Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CuBYV0mfw8.exe

Overview

General Information

Sample name:CuBYV0mfw8.exe
renamed because original name is a hash value
Original sample name:a38da919a6f75fd511461159accdfdaf29b6fb81a6ecd41ea5d8fc447a106254.exe
Analysis ID:1501757
MD5:24fcec34782973a633ac38da243eca91
SHA1:c33112fd1fae373668efbf12b630f76af4743123
SHA256:a38da919a6f75fd511461159accdfdaf29b6fb81a6ecd41ea5d8fc447a106254
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
One or more processes crash
Sigma detected: Communication To Uncommon Desusertion Ports
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • CuBYV0mfw8.exe (PID: 2284 cmdline: "C:\Users\user\Desktop\CuBYV0mfw8.exe" MD5: 24FCEC34782973A633AC38DA243ECA91)
    • WerFault.exe (PID: 4380 cmdline: C:\Windows\system32\WerFault.exe -u -p 2284 -s 1060 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DesusertionIp: 120.46.149.112, DesusertionIsIpv6: false, DesusertionPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\CuBYV0mfw8.exe, Initiated: true, ProcessId: 2284, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49707
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: CuBYV0mfw8.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: CuBYV0mfw8.exeJoe Sandbox ML: detected
Source: CuBYV0mfw8.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: CuBYV0mfw8.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8888
Source: global trafficTCP traffic: 192.168.2.9:49707 -> 120.46.149.112:8888
Source: unknownDNS traffic detected: query: 56.126.166.20.in-addr.arpa replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B1000 InternetOpenW,InternetOpenUrlA,InternetReadFile,VirtualProtect,CreateThread,WaitForSingleObject,0_2_00007FF6670B1000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D88A000.00000004.00000020.00020000.00000000.sdmp, CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D83C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D88A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/6.149.112:8888/safekeyj
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D83C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/uf
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D83C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B10000_2_00007FF6670B1000
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2284 -s 1060
Source: classification engineClassification label: mal60.troj.winEXE@2/5@1/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2284
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4e38228b-e208-421a-93eb-7f9f94ea4e50Jump to behavior
Source: CuBYV0mfw8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: CuBYV0mfw8.exeReversingLabs: Detection: 60%
Source: unknownProcess created: C:\Users\user\Desktop\CuBYV0mfw8.exe "C:\Users\user\Desktop\CuBYV0mfw8.exe"
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2284 -s 1060
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: CuBYV0mfw8.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: CuBYV0mfw8.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: CuBYV0mfw8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: CuBYV0mfw8.exe
Source: CuBYV0mfw8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: CuBYV0mfw8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: CuBYV0mfw8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: CuBYV0mfw8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: CuBYV0mfw8.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D8B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW;
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D8B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D83C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpS
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B1928 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6670B1928
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B1AD0 SetUnhandledExceptionFilter,0_2_00007FF6670B1AD0
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B1434 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6670B1434
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B1928 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6670B1928
Source: C:\Users\user\Desktop\CuBYV0mfw8.exeCode function: 0_2_00007FF6670B1800 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6670B1800
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
CuBYV0mfw8.exe61%ReversingLabsWin64.Trojan.MintZard
CuBYV0mfw8.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112/6.149.112:8888/safekeyj0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112/uf0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
56.126.166.20.in-addr.arpa
unknown
unknowntrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://120.46.149.112:8888/safekeyfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://120.46.149.112/6.149.112:8888/safekeyjCuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D88A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.5.drfalse
    • URL Reputation: safe
    unknown
    http://120.46.149.112/CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D88A000.00000004.00000020.00020000.00000000.sdmp, CuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D83C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://120.46.149.112/ufCuBYV0mfw8.exe, 00000000.00000002.1654511254.000001EB6D83C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    120.46.149.112
    unknownChina
    4847CNIX-APChinaNetworksInter-ExchangeCNfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1501757
    Start date and time:2024-08-30 12:42:18 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 31s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:11
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:CuBYV0mfw8.exe
    renamed because original name is a hash value
    Original Sample Name:a38da919a6f75fd511461159accdfdaf29b6fb81a6ecd41ea5d8fc447a106254.exe
    Detection:MAL
    Classification:mal60.troj.winEXE@2/5@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 2
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.20
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: CuBYV0mfw8.exe
    TimeTypeDescription
    06:43:44API Interceptor1x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    120.46.149.112pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112:8888/safekey
    6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112:8888/safekey
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CNIX-APChinaNetworksInter-ExchangeCNpDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112
    6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
    • 120.46.149.112
    sora.ppc.elfGet hashmaliciousUnknownBrowse
    • 36.119.225.164
    sora.sh4.elfGet hashmaliciousMiraiBrowse
    • 36.116.144.198
    SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
    • 36.126.70.65
    sora.mips.elfGet hashmaliciousUnknownBrowse
    • 211.103.157.253
    firmware.m68k.elfGet hashmaliciousUnknownBrowse
    • 101.54.87.28
    firmware.sh4.elfGet hashmaliciousUnknownBrowse
    • 110.232.49.249
    KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
    • 116.128.44.170
    KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
    • 117.119.126.204
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8835425461468691
    Encrypted:false
    SSDEEP:192:4iP4ByiCBc0sVhCeM5jo5VzuiFgZ24lO8gf:jiCBXsVhCDjkzuiFgY4lO8Q
    MD5:838C0BBF51C324C3F465F9C5A50AAE22
    SHA1:7B860F45CD4B35B508DCA4BC23A59601224F2848
    SHA-256:24AB270CF26804F8C3C450EC99D803835F4AA86969C5F809F2B20DE1A70159C3
    SHA-512:CEE191E8451B815BA57CF41895A351DA8909073506CA70368188EA709D7961F339F178EA6FCD15736410F5B4CBB0EB23CC4E588A780931941C58028E2DBAA9B3
    Malicious:true
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.2.1.8.2.9.8.3.4.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.2.1.8.7.6.7.1.0.3.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.7.7.6.7.5.5.0.-.a.7.4.0.-.4.f.e.2.-.a.2.f.8.-.a.0.c.3.d.6.5.d.0.8.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.b.f.a.4.0.e.-.3.6.8.e.-.4.2.a.d.-.a.9.3.7.-.6.0.7.0.d.8.f.b.f.b.3.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.C.u.B.Y.V.0.m.f.w.8...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.e.c.-.0.0.0.1.-.0.0.1.4.-.5.3.3.b.-.d.d.7.6.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.f.3.8.2.1.6.d.e.3.9.e.5.0.b.3.0.8.b.3.d.2.c.f.e.3.a.e.5.6.5.9.0.0.0.0.f.f.f.f.!.0.0.0.0.c.3.3.1.1.2.f.d.1.f.a.e.3.7.3.6.6.8.e.f.b.f.1.2.b.6.3.0.f.7.6.a.f.4.7.4.3.1.2.3.!.C.u.B.Y.V.0.m.f.w.8...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.8.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:38 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):153388
    Entropy (8bit):1.2994632603863867
    Encrypted:false
    SSDEEP:384:8Gzb6IzcoKdd8aabmp1rIZ9bBFgd+NVwbLk6fi2WZa/D:8Gzb9XKUaMv1j1E
    MD5:526184AFDF6782085C3F3ED6439C11B4
    SHA1:576E2840370A09D2B81491AD4EACF2586B1CAAD8
    SHA-256:F01B1E358E4D1340C7C14E33BB808F797A8FEA8F01F4BD81329F6291DFBEED8E
    SHA-512:03EDCEDD54472E2E2F0D5D9A5C54430621B034EEB6616A2FD9B663A8318E20659C6E3727DCB0CB0F7A909B955623BF41B90C9F37786F24ACAF8EDCA5D19C272A
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......Z..f.........................................U..........T.......8...........T............+...+......................................................................................................eJ......T.......Lw......................T...........W..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8726
    Entropy (8bit):3.702667917822121
    Encrypted:false
    SSDEEP:192:R6l7wVeJiOsIY6YcDYsxeQgmfTyprt89bos9fq4m:R6lXJz+6Y/sxeQgmfTNoGfU
    MD5:FBA83FA3933345333146FA5CA681FDC3
    SHA1:7669027ADBA0E5A5B030DAC6A5D775F41FECEAD6
    SHA-256:3224885770A7626FA09D92D14AE30688766263C8742C58DC51BB247E65B99909
    SHA-512:C78798A0C3C38BD25E58833924E0B29F7D58C506F37E9E9ABDF26F798C136E48706EF0D81F1907E6B2682D1E3C7F85E0EEB227DE1132C13DC15E339F5B24C2B2
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.8.4.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4637
    Entropy (8bit):4.465802674485702
    Encrypted:false
    SSDEEP:48:cvIwWl8zsmJg771I9CFWpW8VYYu/Ym8M4JiwDVj6FuWyq85ujis3rPdit5Etyd:uIjf8I7107VEiJXI/blI5yyd
    MD5:0A04E699E99651C13B33A0F75C61BE55
    SHA1:2B3B1EF4159AEB0754968B3CD04EA9B51F32C6B9
    SHA-256:D54A770ABEAB878768C4DE7BCBD4F8549A991A94F15B9FD39EFF0609B6B1D208
    SHA-512:787B4B516E3FB3EA5D441E76384718EA9D9482F58B7BEDDB7334541109C05F0FF1D2DDAA12B906549AA00ADEE5BE1C6091CF259E58080C9C75814C810EEBC469
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.393904421036375
    Encrypted:false
    SSDEEP:6144:Ql4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNAHOBSqa:o4vF0MYQUMM6VFYSHU
    MD5:F4C267449B4691AD58594FD54ED0BE1D
    SHA1:B7056A6AE94808D708B54A92636F124DB39EA6FD
    SHA-256:F95080513DC095A4821F3EF5E6A9CE312819CAC7E7F03E70A8FB4BB1427268E8
    SHA-512:4623D9EC65512CC0EA2BDE4E46859DB263622CD09F3656CBD4BC276E3C02AA0EB91AADBC13B60F1C84BBD5B2921BD2FD091A4E2F522FA6FA6F598F4BF6EE7AA3
    Malicious:false
    Reputation:low
    Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm6..x................................................................................................................................................................................................................................................................................................................................................Y@.L........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):4.8758790629705135
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:CuBYV0mfw8.exe
    File size:11'264 bytes
    MD5:24fcec34782973a633ac38da243eca91
    SHA1:c33112fd1fae373668efbf12b630f76af4743123
    SHA256:a38da919a6f75fd511461159accdfdaf29b6fb81a6ecd41ea5d8fc447a106254
    SHA512:7519d27b215490da9d6be2ecc7b33e4d729a4e59bd6be9d9086431d31b57c0ed417e88de699bf2c40328d2e5b0e0318580cef6acded620ba0b6cdb9b1a35f386
    SSDEEP:192:XWK7QLTIB9nCyLeOJyuCNtlvYuC53Q5tf/rUBj:V7QLTIB8gxJbQnK3t
    TLSH:16323B9AFE55C9FBDA2C4239C83F498EE075B602536353CB13B845292F723D069216CE
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S....................I.~.....I.z.....I.{.....I.|.....%.~.......~.......w...............}.....Rich...........................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x140001420
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x66CF731F [Wed Aug 28 18:57:35 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:0db8e5c52f15ac1d17fec9e329483b0a
    Instruction
    dec eax
    sub esp, 28h
    call 00007F43C922DABCh
    dec eax
    add esp, 28h
    jmp 00007F43C922D557h
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    xor ecx, ecx
    call dword ptr [00000C03h]
    dec eax
    mov ecx, ebx
    call dword ptr [00000BF2h]
    call dword ptr [00000BFCh]
    dec eax
    mov ecx, eax
    mov edx, C0000409h
    dec eax
    add esp, 20h
    pop ebx
    dec eax
    jmp dword ptr [00000C20h]
    dec eax
    mov dword ptr [esp+08h], ecx
    dec eax
    sub esp, 38h
    mov ecx, 00000017h
    call dword ptr [00000C04h]
    test eax, eax
    je 00007F43C922D6E9h
    mov ecx, 00000002h
    int 29h
    dec eax
    lea ecx, dword ptr [00001C52h]
    call 00007F43C922D78Eh
    dec eax
    mov eax, dword ptr [esp+38h]
    dec eax
    mov dword ptr [00001D39h], eax
    dec eax
    lea eax, dword ptr [esp+38h]
    dec eax
    add eax, 08h
    dec eax
    mov dword ptr [00001CC9h], eax
    dec eax
    mov eax, dword ptr [00001D22h]
    dec eax
    mov dword ptr [00001B93h], eax
    dec eax
    mov eax, dword ptr [esp+40h]
    dec eax
    mov dword ptr [00001C97h], eax
    mov dword ptr [00001B6Dh], C0000409h
    mov dword ptr [00001B67h], 00000001h
    mov dword ptr [00001B71h], 00000001h
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x90000x180.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0000x30.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x24000x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22c00x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x1c8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xf0c0x100088c96462d773358fe8430e2838dcccaaFalse0.6201171875data5.838527866873385IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x20000x10000x1000149cfce33646da2f43a251742c83708bFalse0.400634765625data4.283646423041657IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x30000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x90000x1800x2001b86f078a2e927e35d1d9f83d3c65c9cFalse0.451171875data2.9715652802116654IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xa0000x1e00x200101f04294dcfeea9dfe10d3c920461d9False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xb0000x300x200eb592baf4f8e32571d60e52a6fb0ea45False0.126953125data0.7195083879349718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0xa0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllVirtualProtect, WaitForSingleObject, CreateThread, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
    WININET.dllInternetOpenW, InternetReadFile, InternetOpenUrlA
    VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
    api-ms-win-crt-runtime-l1-1-0.dllterminate, _cexit, _crt_atexit, _c_exit, _register_onexit_function, _register_thread_local_exe_atexit_callback, _initialize_onexit_table, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, _seh_filter_exe, __p___argc, __p___argv
    api-ms-win-crt-math-l1-1-0.dll__setusermatherr
    api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Aug 30, 2024 12:43:36.715317965 CEST497078888192.168.2.9120.46.149.112
    Aug 30, 2024 12:43:36.745362043 CEST888849707120.46.149.112192.168.2.9
    Aug 30, 2024 12:43:36.745484114 CEST497078888192.168.2.9120.46.149.112
    Aug 30, 2024 12:43:36.745676994 CEST497078888192.168.2.9120.46.149.112
    Aug 30, 2024 12:43:36.773839951 CEST888849707120.46.149.112192.168.2.9
    Aug 30, 2024 12:43:38.961453915 CEST888849707120.46.149.112192.168.2.9
    Aug 30, 2024 12:43:38.961601019 CEST497078888192.168.2.9120.46.149.112
    Aug 30, 2024 12:43:38.961756945 CEST497078888192.168.2.9120.46.149.112
    Aug 30, 2024 12:43:38.985532999 CEST888849707120.46.149.112192.168.2.9
    TimestampSource PortDest PortSource IPDest IP
    Aug 30, 2024 12:44:08.928316116 CEST5365409162.159.36.2192.168.2.9
    Aug 30, 2024 12:44:09.760598898 CEST5178053192.168.2.91.1.1.1
    Aug 30, 2024 12:44:09.834413052 CEST53517801.1.1.1192.168.2.9
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 30, 2024 12:44:09.760598898 CEST192.168.2.91.1.1.10xae53Standard query (0)56.126.166.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 30, 2024 12:44:09.834413052 CEST1.1.1.1192.168.2.90xae53Name error (3)56.126.166.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
    • 120.46.149.112:8888
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.949707120.46.149.11288882284C:\Users\user\Desktop\CuBYV0mfw8.exe
    TimestampBytes transferredDirectionData
    Aug 30, 2024 12:43:36.745676994 CEST96OUTGET /safekey HTTP/1.1
    User-Agent: myapp
    Host: 120.46.149.112:8888
    Cache-Control: no-cache


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:06:43:35
    Start date:30/08/2024
    Path:C:\Users\user\Desktop\CuBYV0mfw8.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\CuBYV0mfw8.exe"
    Imagebase:0x7ff6670b0000
    File size:11'264 bytes
    MD5 hash:24FCEC34782973A633AC38DA243ECA91
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:5
    Start time:06:43:38
    Start date:30/08/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 2284 -s 1060
    Imagebase:0x7ff640e00000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:25%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:25.8%
      Total number of Nodes:66
      Total number of Limit Nodes:3
      execution_graph 374 7ff6670b11c0 375 7ff6670b11d0 374->375 387 7ff6670b1638 375->387 377 7ff6670b1928 9 API calls 378 7ff6670b1275 377->378 379 7ff6670b11f4 _RTC_Initialize 385 7ff6670b1257 379->385 395 7ff6670b18c0 InitializeSListHead 379->395 385->377 386 7ff6670b1265 385->386 388 7ff6670b1649 387->388 392 7ff6670b167b 387->392 389 7ff6670b16b8 388->389 393 7ff6670b164e __scrt_acquire_startup_lock 388->393 390 7ff6670b1928 9 API calls 389->390 391 7ff6670b16c2 390->391 392->379 393->392 394 7ff6670b166b _initialize_onexit_table 393->394 394->392 396 7ff6670b1420 399 7ff6670b1800 396->399 400 7ff6670b1823 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 399->400 401 7ff6670b1429 399->401 400->401 325 7ff6670b12a4 326 7ff6670b12bd __scrt_initialize_crt 325->326 327 7ff6670b12c5 __scrt_acquire_startup_lock 326->327 328 7ff6670b13fb 326->328 330 7ff6670b1405 327->330 336 7ff6670b12e3 __scrt_release_startup_lock 327->336 354 7ff6670b1928 IsProcessorFeaturePresent 328->354 331 7ff6670b1928 9 API calls 330->331 332 7ff6670b1410 331->332 334 7ff6670b1418 _exit 332->334 333 7ff6670b1308 335 7ff6670b138e _get_initial_narrow_environment __p___argv __p___argc 345 7ff6670b1000 335->345 336->333 336->335 339 7ff6670b1386 _register_thread_local_exe_atexit_callback 336->339 339->335 342 7ff6670b13bb 343 7ff6670b13c0 _cexit 342->343 344 7ff6670b13c5 342->344 343->344 344->333 346 7ff6670b1060 345->346 346->346 347 7ff6670b10a7 InternetOpenW InternetOpenUrlA InternetReadFile 346->347 348 7ff6670b1110 347->348 348->348 349 7ff6670b1125 VirtualProtect CreateThread WaitForSingleObject 348->349 360 7ff6670b11a0 349->360 352 7ff6670b1a7c GetModuleHandleW 353 7ff6670b13b7 352->353 353->332 353->342 355 7ff6670b194e 354->355 356 7ff6670b195c memset RtlCaptureContext RtlLookupFunctionEntry 355->356 357 7ff6670b19d2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 356->357 358 7ff6670b1996 RtlVirtualUnwind 356->358 359 7ff6670b1a56 357->359 358->357 359->330 361 7ff6670b11a9 360->361 362 7ff6670b1468 IsProcessorFeaturePresent 361->362 363 7ff6670b1177 361->363 364 7ff6670b1480 362->364 363->352 369 7ff6670b153c RtlCaptureContext 364->369 370 7ff6670b1556 RtlLookupFunctionEntry 369->370 371 7ff6670b1493 370->371 372 7ff6670b156c RtlVirtualUnwind 370->372 373 7ff6670b1434 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 371->373 372->370 372->371 402 7ff6670b13d2 403 7ff6670b1a7c GetModuleHandleW 402->403 404 7ff6670b13d9 403->404 405 7ff6670b1418 _exit 404->405 406 7ff6670b13dd 404->406 407 7ff6670b1288 411 7ff6670b1ad0 SetUnhandledExceptionFilter 407->411 412 7ff6670b1ed6 _seh_filter_exe

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00007FF6670B18D0 1 Function_00007FF6670B1AD0 2 Function_00007FF6670B1910 3 Function_00007FF6670B18D4 4 Function_00007FF6670B1E14 26 Function_00007FF6670B1E34 4->26 5 Function_00007FF6670B1755 6 Function_00007FF6670B13D2 20 Function_00007FF6670B1A7C 6->20 7 Function_00007FF6670B1288 7->1 32 Function_00007FF6670B18AC 7->32 8 Function_00007FF6670B11C0 8->0 8->3 9 Function_00007FF6670B18C0 8->9 14 Function_00007FF6670B1904 8->14 15 Function_00007FF6670B18B8 8->15 16 Function_00007FF6670B1638 8->16 18 Function_00007FF6670B1B3C 8->18 21 Function_00007FF6670B18B0 8->21 27 Function_00007FF6670B18E8 8->27 28 Function_00007FF6670B17E8 8->28 29 Function_00007FF6670B1928 8->29 8->32 10 Function_00007FF6670B1000 37 Function_00007FF6670B11A0 10->37 11 Function_00007FF6670B1800 12 Function_00007FF6670B1780 12->0 13 Function_00007FF6670B16C4 16->29 33 Function_00007FF6670B1D60 16->33 17 Function_00007FF6670B1B78 19 Function_00007FF6670B153C 22 Function_00007FF6670B15B0 22->33 23 Function_00007FF6670B1EF4 24 Function_00007FF6670B1434 25 Function_00007FF6670B1BB4 34 Function_00007FF6670B18E0 27->34 40 Function_00007FF6670B18D8 27->40 31 Function_00007FF6670B17AC 28->31 36 Function_00007FF6670B1920 29->36 30 Function_00007FF6670B15EC 30->0 30->25 35 Function_00007FF6670B1AE0 37->19 37->24 38 Function_00007FF6670B1420 38->11 39 Function_00007FF6670B12A4 39->2 39->10 39->12 39->13 39->20 39->22 39->29 39->30 41 Function_00007FF6670B1918 39->41 43 Function_00007FF6670B175C 39->43 42 Function_00007FF6670B1ED6 43->33

      Control-flow Graph

      APIs
      Strings
      • wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww, xrefs: 00007FF6670B10E3
      • myapp, xrefs: 00007FF6670B10B1
      Memory Dump Source
      • Source File: 00000000.00000002.1654672476.00007FF6670B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6670B0000, based on PE: true
      • Associated: 00000000.00000002.1654659555.00007FF6670B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654686030.00007FF6670B2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654700254.00007FF6670B3000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654713806.00007FF6670B9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6670b0000_CuBYV0mfw8.jbxd
      Similarity
      • API ID: Internet$Open$CreateFileObjectProtectReadSingleThreadVirtualWait
      • String ID: myapp$wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
      • API String ID: 593446812-1813571026
      • Opcode ID: 6db2787b2b681c366b50bb193a2d47e1d1dd6e04e8102f7de7f4fd3cff74cb49
      • Instruction ID: 39158197eb4a6a087eb30c5557b990598ff0a11307e7f180d657809091b41c1b
      • Opcode Fuzzy Hash: 6db2787b2b681c366b50bb193a2d47e1d1dd6e04e8102f7de7f4fd3cff74cb49
      • Instruction Fuzzy Hash: 1641C362A1C785C5E710CF24E82436A7BA0FB89BA0F855335DA6DCA795DF3EE244C710

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1654672476.00007FF6670B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6670B0000, based on PE: true
      • Associated: 00000000.00000002.1654659555.00007FF6670B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654686030.00007FF6670B2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654700254.00007FF6670B3000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654713806.00007FF6670B9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6670b0000_CuBYV0mfw8.jbxd
      Similarity
      • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
      • String ID:
      • API String ID: 120244420-0
      • Opcode ID: 21faecffb1654155e85e37b132e2b218755d95f16f95e8065a8fce10666f5727
      • Instruction ID: 72a2adb4a5c2962913a64363877c20c9529afa81bf2f8557bded1eae74eb9843
      • Opcode Fuzzy Hash: 21faecffb1654155e85e37b132e2b218755d95f16f95e8065a8fce10666f5727
      • Instruction Fuzzy Hash: 2F311DA1A0C242D1FA14AB25D4713B912B1AF45F84F944434E64ECF6D7EE2FBA498270

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1654672476.00007FF6670B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6670B0000, based on PE: true
      • Associated: 00000000.00000002.1654659555.00007FF6670B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654686030.00007FF6670B2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654700254.00007FF6670B3000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654713806.00007FF6670B9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6670b0000_CuBYV0mfw8.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 313767242-0
      • Opcode ID: 723ab167431671cd83015a940b4d417ce78bd0aa11cfcaffc68cebdf1708c196
      • Instruction ID: a8e9a63952107a727f0fed00006b8d4131dada4775d46467dc599b8c3f0a6a7b
      • Opcode Fuzzy Hash: 723ab167431671cd83015a940b4d417ce78bd0aa11cfcaffc68cebdf1708c196
      • Instruction Fuzzy Hash: 2D310EB2619A81C5EB60DF60E8603E97375FB84B44F44443ADA4ECBA95DF39E648C720
      Memory Dump Source
      • Source File: 00000000.00000002.1654672476.00007FF6670B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6670B0000, based on PE: true
      • Associated: 00000000.00000002.1654659555.00007FF6670B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654686030.00007FF6670B2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654700254.00007FF6670B3000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1654713806.00007FF6670B9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6670b0000_CuBYV0mfw8.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 59327fd12074163816e29100249c6c1c2d9d5627ca0cdc85a67b6fdbae144eaf
      • Instruction ID: f0f0a8b98be76103c362a3d692dae08bec96217f912284fd3bd5d3d784535201
      • Opcode Fuzzy Hash: 59327fd12074163816e29100249c6c1c2d9d5627ca0cdc85a67b6fdbae144eaf
      • Instruction Fuzzy Hash: 78A002A2A1CC02D0E644DB40ED701312330FB50B80F504831D11ED95B1DF3EB644C320