Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fEsB3ftQ3t.exe

Overview

General Information

Sample name:fEsB3ftQ3t.exe
renamed because original name is a hash value
Original sample name:939ce8aae31e5f9885c7e49b03f0e43f4178359fd6412fb1dd706aff63431442.exe
Analysis ID:1501755
MD5:01e13ade0ae93e45723c58e290c165de
SHA1:48a7f2dffa37982198e7f689bbfee5bb118eb034
SHA256:939ce8aae31e5f9885c7e49b03f0e43f4178359fd6412fb1dd706aff63431442
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • fEsB3ftQ3t.exe (PID: 4836 cmdline: "C:\Users\user\Desktop\fEsB3ftQ3t.exe" MD5: 01E13ADE0AE93E45723C58E290C165DE)
    • WerFault.exe (PID: 3136 cmdline: C:\Windows\system32\WerFault.exe -u -p 4836 -s 1076 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\fEsB3ftQ3t.exe, Initiated: true, ProcessId: 4836, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49704
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: fEsB3ftQ3t.exeReversingLabs: Detection: 63%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: fEsB3ftQ3t.exeJoe Sandbox ML: detected
Source: fEsB3ftQ3t.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: fEsB3ftQ3t.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
Source: global trafficTCP traffic: 192.168.2.7:49704 -> 120.46.149.112:8888
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B31000 InternetOpenW,InternetOpenUrlA,InternetReadFile,SleepEx,VirtualProtect,CreateThread,WaitForSingleObject,0_2_00007FF6D3B31000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: fEsB3ftQ3t.exe, 00000000.00000002.1794710189.0000021058769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105877E000.00000004.00000020.00020000.00000000.sdmp, fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105871C000.00000004.00000020.00020000.00000000.sdmp, fEsB3ftQ3t.exe, 00000000.00000002.1794345977.000000D874BFA000.00000004.00000010.00020000.00000000.sdmp, fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105878F000.00000004.00000020.00020000.00000000.sdmp, fEsB3ftQ3t.exe, 00000000.00000002.1794710189.0000021058769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105878F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey.
Source: fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105871C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyL
Source: fEsB3ftQ3t.exe, 00000000.00000002.1794345977.000000D874BFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyk
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B310000_2_00007FF6D3B31000
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4836 -s 1076
Source: classification engineClassification label: mal60.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4836
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5ff49931-aaf8-4385-8ad9-722333ab67e2Jump to behavior
Source: fEsB3ftQ3t.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: fEsB3ftQ3t.exeReversingLabs: Detection: 63%
Source: unknownProcess created: C:\Users\user\Desktop\fEsB3ftQ3t.exe "C:\Users\user\Desktop\fEsB3ftQ3t.exe"
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4836 -s 1076
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: fEsB3ftQ3t.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: fEsB3ftQ3t.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: fEsB3ftQ3t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: fEsB3ftQ3t.exe
Source: fEsB3ftQ3t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: fEsB3ftQ3t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: fEsB3ftQ3t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: fEsB3ftQ3t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: fEsB3ftQ3t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exe TID: 3576Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeThread delayed: delay time: 60000Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105871C000.00000004.00000020.00020000.00000000.sdmp, fEsB3ftQ3t.exe, 00000000.00000002.1794710189.0000021058797000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B31928 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D3B31928
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B31928 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D3B31928
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B31434 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6D3B31434
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B31AD0 SetUnhandledExceptionFilter,0_2_00007FF6D3B31AD0
Source: C:\Users\user\Desktop\fEsB3ftQ3t.exeCode function: 0_2_00007FF6D3B31800 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6D3B31800
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
fEsB3ftQ3t.exe63%ReversingLabsWin64.Trojan.MintZard
fEsB3ftQ3t.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekeyL0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyk0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey.0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/fEsB3ftQ3t.exe, 00000000.00000002.1794710189.0000021058769000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey.fEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105878F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyLfEsB3ftQ3t.exe, 00000000.00000002.1794710189.000002105871C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeykfEsB3ftQ3t.exe, 00000000.00000002.1794345977.000000D874BFA000.00000004.00000010.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501755
Start date and time:2024-08-30 12:42:17 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:fEsB3ftQ3t.exe
renamed because original name is a hash value
Original Sample Name:939ce8aae31e5f9885c7e49b03f0e43f4178359fd6412fb1dd706aff63431442.exe
Detection:MAL
Classification:mal60.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.65.92
  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: fEsB3ftQ3t.exe
TimeTypeDescription
06:43:40API Interceptor1x Sleep call for process: fEsB3ftQ3t.exe modified
06:44:09API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNpDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
sora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
  • 36.126.70.65
sora.mips.elfGet hashmaliciousUnknownBrowse
  • 211.103.157.253
firmware.m68k.elfGet hashmaliciousUnknownBrowse
  • 101.54.87.28
firmware.sh4.elfGet hashmaliciousUnknownBrowse
  • 110.232.49.249
KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
  • 116.128.44.170
KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
  • 117.119.126.204
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8862604825162677
Encrypted:false
SSDEEP:96:tMF5MsLvhsPwhqjPa7q+fJQXIDcQ2c6mcE0cw3KXCXm+HbHg/ZjnZ+ZFGLGCI727:q3hUJn0oiebjoZVzuiFgZ24lO8a
MD5:8C1D160AC736914FDB1FE724109F887D
SHA1:EC83488DB445E079C05B0E9DC1559FC45D646204
SHA-256:417877C544BC17E0FFB8CC6A758D72354DD6F531687BA5D8A66A9F8BDA4E647F
SHA-512:C1D5E48F06F872874A372F7998858084D9D9183E2F9BFA140F502A4D95A69CDBB8F8F6F96EE510932C94C467A2407CF2D8DD037BE1242FF6C1BBC42BF3D2F42F
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.2.2.0.7.9.4.9.5.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.2.2.1.1.6.9.9.5.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.2.7.f.a.a.d.-.c.1.3.a.-.4.2.d.b.-.9.9.c.0.-.e.c.b.5.5.6.b.5.0.5.2.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.a.6.4.e.4.9.a.-.3.7.1.5.-.4.f.6.0.-.8.b.5.f.-.6.b.7.8.2.9.1.b.e.7.9.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.f.E.s.B.3.f.t.Q.3.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.e.4.-.0.0.0.1.-.0.0.1.4.-.4.5.8.3.-.6.6.7.8.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.d.7.8.f.a.d.d.c.7.5.6.4.f.4.6.7.6.0.e.f.6.e.5.4.a.7.c.5.1.a.2.0.0.0.0.f.f.f.f.!.0.0.0.0.4.8.a.7.f.2.d.f.f.a.3.7.9.8.2.1.9.8.e.7.f.6.8.9.b.b.f.e.e.5.b.b.1.1.8.e.b.0.3.4.!.f.E.s.B.3.f.t.Q.3.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.8.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:40 2024, 0x1205a4 type
Category:dropped
Size (bytes):164886
Entropy (8bit):1.2763004509258764
Encrypted:false
SSDEEP:384:8U4U3gKYU3hPGX00br1PkXMVxTmW35lev4GqY1ubRv:85U3gKYU39GX00br5kXMV113gEiA
MD5:2127E4B74741488D429CFFE2C373FD0B
SHA1:585615B8810DD16672012069D03BC886DAA2013F
SHA-256:B6BF2A1C34D7BC8FD6F7E0C074E79F5188F3EAEF0CF9572A4E424A8BA87B4A58
SHA-512:91A0050C7C736EBA28240F306FA855C6806DF5F7A68C058D854C30AE07E3929391C467179276A80D9865D98E3EA9593A88B21951530C16EE25C030B7DC0685AB
Malicious:false
Reputation:low
Preview:MDMP..a..... .......\..f....................................$....Z..........T.......8...........T............+..FX......................................................................................................eJ..............Lw......................T...........Y..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8742
Entropy (8bit):3.702091024167612
Encrypted:false
SSDEEP:192:R6l7wVeJdl4A6YNUv+UNgmfIdpr589b+61Jgf0UKm:R6lXJPN6Y++mgmfIW+eJgfx
MD5:31EA958FB5D1B7C41BDC139C0F789FC1
SHA1:EE81AC662DBD260B94604A9121032B40D776302B
SHA-256:D530FBDA02AC76E5EE37F7EC152F649C20829FE7025473CF989D58890036A941
SHA-512:0CBDA40DED50DD318DA31C2704F3E47D94CFC897E4A3DF68F290AD51BF25FC3D12ACEEFFD88F29E3979D6AD00C32D17C74B67BAF2D16404E21670035C8A6E4D8
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.3.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4637
Entropy (8bit):4.462451890388621
Encrypted:false
SSDEEP:48:cvIwWl8zsmJg771I9tqWpW8VYYcYm8M4Jv86Fpyq85N1xIGvVcQd:uIjf8I7aL7VbJUmCyGvVfd
MD5:F9EE98DCEC6A650C1421E7F31D213D5C
SHA1:D61896FC94B8EED8B97130EB6F0B13C14C6078C9
SHA-256:67C2153B6ACFE6BE3B483F09E63CC7F7C0D8709FD56C223ABCE094CF4536134F
SHA-512:D18C898F2A5EAF4999E63832F09EAB9A2483CB2FD3E736B6B72BA326AF3F8A90CC5041DD87DF1AC623DF4E9ED4EA0BDB873A3AC10502149F76CB2EDC9E7AA18D
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.416794347640807
Encrypted:false
SSDEEP:6144:Lcifpi6ceLPL9skLmb0meSWSPtaJG8nAgex285i2MMhA20X4WABlGuNg5+:wi58eSWIZBk2MM6AFBio
MD5:6902DF67B52F0EF8C569F0707C4FE7E4
SHA1:B45FE3C6BD059702D45093C928AA582B1EE409C8
SHA-256:FAEBD6F9948F4412E8CBD6F5F472B1704348F3B971DD05361109929CEFD05B4C
SHA-512:93318D71C7EC7D0DAD394FCBEDF3D1F51AD7DC8C17E008BF50390C936AA67A115FE0517B78C745EEAAD15A1238DF9949EF13E1BEE35419764A9AAF61A5F426F0
Malicious:false
Reputation:low
Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..Bz.................................................................................................................................................................................................................................................................................................................................................TN........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.71305970027654
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:fEsB3ftQ3t.exe
File size:11'776 bytes
MD5:01e13ade0ae93e45723c58e290c165de
SHA1:48a7f2dffa37982198e7f689bbfee5bb118eb034
SHA256:939ce8aae31e5f9885c7e49b03f0e43f4178359fd6412fb1dd706aff63431442
SHA512:891c65cbd698ddfa912b71069efe41562e18f2c3280d996a33eaf950001d15646e796cce73f7a37a904a003590bbe29a47100ae19141e53a4b4d3f2b8699454e
SSDEEP:192:O5lVQT4urheC17eGhzo0X7z3Q5tf/rUBj:2jQT4urXphzVz3t
TLSH:B5323986FA55C9FBD72C0238C93B098EE075B616A32293CB17A940253F617D1B5263CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..S6...6...6...?...<.....~.4.....z.%.....{.<.....|.5.....~.3...6.~.......w.7.......7.....}.7...Rich6...................PE..d..
Icon Hash:00928e8e8686b000
Entrypoint:0x140001420
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CF761A [Wed Aug 28 19:10:18 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:6efe6f3dc8817e40abe255df3cb7a5b7
Instruction
dec eax
sub esp, 28h
call 00007F99B53C2B0Ch
dec eax
add esp, 28h
jmp 00007F99B53C25A7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000C0Bh]
dec eax
mov ecx, ebx
call dword ptr [00000BFAh]
call dword ptr [00000C04h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C28h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000C0Ch]
test eax, eax
je 00007F99B53C2739h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00002C52h]
call 00007F99B53C27DEh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00002D39h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00002CC9h], eax
dec eax
mov eax, dword ptr [00002D22h]
dec eax
mov dword ptr [00002B93h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00002C97h], eax
mov dword ptr [00002B6Dh], C0000409h
mov dword ptr [00002B67h], 00000001h
mov dword ptr [00002B71h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24000x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22c00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1d0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf0c0x1000cdadb6d264886fad267e9911d2ac48ecFalse0.622314453125data5.846505539296759IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x10100x1200f5939e3223d876f8c91043c7fe7a462eFalse0.3589409722222222data3.92909379671767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x40000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xa0000x1800x2001b86f078a2e927e35d1d9f83d3c65c9cFalse0.451171875data2.9715652802116654IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xb0000x1e00x200ae46018e2eb1721187fc1aeee8663872False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xc0000x300x20045e579f1661fd93b8920c264138e82c3False0.125data0.6978762918720139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xb0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllVirtualProtect, WaitForSingleObject, Sleep, CreateThread, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenW, InternetReadFile, InternetOpenUrlA
VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
api-ms-win-crt-runtime-l1-1-0.dll_register_onexit_function, _cexit, _crt_atexit, _c_exit, terminate, _register_thread_local_exe_atexit_callback, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _initialize_onexit_table, _set_app_type, _seh_filter_exe, __p___argc, __p___argv
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:43:38.876099110 CEST497048888192.168.2.7120.46.149.112
Aug 30, 2024 12:43:38.913841009 CEST888849704120.46.149.112192.168.2.7
Aug 30, 2024 12:43:38.913984060 CEST497048888192.168.2.7120.46.149.112
Aug 30, 2024 12:43:38.914203882 CEST497048888192.168.2.7120.46.149.112
Aug 30, 2024 12:43:38.953361988 CEST888849704120.46.149.112192.168.2.7
Aug 30, 2024 12:43:41.055300951 CEST888849704120.46.149.112192.168.2.7
Aug 30, 2024 12:43:41.055514097 CEST497048888192.168.2.7120.46.149.112
Aug 30, 2024 12:43:41.055680990 CEST497048888192.168.2.7120.46.149.112
Aug 30, 2024 12:43:41.067398071 CEST888849704120.46.149.112192.168.2.7
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.749704120.46.149.11288884836C:\Users\user\Desktop\fEsB3ftQ3t.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:43:38.914203882 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:43:37
Start date:30/08/2024
Path:C:\Users\user\Desktop\fEsB3ftQ3t.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\fEsB3ftQ3t.exe"
Imagebase:0x7ff6d3b30000
File size:11'776 bytes
MD5 hash:01E13ADE0AE93E45723C58E290C165DE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:43:40
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 4836 -s 1076
Imagebase:0x7ff799790000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:25.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:30.8%
    Total number of Nodes:52
    Total number of Limit Nodes:1
    execution_graph 385 7ff6d3b31288 388 7ff6d3b31ad0 SetUnhandledExceptionFilter 385->388 389 7ff6d3b311c0 390 7ff6d3b311d0 389->390 398 7ff6d3b31638 390->398 392 7ff6d3b31928 9 API calls 393 7ff6d3b31275 392->393 394 7ff6d3b311f4 _RTC_Initialize 396 7ff6d3b3121e __scrt_initialize_crt 394->396 403 7ff6d3b318c0 InitializeSListHead 394->403 396->392 397 7ff6d3b31265 396->397 399 7ff6d3b31649 398->399 402 7ff6d3b3164e __scrt_release_startup_lock 398->402 400 7ff6d3b31928 9 API calls 399->400 399->402 401 7ff6d3b316c2 400->401 402->394 404 7ff6d3b31420 407 7ff6d3b31800 404->407 408 7ff6d3b31429 407->408 409 7ff6d3b31823 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 407->409 409->408 344 7ff6d3b312a4 345 7ff6d3b312bd __scrt_initialize_crt 344->345 346 7ff6d3b313fb 345->346 347 7ff6d3b312c5 __scrt_acquire_startup_lock 345->347 365 7ff6d3b31928 IsProcessorFeaturePresent 346->365 349 7ff6d3b31405 347->349 352 7ff6d3b312e3 __scrt_release_startup_lock 347->352 350 7ff6d3b31928 9 API calls 349->350 351 7ff6d3b31308 350->351 352->351 356 7ff6d3b31000 352->356 358 7ff6d3b31060 InternetOpenW InternetOpenUrlA InternetReadFile SleepEx 356->358 359 7ff6d3b31110 358->359 359->359 360 7ff6d3b31125 VirtualProtect CreateThread WaitForSingleObject 359->360 371 7ff6d3b311a0 360->371 363 7ff6d3b31a7c GetModuleHan 364 7ff6d3b31a8d 363->364 364->351 366 7ff6d3b3194e 365->366 367 7ff6d3b3195c memset RtlCaptureContext RtlLookupFunctionEntry 366->367 368 7ff6d3b31996 RtlVirtualUnwind 367->368 369 7ff6d3b319d2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 367->369 368->369 370 7ff6d3b31a56 369->370 370->349 372 7ff6d3b311a9 371->372 373 7ff6d3b31177 372->373 374 7ff6d3b31468 IsProcessorFeaturePresent 372->374 373->363 375 7ff6d3b31480 374->375 380 7ff6d3b3153c RtlCaptureContext 375->380 381 7ff6d3b31556 RtlLookupFunctionEntry 380->381 382 7ff6d3b3156c RtlVirtualUnwind 381->382 383 7ff6d3b31493 381->383 382->381 382->383 384 7ff6d3b31434 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 383->384 410 7ff6d3b313d2 411 7ff6d3b31a7c GetModuleHan 410->411 412 7ff6d3b313d9 411->412

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6D3B31B78 1 Function_00007FF6D3B31638 28 Function_00007FF6D3B31D60 1->28 32 Function_00007FF6D3B31928 1->32 2 Function_00007FF6D3B318B8 3 Function_00007FF6D3B31A7C 4 Function_00007FF6D3B3153C 5 Function_00007FF6D3B31B3C 6 Function_00007FF6D3B31000 26 Function_00007FF6D3B311A0 6->26 7 Function_00007FF6D3B31800 8 Function_00007FF6D3B31780 16 Function_00007FF6D3B318D0 8->16 9 Function_00007FF6D3B318C0 10 Function_00007FF6D3B311C0 10->1 10->2 10->5 10->9 11 Function_00007FF6D3B31904 10->11 10->16 18 Function_00007FF6D3B318D4 10->18 10->32 33 Function_00007FF6D3B318E8 10->33 34 Function_00007FF6D3B317E8 10->34 36 Function_00007FF6D3B318AC 10->36 38 Function_00007FF6D3B318B0 10->38 12 Function_00007FF6D3B316C4 13 Function_00007FF6D3B31288 15 Function_00007FF6D3B31AD0 13->15 13->36 14 Function_00007FF6D3B31910 17 Function_00007FF6D3B31E14 42 Function_00007FF6D3B31E34 17->42 19 Function_00007FF6D3B31755 20 Function_00007FF6D3B313D2 20->3 21 Function_00007FF6D3B31918 22 Function_00007FF6D3B318D8 23 Function_00007FF6D3B31ED6 24 Function_00007FF6D3B3175C 24->28 25 Function_00007FF6D3B31920 26->4 40 Function_00007FF6D3B31434 26->40 27 Function_00007FF6D3B31420 27->7 29 Function_00007FF6D3B318E0 30 Function_00007FF6D3B31AE0 31 Function_00007FF6D3B312A4 31->3 31->6 31->8 31->12 31->14 31->21 31->24 31->32 37 Function_00007FF6D3B315EC 31->37 39 Function_00007FF6D3B315B0 31->39 32->25 33->22 33->29 35 Function_00007FF6D3B317AC 34->35 37->16 41 Function_00007FF6D3B31BB4 37->41 39->28 43 Function_00007FF6D3B31EF4

    Control-flow Graph

    APIs
    Strings
    • wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww, xrefs: 00007FF6D3B310E3
    • myapp, xrefs: 00007FF6D3B310B1
    Memory Dump Source
    • Source File: 00000000.00000002.1794983880.00007FF6D3B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D3B30000, based on PE: true
    • Associated: 00000000.00000002.1794965885.00007FF6D3B30000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795045666.00007FF6D3B32000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795063386.00007FF6D3B34000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795082980.00007FF6D3B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d3b30000_fEsB3ftQ3t.jbxd
    Similarity
    • API ID: Internet$Open$CreateFileObjectProtectReadSingleSleepThreadVirtualWait
    • String ID: myapp$wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
    • API String ID: 3177446457-1813571026
    • Opcode ID: 83e27b2835efdf78f29e4fdce3a0cc8bd4703e7d803ae3ff03508ec37ad19152
    • Instruction ID: 23ed30cd00e4e39dcedf71e454b2bad72797b3fc0df3ced92a995499d33cd8f7
    • Opcode Fuzzy Hash: 83e27b2835efdf78f29e4fdce3a0cc8bd4703e7d803ae3ff03508ec37ad19152
    • Instruction Fuzzy Hash: F841D422A0DB9582F7208F25E8113AEB750FBAB7E0F445236D99D967A4CF3CE158C700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1794983880.00007FF6D3B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D3B30000, based on PE: true
    • Associated: 00000000.00000002.1794965885.00007FF6D3B30000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795045666.00007FF6D3B32000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795063386.00007FF6D3B34000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795082980.00007FF6D3B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d3b30000_fEsB3ftQ3t.jbxd
    Similarity
    • API ID: __scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock
    • String ID:
    • API String ID: 1666786595-0
    • Opcode ID: 710d9956bb20f409054a721e33c7661e5be1595b93ed8a425e2a30d00fa3f87c
    • Instruction ID: a95cc1c1c40e07677a1b274ca275ad81b8740e6a10935039567c400fb1e9963e
    • Opcode Fuzzy Hash: 710d9956bb20f409054a721e33c7661e5be1595b93ed8a425e2a30d00fa3f87c
    • Instruction Fuzzy Hash: 4C316D21E0F22243EB10BB25E4133BD9298AF67780F446137D9CEEB6D7DE2CA525C241

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1794983880.00007FF6D3B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D3B30000, based on PE: true
    • Associated: 00000000.00000002.1794965885.00007FF6D3B30000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795045666.00007FF6D3B32000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795063386.00007FF6D3B34000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795082980.00007FF6D3B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d3b30000_fEsB3ftQ3t.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 2f7be221653fd3eb5d5b99dc747770fb040a3803e82320d234a24c2b816465f4
    • Instruction ID: e5a4e0ec0e861206df325f41be2f73b45dc0a432fa14ca209c37a66b194f2945
    • Opcode Fuzzy Hash: 2f7be221653fd3eb5d5b99dc747770fb040a3803e82320d234a24c2b816465f4
    • Instruction Fuzzy Hash: 1731B27260AB9186EB609F60E8413EDB364FB9A744F44403BDA8E97B94DF3CD218C700
    Memory Dump Source
    • Source File: 00000000.00000002.1794983880.00007FF6D3B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D3B30000, based on PE: true
    • Associated: 00000000.00000002.1794965885.00007FF6D3B30000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795045666.00007FF6D3B32000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795063386.00007FF6D3B34000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1795082980.00007FF6D3B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d3b30000_fEsB3ftQ3t.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5b85cb87047ac72ca97d65a6199dc1e9b699368a38447657b402fd6b0eeab6fe
    • Instruction ID: 642ad811a04331c74b4697e1b46e43d96b3a56e98694a3b73718410aeca0ef80
    • Opcode Fuzzy Hash: 5b85cb87047ac72ca97d65a6199dc1e9b699368a38447657b402fd6b0eeab6fe
    • Instruction Fuzzy Hash: 0AA00221A0EC22D2E644DB44EA5227DA335FB773C1B501033D09EE54A0DF3CA425D310