Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lApMYpXACB.exe

Overview

General Information

Sample name:lApMYpXACB.exe
renamed because original name is a hash value
Original sample name:cf8a0e1dd37a644849a2a0fd44edfb76dd1bdf822f3fdd6cdfa75d8aeb2c6bef.exe
Analysis ID:1501759
MD5:5eaf0bdcca1e8ef9a1790cb2fd5f8d5c
SHA1:c3776dc694835a245735da3a9a4ad045172230dc
SHA256:cf8a0e1dd37a644849a2a0fd44edfb76dd1bdf822f3fdd6cdfa75d8aeb2c6bef
Tags:120-46-149-112exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • lApMYpXACB.exe (PID: 4476 cmdline: "C:\Users\user\Desktop\lApMYpXACB.exe" MD5: 5EAF0BDCCA1E8EF9A1790CB2FD5F8D5C)
    • WerFault.exe (PID: 4260 cmdline: C:\Windows\system32\WerFault.exe -u -p 4476 -s 1120 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\lApMYpXACB.exe, Initiated: true, ProcessId: 4476, Protocol: tcp, SourceIp: 192.168.2.11, SourceIsIpv6: false, SourcePort: 49701
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: lApMYpXACB.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: lApMYpXACB.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\dy_load\x64\Release\dy_load.pdb source: lApMYpXACB.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 8888
Source: global trafficTCP traffic: 192.168.2.11:49701 -> 120.46.149.112:8888
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\lApMYpXACB.exeCode function: 0_2_00007FF6D4DB1000 InternetOpenW,InternetOpenUrlA,InternetReadFile,GetModuleHandleW,GetProcAddress,VirtualProtect,0_2_00007FF6D4DB1000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: lApMYpXACB.exe, 00000000.00000002.1724310824.00000025805FA000.00000004.00000010.00020000.00000000.sdmp, lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey?
Source: lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyc
Source: lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeye1
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\lApMYpXACB.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4476 -s 1120
Source: classification engineClassification label: mal56.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4476
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\33b203cb-cdf0-409a-9172-6e1b107c32e3Jump to behavior
Source: lApMYpXACB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\lApMYpXACB.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: lApMYpXACB.exeReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Users\user\Desktop\lApMYpXACB.exe "C:\Users\user\Desktop\lApMYpXACB.exe"
Source: C:\Users\user\Desktop\lApMYpXACB.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4476 -s 1120
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: lApMYpXACB.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: lApMYpXACB.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: lApMYpXACB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\dy_load\x64\Release\dy_load.pdb source: lApMYpXACB.exe
Source: lApMYpXACB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: lApMYpXACB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: lApMYpXACB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: lApMYpXACB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: lApMYpXACB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8CA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\lApMYpXACB.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\lApMYpXACB.exeCode function: 0_2_00007FF6D4DB1918 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D4DB1918
Source: C:\Users\user\Desktop\lApMYpXACB.exeCode function: 0_2_00007FF6D4DB1424 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6D4DB1424
Source: C:\Users\user\Desktop\lApMYpXACB.exeCode function: 0_2_00007FF6D4DB1918 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D4DB1918
Source: C:\Users\user\Desktop\lApMYpXACB.exeCode function: 0_2_00007FF6D4DB1AC0 SetUnhandledExceptionFilter,0_2_00007FF6D4DB1AC0
Source: C:\Users\user\Desktop\lApMYpXACB.exeCode function: 0_2_00007FF6D4DB17F0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6D4DB17F0
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
lApMYpXACB.exe34%ReversingLabsWin64.Trojan.MintZard
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekeye10%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyc0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey?0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyclApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey?lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C80000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeye1lApMYpXACB.exe, 00000000.00000002.1724475143.0000019AC8C2B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501759
Start date and time:2024-08-30 12:42:24 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:lApMYpXACB.exe
renamed because original name is a hash value
Original Sample Name:cf8a0e1dd37a644849a2a0fd44edfb76dd1bdf822f3fdd6cdfa75d8aeb2c6bef.exe
Detection:MAL
Classification:mal56.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: lApMYpXACB.exe
TimeTypeDescription
06:44:05API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNpDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
sora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
  • 36.126.70.65
sora.mips.elfGet hashmaliciousUnknownBrowse
  • 211.103.157.253
firmware.m68k.elfGet hashmaliciousUnknownBrowse
  • 101.54.87.28
firmware.sh4.elfGet hashmaliciousUnknownBrowse
  • 110.232.49.249
KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
  • 116.128.44.170
KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
  • 117.119.126.204
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.885225534773804
Encrypted:false
SSDEEP:96:xyFRkywXsUhqMe7qJf6QXIDcQAc6zcEmcw3OK+HbHg/ZjWORXyGLGCI72bBuOyPe:ArkNXgoD0O3ccjIxVzuiFgZ24lO8Q
MD5:1C2463C49E3053ED85C93E00E33F3964
SHA1:D2FEBE73DA0C3131B03E158507CED8F1832DA92D
SHA-256:73970F1EA79F742DE6CBE98BA28D9008FBF54D3DB868257F1FA55A22189C5233
SHA-512:D36BF1E7CD67D6AC38D8DDC65A195CBCAA173F339AAA10FADCA6CFED494D8FC9D837F7A91C8C9A8C6C507707249AE2E8A5726107AC800F3B201FD3BA44B128C9
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.2.2.3.8.9.2.0.9.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.2.2.4.2.8.2.7.2.4.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.c.2.4.a.1.3.7.-.c.0.a.d.-.4.3.6.c.-.8.9.4.8.-.e.2.3.4.c.d.8.6.4.e.d.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.4.c.0.2.e.c.-.f.e.9.a.-.4.d.6.b.-.a.f.6.4.-.5.6.b.c.a.b.1.f.0.d.e.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.l.A.p.M.Y.p.X.A.C.B...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.7.c.-.0.0.0.1.-.0.0.1.3.-.1.a.3.7.-.e.c.7.8.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.1.a.6.f.6.3.8.4.7.a.4.d.d.c.3.1.1.8.7.2.c.6.b.d.f.a.a.6.c.b.d.0.0.0.0.f.f.f.f.!.0.0.0.0.c.3.7.7.6.d.c.6.9.4.8.3.5.a.2.4.5.7.3.5.d.a.3.a.9.a.4.a.d.0.4.5.1.7.2.2.3.0.d.c.!.l.A.p.M.Y.p.X.A.C.B...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.8.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:44 2024, 0x1205a4 type
Category:dropped
Size (bytes):144454
Entropy (8bit):1.3752639928266306
Encrypted:false
SSDEEP:768:Og+88sirYZqEyXom5e8rHJquIrVToFm1bvXi9c:OY8DEyYKrJquIrVToFybvXiK
MD5:F19CD13C173DFA72EDBD6A9CD1F612F7
SHA1:B103ADEB5C32B7E17A9C0B9FB18E8B6CF27B49E3
SHA-256:B2197A762EE06584426D17AAE1C97AD3F48D86854BDDCDEC22142081FD62769C
SHA-512:10F32FED2F681539D888E6BBA3DC6633501FD603E21398B6F0AC27F21ADC02D4F204F391AD49E88C07697C41AA3815616F1E293522E07955CF5D7ACAD9CDC093
Malicious:false
Reputation:low
Preview:MDMP..a..... .......`..f.........................................P..........T.......8...........T...........X+..........................................................................................................eJ......$.......Lw......................T.......|...Z..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8728
Entropy (8bit):3.7063768808443527
Encrypted:false
SSDEEP:192:R6l7wVeJ57pa96YeAfg7ggmfpqzprO89bjEUfyBm:R6lXJ1o6YJf6ggmfpqJjPf9
MD5:811A2E396B7F1C6CA96832231965D8F8
SHA1:0BE021B13AD21CBB5F9325F5BBC5831DC7FB8FC4
SHA-256:367320731B4CAC655F7B964EC1188AE234906AFE93B9F3222CCCA090E0D74F71
SHA-512:3A2509455F817150154A6BB2078BB8FAAAA79EDD7DAE75AE77CC924B5DE1DD4FA4D95B56110D17696D88D4FC32BF3F745642CEA73FA35B7442AC34B4D468EF95
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.4.7.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4637
Entropy (8bit):4.470202741096936
Encrypted:false
SSDEEP:48:cvIwWl8zsmJg771I9n0WpW8VYYrKPYm8M4JGLFsyq85TYlPgRhdd:uIjf8I7It7VRKSJlRhgRhdd
MD5:D6B9DC7ABB9E684DF8DECBD2B2503917
SHA1:CD3AEB8AA5A59683E6738DC0AB5EFA26D18E229C
SHA-256:F7F660EDBBB9C59BA7AFC6E6690BC7D03C2F0A2B551253FD8C016751A6A5B411
SHA-512:74D26F6E1E1F24E06C9EAFDADE05AE1D935062A3D140927475BBFD353FC1F60DB05C9F097137D3DB7262AB6E7E135F04DAA93CEE889F5982DBA671125B1340BA
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.298936406923639
Encrypted:false
SSDEEP:6144:hECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lzSD6VJSRH0:2CsL6seqD5SKSWVARU
MD5:7B1AC5367098F6A0928BEF92B0B0D25B
SHA1:D4759A0035CDD61B89E1258F80BB32A864221FBD
SHA-256:74B179D361418EB387A8A9DCB0894F25C911200C63ACC6FD37DA45EC5A3B8EF1
SHA-512:B5E41171CE8E5673F119320313C0155594F392C6AAE84ECB759959C628B4756E0D40E7A3D308AE7E68A89DFB3B65797081A8705949B08EB1EBFE7B208BDF2E1E
Malicious:false
Reputation:low
Preview:regfE...E....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...|...................................................................................................................................................................................................................................................................................................................................................H........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.86501416650091
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:lApMYpXACB.exe
File size:11'264 bytes
MD5:5eaf0bdcca1e8ef9a1790cb2fd5f8d5c
SHA1:c3776dc694835a245735da3a9a4ad045172230dc
SHA256:cf8a0e1dd37a644849a2a0fd44edfb76dd1bdf822f3fdd6cdfa75d8aeb2c6bef
SHA512:8e3cf1fcef438e8a84521a585312631bf7e0c9ade48b315184db5842885ee91a34f12d1f1c7bbd276bdc0454b4c91370e751d35a1d9f8124df59476df27e3987
SSDEEP:96:vcQiY3/Dq00tUahr9LtJqLzeA1JUs70fJkhl9Evc7r8m73Q5tf0QrOUx:0QLvDuUy6zehxkzOvc7h3Q5tf/r
TLSH:24323B4AFF42C9F7CA580239C97B065FE075BA02672263CB13B848393F6279165512CD
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S....................y.~.....y.z.....y.{.....y.|.......~.......~.......w...............}.....Rich....................PE..d..
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001410
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CF8D4F [Wed Aug 28 20:49:19 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:ff7b2f235647812a067ab497aed38290
Instruction
dec eax
sub esp, 28h
call 00007F8FA0AF63BCh
dec eax
add esp, 28h
jmp 00007F8FA0AF5E57h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000C0Bh]
dec eax
mov ecx, ebx
call dword ptr [00000BFAh]
call dword ptr [00000C04h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C20h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000C04h]
test eax, eax
je 00007F8FA0AF5FE9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001C62h]
call 00007F8FA0AF608Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001D49h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001CD9h], eax
dec eax
mov eax, dword ptr [00001D32h]
dec eax
mov dword ptr [00001BA3h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001CA7h], eax
mov dword ptr [00001B7Dh], C0000409h
mov dword ptr [00001B77h], 00000001h
mov dword ptr [00001B81h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x90000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24100x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22d00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1b8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xefc0x1000d3f3e63aa937dc3c264e35082df3b96aFalse0.62548828125zlib compressed data5.851034166612263IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xfca0x1000000d79cd541cbb3541a8f9fc0a1bb4acFalse0.398681640625data4.251679214639572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x90000x1800x20065ae3d93c45bef4a7ff82fc9a2536e2dFalse0.451171875data2.9618288586530896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xa0000x1e00x200101f04294dcfeea9dfe10d3c920461d9False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xb0000x300x20024c047d9c90a24c929eab85a2309484aFalse0.125data0.7234635166476029IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xa0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllGetProcAddress, GetModuleHandleW, RtlLookupFunctionEntry, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenW, InternetReadFile, InternetOpenUrlA
VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, terminate, __p___argv, _register_onexit_function, _cexit, _c_exit, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _initialize_onexit_table, _set_app_type, _seh_filter_exe, _register_thread_local_exe_atexit_callback, __p___argc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:43:40.340153933 CEST497018888192.168.2.11120.46.149.112
Aug 30, 2024 12:43:40.354279995 CEST888849701120.46.149.112192.168.2.11
Aug 30, 2024 12:43:40.354446888 CEST497018888192.168.2.11120.46.149.112
Aug 30, 2024 12:43:40.354588985 CEST497018888192.168.2.11120.46.149.112
Aug 30, 2024 12:43:40.365401983 CEST888849701120.46.149.112192.168.2.11
Aug 30, 2024 12:43:44.797286987 CEST888849701120.46.149.112192.168.2.11
Aug 30, 2024 12:43:44.797384977 CEST497018888192.168.2.11120.46.149.112
Aug 30, 2024 12:43:44.797503948 CEST497018888192.168.2.11120.46.149.112
Aug 30, 2024 12:43:44.864816904 CEST888849701120.46.149.112192.168.2.11
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.1149701120.46.149.11288884476C:\Users\user\Desktop\lApMYpXACB.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:43:40.354588985 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:43:38
Start date:30/08/2024
Path:C:\Users\user\Desktop\lApMYpXACB.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\lApMYpXACB.exe"
Imagebase:0x7ff6d4db0000
File size:11'264 bytes
MD5 hash:5EAF0BDCCA1E8EF9A1790CB2FD5F8D5C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:43:43
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 4476 -s 1120
Imagebase:0x7ff664a00000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:23.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:26.9%
    Total number of Nodes:67
    Total number of Limit Nodes:3
    execution_graph 376 7ff6d4db11b0 377 7ff6d4db11c0 376->377 389 7ff6d4db1628 377->389 379 7ff6d4db1918 9 API calls 380 7ff6d4db1265 379->380 381 7ff6d4db11e4 _RTC_Initialize 387 7ff6d4db1247 381->387 397 7ff6d4db18b0 InitializeSListHead 381->397 387->379 388 7ff6d4db1255 387->388 390 7ff6d4db1639 389->390 394 7ff6d4db166b 389->394 391 7ff6d4db16a8 390->391 395 7ff6d4db163e __scrt_acquire_startup_lock 390->395 392 7ff6d4db1918 9 API calls 391->392 393 7ff6d4db16b2 392->393 394->381 395->394 396 7ff6d4db165b _initialize_onexit_table 395->396 396->394 398 7ff6d4db1410 401 7ff6d4db17f0 398->401 402 7ff6d4db1813 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 401->402 403 7ff6d4db1419 401->403 402->403 326 7ff6d4db1294 327 7ff6d4db12ad __scrt_initialize_crt 326->327 328 7ff6d4db12b5 __scrt_acquire_startup_lock 327->328 329 7ff6d4db13eb 327->329 331 7ff6d4db13f5 328->331 337 7ff6d4db12d3 __scrt_release_startup_lock 328->337 356 7ff6d4db1918 IsProcessorFeaturePresent 329->356 332 7ff6d4db1918 9 API calls 331->332 333 7ff6d4db1400 332->333 335 7ff6d4db1408 _exit 333->335 334 7ff6d4db12f8 336 7ff6d4db137e _get_initial_narrow_environment __p___argv __p___argc 346 7ff6d4db1000 336->346 337->334 337->336 341 7ff6d4db1376 _register_thread_local_exe_atexit_callback 337->341 341->336 343 7ff6d4db13ab 344 7ff6d4db13b0 _cexit 343->344 345 7ff6d4db13b5 343->345 344->345 345->334 347 7ff6d4db1060 346->347 347->347 348 7ff6d4db1096 InternetOpenW InternetOpenUrlA InternetReadFile 347->348 349 7ff6d4db10f0 348->349 349->349 350 7ff6d4db1106 GetModuleHandleW GetProcAddress VirtualProtect 349->350 351 7ff6d4db1155 350->351 362 7ff6d4db1190 351->362 354 7ff6d4db1a6c GetModuleHandleW 355 7ff6d4db13a7 354->355 355->333 355->343 357 7ff6d4db193e 356->357 358 7ff6d4db194c memset RtlCaptureContext RtlLookupFunctionEntry 357->358 359 7ff6d4db19c2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 358->359 360 7ff6d4db1986 RtlVirtualUnwind 358->360 361 7ff6d4db1a46 359->361 360->359 361->331 363 7ff6d4db1199 362->363 364 7ff6d4db1163 363->364 365 7ff6d4db1458 IsProcessorFeaturePresent 363->365 364->354 366 7ff6d4db1470 365->366 371 7ff6d4db152c RtlCaptureContext 366->371 372 7ff6d4db1546 RtlLookupFunctionEntry 371->372 373 7ff6d4db1483 372->373 374 7ff6d4db155c RtlVirtualUnwind 372->374 375 7ff6d4db1424 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 373->375 374->372 374->373 404 7ff6d4db13c2 405 7ff6d4db1a6c GetModuleHandleW 404->405 406 7ff6d4db13c9 405->406 407 7ff6d4db1408 _exit 406->407 408 7ff6d4db13cd 406->408 409 7ff6d4db1278 413 7ff6d4db1ac0 SetUnhandledExceptionFilter 409->413 414 7ff6d4db1ec6 _seh_filter_exe

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6D4DB18A0 1 Function_00007FF6D4DB15A0 36 Function_00007FF6D4DB1D50 1->36 2 Function_00007FF6D4DB1E24 3 Function_00007FF6D4DB1BA4 4 Function_00007FF6D4DB1424 5 Function_00007FF6D4DB1EE4 6 Function_00007FF6D4DB1918 33 Function_00007FF6D4DB1910 6->33 7 Function_00007FF6D4DB18D8 37 Function_00007FF6D4DB18D0 7->37 41 Function_00007FF6D4DB18C8 7->41 8 Function_00007FF6D4DB17D8 9 Function_00007FF6D4DB179C 8->9 10 Function_00007FF6D4DB189C 11 Function_00007FF6D4DB15DC 11->3 27 Function_00007FF6D4DB18C0 11->27 12 Function_00007FF6D4DB11B0 12->0 12->6 12->7 12->8 12->10 13 Function_00007FF6D4DB18B0 12->13 17 Function_00007FF6D4DB18F4 12->17 18 Function_00007FF6D4DB18A8 12->18 19 Function_00007FF6D4DB1628 12->19 22 Function_00007FF6D4DB1B2C 12->22 12->27 29 Function_00007FF6D4DB18C4 12->29 14 Function_00007FF6D4DB17F0 15 Function_00007FF6D4DB1770 15->27 16 Function_00007FF6D4DB16B4 19->6 19->36 20 Function_00007FF6D4DB1B68 21 Function_00007FF6D4DB152C 23 Function_00007FF6D4DB1A6C 24 Function_00007FF6D4DB1000 35 Function_00007FF6D4DB1190 24->35 25 Function_00007FF6D4DB1900 26 Function_00007FF6D4DB1AC0 28 Function_00007FF6D4DB1E04 28->2 30 Function_00007FF6D4DB1745 31 Function_00007FF6D4DB13C2 31->23 32 Function_00007FF6D4DB1278 32->10 32->26 34 Function_00007FF6D4DB1410 34->14 35->4 35->21 38 Function_00007FF6D4DB1AD0 39 Function_00007FF6D4DB1294 39->1 39->6 39->11 39->15 39->16 39->23 39->24 39->25 40 Function_00007FF6D4DB1908 39->40 43 Function_00007FF6D4DB174C 39->43 42 Function_00007FF6D4DB1EC6 43->36

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1724656947.00007FF6D4DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D4DB0000, based on PE: true
    • Associated: 00000000.00000002.1724643143.00007FF6D4DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724670332.00007FF6D4DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724685682.00007FF6D4DB3000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724699629.00007FF6D4DB9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d4db0000_lApMYpXACB.jbxd
    Similarity
    • API ID: Internet$Open$AddressFileHandleModuleProcProtectReadVirtual
    • String ID: Virt$kernel32.dll$myapp$rote$ualP$wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
    • API String ID: 2325789133-2589809954
    • Opcode ID: fe0ff88531906ef1e1846375e825562c8fb7a08f8dfbf3bb8a36f0af6950caf2
    • Instruction ID: c5ff0e46d1d2b7e4b0974699a7f46257a2f746f3c1553d75e2df564ac7f8ef10
    • Opcode Fuzzy Hash: fe0ff88531906ef1e1846375e825562c8fb7a08f8dfbf3bb8a36f0af6950caf2
    • Instruction Fuzzy Hash: 4B419C22A08A8599E7108F34E8943AD3771FB08798F445736DA6D87B98DF3CE668C700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1724656947.00007FF6D4DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D4DB0000, based on PE: true
    • Associated: 00000000.00000002.1724643143.00007FF6D4DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724670332.00007FF6D4DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724685682.00007FF6D4DB3000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724699629.00007FF6D4DB9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d4db0000_lApMYpXACB.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 3e4c90085fa03e050e8b8fcd9836695b6da6c08f82148be68f26f8a9dfbf57a2
    • Instruction ID: c9ea9e43f5f0dd4f5effce59e92b1b559ee04629e573572998a4a3d93cb147b7
    • Opcode Fuzzy Hash: 3e4c90085fa03e050e8b8fcd9836695b6da6c08f82148be68f26f8a9dfbf57a2
    • Instruction Fuzzy Hash: 14310721A0C24381EA14AF6194D53BE22B1AF467C4F44473AEA5EC77DBEE2DEC648350

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1724656947.00007FF6D4DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D4DB0000, based on PE: true
    • Associated: 00000000.00000002.1724643143.00007FF6D4DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724670332.00007FF6D4DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724685682.00007FF6D4DB3000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724699629.00007FF6D4DB9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d4db0000_lApMYpXACB.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 19cf2d652879b9fc5f9090418499394b955c44b4bd9b7bd273b43b9fbab5bdd7
    • Instruction ID: 282bd381f0c2a5af6b8b91f20ba3d9bead7cf14c95592b83a63b89dc48b0d916
    • Opcode Fuzzy Hash: 19cf2d652879b9fc5f9090418499394b955c44b4bd9b7bd273b43b9fbab5bdd7
    • Instruction Fuzzy Hash: 37315E72709A8186EB608F60E8903ED7371FB84784F44453ADA9E87A98DF3CDA59C700
    Memory Dump Source
    • Source File: 00000000.00000002.1724656947.00007FF6D4DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D4DB0000, based on PE: true
    • Associated: 00000000.00000002.1724643143.00007FF6D4DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724670332.00007FF6D4DB2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724685682.00007FF6D4DB3000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1724699629.00007FF6D4DB9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d4db0000_lApMYpXACB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5b85cb87047ac72ca97d65a6199dc1e9b699368a38447657b402fd6b0eeab6fe
    • Instruction ID: e8a7ad72143f66855a8705f456a795c6289938beddffff54e2f893c4cdee5c17
    • Opcode Fuzzy Hash: 5b85cb87047ac72ca97d65a6199dc1e9b699368a38447657b402fd6b0eeab6fe
    • Instruction Fuzzy Hash: D7A00122A08C06D0E6488B02E9941282231FB50780B404232D06EA14A4DE2CA821C300