00007FF6D2641930 6 Function_00007FF6D2641B30 7 Function_00007FF6D2641970 8 Function_00007FF6D2641470 28 Function_00007FF6D2641850 8->28 9 Function_00007FF6D26411F0 23 Function_00007FF6D264158C 9->23 41 Function_00007FF6D2641484 9->41 10 Function_00007FF6D26412F4 10->1 10->3 15 Function_00007FF6D2641960 10->15 25 Function_00007FF6D2641ACC 10->25 29 Function_00007FF6D26417D0 10->29 30 Function_00007FF6D2641714 10->30 32 Function_00007FF6D2641978 10->32 37 Function_00007FF6D264163C 10->37 38 Function_00007FF6D2641000 10->38 40 Function_00007FF6D2641600 10->40 11 Function_00007FF6D26412D8 14 Function_00007FF6D2641B20 11->14 36 Function_00007FF6D26418FC 11->36 12 Function_0000024CDFE80008 13 Function_00007FF6D2641920 16 Function_00007FF6D26417A5 17 Function_00007FF6D2641924 18 Function_00007FF6D2641E64 43 Function_00007FF6D2641E84 18->43 19 Function_00007FF6D2641422 19->25 20 Function_00007FF6D2641688 20->4 20->32 21 Function_00007FF6D2641908 22 Function_00007FF6D2641BC8 24 Function_00007FF6D2641B8C 26 Function_00007FF6D2641910 27 Function_00007FF6D2641210 27->13 27->17 27->20 27->21 27->24 27->26 31 Function_00007FF6D2641954 27->31 27->32 33 Function_00007FF6D2641938 27->33 34 Function_00007FF6D2641838 27->34 27->36 39 Function_00007FF6D2641900 27->39 29->13 32->7 33->0 33->5 35 Function_00007FF6D26417FC 34->35 37->13 42 Function_00007FF6D2641C04 37->42 38->9 40->4 44 Function_00007FF6D2641F44

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2403906418.00007FF6D2641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D2640000, based on PE: true
      • Associated: 00000000.00000002.2403892777.00007FF6D2640000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403920314.00007FF6D2642000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403932546.00007FF6D2644000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6d2640000_ptEox2MzMA.jbxd
      Similarity
      • API ID: Internet$HeapOpen$AllocateCreateFileReadSleepmallocmemcpy
      • String ID: myapp$qvan
      • API String ID: 4041867304-30057361
      • Opcode ID: b2edb408c74680fd0a41c658afb2e5fd8a445424b2eeaa394370e090d5395e9c
      • Instruction ID: d8d8503bdfff596ce9bbee32e786b7d00bf464f22730690cf9cd9b1f317233f0
      • Opcode Fuzzy Hash: b2edb408c74680fd0a41c658afb2e5fd8a445424b2eeaa394370e090d5395e9c
      • Instruction Fuzzy Hash: 2141E521A0C7C187E7508F64E56033E6BA1FB8DB88F505236DACD83B55DE6CE196C700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2403906418.00007FF6D2641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D2640000, based on PE: true
      • Associated: 00000000.00000002.2403892777.00007FF6D2640000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403920314.00007FF6D2642000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403932546.00007FF6D2644000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6d2640000_ptEox2MzMA.jbxd
      Similarity
      • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
      • String ID:
      • API String ID: 120244420-0
      • Opcode ID: cdf9ddf9b8f3545d6bf70532f9c1ef8036d3e70e1b5851f5e37332987c0b4dca
      • Instruction ID: 27afc45a93a52f9f5da809721e67048b160374db571104aa60409991c922635d
      • Opcode Fuzzy Hash: cdf9ddf9b8f3545d6bf70532f9c1ef8036d3e70e1b5851f5e37332987c0b4dca
      • Instruction Fuzzy Hash: A1311B21A0C3C683EA14AB2194713BD1691AFCD78CF5440B7DACDC76D7DEECA427A250

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2403906418.00007FF6D2641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D2640000, based on PE: true
      • Associated: 00000000.00000002.2403892777.00007FF6D2640000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403920314.00007FF6D2642000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403932546.00007FF6D2644000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6d2640000_ptEox2MzMA.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 313767242-0
      • Opcode ID: 164099dc16f6851cd1a3dae4f478fef8be051ac75fba43c1b911851f751854fe
      • Instruction ID: 515ef1f077f2177be9b9d05a60e1df56e20656354bc757346d3c7decb82709c2
      • Opcode Fuzzy Hash: 164099dc16f6851cd1a3dae4f478fef8be051ac75fba43c1b911851f751854fe
      • Instruction Fuzzy Hash: 2C312D72609BC186EB609FA1E8503ED73A0FB88748F44443BDA8E87A98DF7CD559D710
      Memory Dump Source
      • Source File: 00000000.00000002.2403906418.00007FF6D2641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D2640000, based on PE: true
      • Associated: 00000000.00000002.2403892777.00007FF6D2640000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403920314.00007FF6D2642000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2403932546.00007FF6D2644000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6d2640000_ptEox2MzMA.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f334b8f5e1e3aae3ac73bfcf936b040b53b15cdd0890180c5bf607ee4a942650
      • Instruction ID: 049362d9f5f003b95893b05f4ded90dc4707bd0e8b296baf653c602085617556
      • Opcode Fuzzy Hash: f334b8f5e1e3aae3ac73bfcf936b040b53b15cdd0890180c5bf607ee4a942650
      • Instruction Fuzzy Hash: A3A0016591CE86D2E6548B45A8700282260ABA8748B504472D08D854A4EEACA466E200