Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CKC6pZyjtH.exe

Overview

General Information

Sample name:CKC6pZyjtH.exe
renamed because original name is a hash value
Original sample name:0a467ca96c01689eba7fd5c085d0691dfc13b3951a2c50e800220f6f3207455b.exe
Analysis ID:1501761
MD5:ebcd0fb65db6edae2c57ff204aceae76
SHA1:94a10604b7016cccd6867cfe3e7f371caaf83d5f
SHA256:0a467ca96c01689eba7fd5c085d0691dfc13b3951a2c50e800220f6f3207455b
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • CKC6pZyjtH.exe (PID: 6992 cmdline: "C:\Users\user\Desktop\CKC6pZyjtH.exe" MD5: EBCD0FB65DB6EDAE2C57FF204ACEAE76)
    • WerFault.exe (PID: 5868 cmdline: C:\Windows\system32\WerFault.exe -u -p 6992 -s 1116 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\CKC6pZyjtH.exe, Initiated: true, ProcessId: 6992, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: CKC6pZyjtH.exeVirustotal: Detection: 16%Perma Link
Source: CKC6pZyjtH.exeReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: CKC6pZyjtH.exeJoe Sandbox ML: detected
Source: CKC6pZyjtH.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\verysafe\x64\Release\verysafe.pdb source: CKC6pZyjtH.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 120.46.149.112:8888
Source: Joe Sandbox ViewIP Address: 120.46.149.112 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC471000 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,RtlAllocateHeap,memcpy,CreateThread,WaitForSingleObject,0_2_00007FF6EC471000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: CKC6pZyjtH.exe, 00000000.00000002.1863241680.0000002DE46FA000.00000004.00000010.00020000.00000000.sdmp, CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmp, CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E44084C000.00000004.00000020.00020000.00000000.sdmp, CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey;
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyB
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyX
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeya
Source: CKC6pZyjtH.exe, 00000000.00000002.1863241680.0000002DE46FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeybrQ
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeynamic
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC4710000_2_00007FF6EC471000
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6992 -s 1116
Source: classification engineClassification label: mal60.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6992
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8aa4e936-f0db-40e3-9fad-8fa94e18416bJump to behavior
Source: CKC6pZyjtH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: CKC6pZyjtH.exeVirustotal: Detection: 16%
Source: CKC6pZyjtH.exeReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Users\user\Desktop\CKC6pZyjtH.exe "C:\Users\user\Desktop\CKC6pZyjtH.exe"
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6992 -s 1116
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: CKC6pZyjtH.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: CKC6pZyjtH.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: CKC6pZyjtH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\verysafe\x64\Release\verysafe.pdb source: CKC6pZyjtH.exe
Source: CKC6pZyjtH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: CKC6pZyjtH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: CKC6pZyjtH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: CKC6pZyjtH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: CKC6pZyjtH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E440904000.00000004.00000020.00020000.00000000.sdmp, CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC471998 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6EC471998
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC471998 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6EC471998
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC4714A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6EC4714A4
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC471B40 SetUnhandledExceptionFilter,0_2_00007FF6EC471B40
Source: C:\Users\user\Desktop\CKC6pZyjtH.exeCode function: 0_2_00007FF6EC471870 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6EC471870
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
CKC6pZyjtH.exe16%VirustotalBrowse
CKC6pZyjtH.exe13%ReversingLabs
CKC6pZyjtH.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekeya0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyB0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeybrQ0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey;0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeynamic0%Avira URL Cloudsafe
http://120.46.149.112/1%VirustotalBrowse
http://120.46.149.112:8888/safekeya1%VirustotalBrowse
http://120.46.149.112:8888/safekeyX0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey4%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyBCKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://120.46.149.112/CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408C1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyaCKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeybrQCKC6pZyjtH.exe, 00000000.00000002.1863241680.0000002DE46FA000.00000004.00000010.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey;CKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeynamicCKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyXCKC6pZyjtH.exe, 00000000.00000002.1864268103.000001E4408DD000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501761
Start date and time:2024-08-30 12:45:50 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:CKC6pZyjtH.exe
renamed because original name is a hash value
Original Sample Name:0a467ca96c01689eba7fd5c085d0691dfc13b3951a2c50e800220f6f3207455b.exe
Detection:MAL
Classification:mal60.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.42.65.92
  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
06:47:00API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNlApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
sora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8894030516992996
Encrypted:false
SSDEEP:96:WhFrntTEsVhqPvod7JfKQXIDcQqc6mcEKcw34e0+HbHg/ZjWORXyGLGCI72bBuO2:mhntTEbPI0kigMyjIJVzuiFVZ24lO8X
MD5:32E448BD8B309CE18020513D4B452F86
SHA1:9FBF8976FC7664270E461546BB02F2CEE2A5011A
SHA-256:66196A820C627C2304F411CECD0BCE9F858F2BA56B9AB4E36BB1F5FE9A8B7AC8
SHA-512:B6CDB5C14ADF264EF929CCCC8C4C4873C16DA6D3AACDFBA6DCBA43BEAE0E84CC8C3BF8A14F423B2699FFF140D6F44A4F97F317970105D71EB0A051860C95C13C
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.4.0.3.7.4.6.5.8.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.4.0.4.0.9.0.3.4.6.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.1.7.e.c.8.b.7.-.8.5.1.b.-.4.7.6.f.-.9.5.a.a.-.6.a.1.2.6.b.f.1.e.e.5.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.d.b.7.e.9.c.8.-.2.1.c.8.-.4.4.d.7.-.a.9.e.5.-.c.9.a.6.a.4.4.4.4.8.4.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.C.K.C.6.p.Z.y.j.t.H...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.5.0.-.0.0.0.1.-.0.0.1.4.-.f.4.4.0.-.d.c.e.5.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.7.c.b.e.c.7.0.8.0.8.4.5.2.d.2.6.a.4.9.0.9.d.b.4.4.f.2.6.4.5.c.0.0.0.0.f.f.f.f.!.0.0.0.0.9.4.a.1.0.6.0.4.b.7.0.1.6.c.c.c.d.6.8.6.7.c.f.e.3.e.7.f.3.7.1.c.a.a.f.8.3.d.5.f.!.C.K.C.6.p.Z.y.j.t.H...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.9.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:46:43 2024, 0x1205a4 type
Category:dropped
Size (bytes):145590
Entropy (8bit):1.3177083342776823
Encrypted:false
SSDEEP:384:/bM4iDthuDJwhgviMFK5C6dScIXQO1kdVd:/o4iGwhM9FK5C6dScIXQEs
MD5:1EBD5B5B479227B7953A7E44D57752D4
SHA1:64F96FA0EEB60DD3159403E2D10AA835A75297BA
SHA-256:8DD30BE31356317F9EF88AD28CA881257732038DD7B7DAC1CFCB6ED822F005F8
SHA-512:DB3AD3B7E7C02B0035D457BE11633B1BAF42F06E09A8FCF59D34C3D00CD3BBD82255F31AB50FD4A034A5E5746EBE4D24E99C766C83FAE451BE67FDF6990AF89E
Malicious:false
Reputation:low
Preview:MDMP..a..... ..........f.........................................U..........T.......8...........T............+..........................................................................................................eJ......T.......Lw......................T.......P......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8768
Entropy (8bit):3.708302827754202
Encrypted:false
SSDEEP:192:R6l7wVeJVWglH6Y95CgmfzuD4b5cpDRC89bp6HfgTDm:R6lXJ0a6YjCgmfSDV7p6fv
MD5:55759E70123B32936C105F8E28F048F4
SHA1:8F4886D5C33245F476DC4A2D666567137D157AFD
SHA-256:4164E394391AA319030B1C393853353774126A30BB7E6172C0FCFD6629FFA255
SHA-512:EABA5091BDE0D9530C3194DED4124CE1DAC4FD3306F5A64A317DB23AF8B5B3699450C52537E7528E97A8E934889BDCF64DDD5A249BD6B7A4466E5AC0D686B693
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.9.2.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4681
Entropy (8bit):4.497812637272583
Encrypted:false
SSDEEP:48:cvIwWl8zsUiJg771I9nkWpW8VYY7Ym8M4JpNuOKFWyq85rClOmZFI3wYd:uIjfZI7I97VcJpoCOqlqwYd
MD5:F289ACFE944267B01EA4FF74D3A50457
SHA1:EC3E4C93820417012B0A3272F6887D4DE89AE95E
SHA-256:7F26F2B4810A178363E5DD1E58A113506693E523339BE65CEA9A58996AF6D85F
SHA-512:E7B7347B526096DDB1507B7488B8DADA3D8C2AA983B9FFD11B4D0775C16C5AA7DC42EF0ABD2155D6617876BE22B6FFFD2484B3B9E87AC36E2CBE02E859107740
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478189" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465624303386448
Encrypted:false
SSDEEP:6144:6IXfpi67eLPU9skLmb0b4bWSPKaJG8nAgejZMMhA2gX4WABl0uN7dwBCswSbt:PXD94bWlLZMM6YFH9+t
MD5:0C918F873AB1B1F06C62864AC56C483D
SHA1:9505F37AC3331DA88C0FFE630163826317354499
SHA-256:2D70146F821057E669B22BF6BD5167F32AF9BF807875EF9948B998EEB1F9B824
SHA-512:6426524B24462062EF0EB9BDDB7D3DE0BED8A51CF1434BBC8327911790F3900C841ACFE98F54507FAA0C9F3EA9CDBCE8F01D37A0740A2DF8813744B7826FCC8E
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..M..................................................................................................................................................................................................................................................................................................................................................}[.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.784622680729353
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:CKC6pZyjtH.exe
File size:11'776 bytes
MD5:ebcd0fb65db6edae2c57ff204aceae76
SHA1:94a10604b7016cccd6867cfe3e7f371caaf83d5f
SHA256:0a467ca96c01689eba7fd5c085d0691dfc13b3951a2c50e800220f6f3207455b
SHA512:9718b609839dbdb989903d3bf6172c39022d59aa38af059372bb418c9cbb0cdb1e04b3c7b20ae55bdfacb88a78538f563a0d0db4ee1e2c66d024e5483b3a03aa
SSDEEP:192:3YrQo7w3we3YZg6seUpBGVR7prc3Q5tfXryF:3mQo7wg4YZbsNMVXc3
TLSH:56323B47FA5148FFEA2D42BDC87B060EF075B601B36293CB1BA455362E913D174262CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S......................~.......z.......{.......|.....e.~.......~.....n.w.....n.......n.}.....Rich...........................
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001490
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66D0A10D [Thu Aug 29 16:25:49 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:e83bf2346bd4442aca421104ca50d619
Instruction
dec eax
sub esp, 28h
call 00007FEBC91B3CACh
dec eax
add esp, 28h
jmp 00007FEBC91B3747h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000B9Bh]
dec eax
mov ecx, ebx
call dword ptr [00000B8Ah]
call dword ptr [00000B94h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000BB8h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000B9Ch]
test eax, eax
je 00007FEBC91B38D9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00002BE2h]
call 00007FEBC91B397Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00002CC9h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00002C59h], eax
dec eax
mov eax, dword ptr [00002CB2h]
dec eax
mov dword ptr [00002B23h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00002C27h], eax
mov dword ptr [00002AFDh], C0000409h
mov dword ptr [00002AF7h], 00000001h
mov dword ptr [00002B01h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x29540xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1d8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf7c0x1000f782993474083e42139b7f39c06d86cfFalse0.641845703125zlib compressed data5.969626526772712IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x10a20x12007e04ce5990d8b825241c2b9b14baaf06False0.3634982638888889data3.9510255769353453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x40000x6380x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x50000x1800x200ebbc5b0a816b7a19c83abd3157181a16False0.453125data2.982751998535756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x60000x1e00x200d223c232889289f7388583adeff234e1False0.525390625data4.697597008251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x70000x300x200887273db2d5e786623230b42e90e393fFalse0.125data0.7167719403890207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllHeapCreate, WaitForSingleObject, CreateThread, HeapAlloc, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, malloc
api-ms-win-crt-runtime-l1-1-0.dllterminate, _initialize_onexit_table, _cexit, _crt_atexit, __p___argc, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _register_onexit_function, _set_app_type, _seh_filter_exe, _c_exit, __p___argv, _register_thread_local_exe_atexit_callback
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:46:42.407206059 CEST497308888192.168.2.4120.46.149.112
Aug 30, 2024 12:46:42.418432951 CEST888849730120.46.149.112192.168.2.4
Aug 30, 2024 12:46:42.418503046 CEST497308888192.168.2.4120.46.149.112
Aug 30, 2024 12:46:42.418632984 CEST497308888192.168.2.4120.46.149.112
Aug 30, 2024 12:46:42.427134037 CEST888849730120.46.149.112192.168.2.4
Aug 30, 2024 12:46:44.505179882 CEST888849730120.46.149.112192.168.2.4
Aug 30, 2024 12:46:44.505276918 CEST497308888192.168.2.4120.46.149.112
Aug 30, 2024 12:46:44.515959024 CEST497308888192.168.2.4120.46.149.112
Aug 30, 2024 12:46:44.525269985 CEST888849730120.46.149.112192.168.2.4
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:47:26.017899990 CEST5361012162.159.36.2192.168.2.4
Aug 30, 2024 12:47:26.511360884 CEST53555631.1.1.1192.168.2.4
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.449730120.46.149.11288886992C:\Users\user\Desktop\CKC6pZyjtH.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:46:42.418632984 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:46:41
Start date:30/08/2024
Path:C:\Users\user\Desktop\CKC6pZyjtH.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\CKC6pZyjtH.exe"
Imagebase:0x7ff6ec470000
File size:11'776 bytes
MD5 hash:EBCD0FB65DB6EDAE2C57FF204ACEAE76
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:06:46:43
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 6992 -s 1116
Imagebase:0x7ff712de0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:27.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:24.6%
    Total number of Nodes:65
    Total number of Limit Nodes:3
    execution_graph 376 7ff6ec4712f8 380 7ff6ec471b40 SetUnhandledExceptionFilter 376->380 381 7ff6ec471f46 _seh_filter_exe 327 7ff6ec471314 328 7ff6ec47132d __scrt_initialize_crt 327->328 329 7ff6ec47146b 328->329 330 7ff6ec471335 __scrt_acquire_startup_lock 328->330 356 7ff6ec471998 IsProcessorFeaturePresent 329->356 332 7ff6ec471475 330->332 337 7ff6ec471353 __scrt_release_startup_lock 330->337 333 7ff6ec471998 9 API calls 332->333 334 7ff6ec471480 333->334 336 7ff6ec471488 _exit 334->336 335 7ff6ec471378 337->335 338 7ff6ec4713fe _get_initial_narrow_environment __p___argv __p___argc 337->338 341 7ff6ec4713f6 _register_thread_local_exe_atexit_callback 337->341 347 7ff6ec471000 malloc 338->347 341->338 344 7ff6ec47142b 345 7ff6ec471435 344->345 346 7ff6ec471430 _cexit 344->346 345->335 346->345 349 7ff6ec471072 InternetOpenW InternetOpenUrlA InternetReadFile 347->349 350 7ff6ec471130 349->350 350->350 351 7ff6ec471170 HeapCreate RtlAllocateHeap memcpy CreateThread WaitForSingleObject 350->351 362 7ff6ec471210 351->362 354 7ff6ec471aec GetModuleHandleW 355 7ff6ec471427 354->355 355->334 355->344 357 7ff6ec4719be 356->357 358 7ff6ec4719cc memset RtlCaptureContext RtlLookupFunctionEntry 357->358 359 7ff6ec471a06 RtlVirtualUnwind 358->359 360 7ff6ec471a42 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 358->360 359->360 361 7ff6ec471ac6 360->361 361->332 363 7ff6ec471219 362->363 364 7ff6ec4711e1 363->364 365 7ff6ec4714d8 IsProcessorFeaturePresent 363->365 364->354 366 7ff6ec4714f0 365->366 371 7ff6ec4715ac RtlCaptureContext 366->371 372 7ff6ec4715c6 RtlLookupFunctionEntry 371->372 373 7ff6ec4715dc RtlVirtualUnwind 372->373 374 7ff6ec471503 372->374 373->372 373->374 375 7ff6ec4714a4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 374->375 382 7ff6ec471442 383 7ff6ec471aec GetModuleHandleW 382->383 384 7ff6ec471449 383->384 385 7ff6ec47144d 384->385 386 7ff6ec471488 _exit 384->386 387 7ff6ec471490 390 7ff6ec471870 387->390 391 7ff6ec471499 390->391 392 7ff6ec471893 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 390->392 392->391 393 7ff6ec471230 394 7ff6ec471240 393->394 406 7ff6ec4716a8 394->406 396 7ff6ec471998 9 API calls 397 7ff6ec4712e5 396->397 398 7ff6ec471264 _RTC_Initialize 403 7ff6ec4712c7 398->403 414 7ff6ec471930 InitializeSListHead 398->414 403->396 405 7ff6ec4712d5 403->405 407 7ff6ec4716b9 406->407 412 7ff6ec4716eb 406->412 408 7ff6ec471728 407->408 411 7ff6ec4716be __scrt_release_startup_lock 407->411 409 7ff6ec471998 9 API calls 408->409 410 7ff6ec471732 409->410 411->412 413 7ff6ec4716db _initialize_onexit_table 411->413 412->398 413->412

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6EC4717CC 8 Function_00007FF6EC471DD0 0->8 1 Function_00007FF6EC471988 2 Function_00007FF6EC471948 3 Function_00007FF6EC471F46 4 Function_00007FF6EC471314 4->0 4->1 16 Function_00007FF6EC471980 4->16 17 Function_00007FF6EC471000 4->17 22 Function_00007FF6EC471AEC 4->22 26 Function_00007FF6EC471734 4->26 31 Function_00007FF6EC4717F0 4->31 34 Function_00007FF6EC47165C 4->34 35 Function_00007FF6EC471998 4->35 43 Function_00007FF6EC471620 4->43 5 Function_00007FF6EC471990 6 Function_00007FF6EC471490 30 Function_00007FF6EC471870 6->30 7 Function_00007FF6EC471210 20 Function_00007FF6EC4715AC 7->20 38 Function_00007FF6EC4714A4 7->38 9 Function_00007FF6EC471950 10 Function_00007FF6EC471B50 11 Function_00007FF6EC4712F8 18 Function_00007FF6EC471B40 11->18 33 Function_00007FF6EC47191C 11->33 12 Function_00007FF6EC471E84 40 Function_00007FF6EC471EA4 12->40 13 Function_00007FF6EC471944 14 Function_00007FF6EC4717C5 15 Function_00007FF6EC471442 15->22 17->7 19 Function_00007FF6EC471940 21 Function_00007FF6EC471BAC 23 Function_00007FF6EC4716A8 23->8 23->35 24 Function_00007FF6EC471928 25 Function_00007FF6EC471BE8 27 Function_00007FF6EC471974 28 Function_00007FF6EC471930 29 Function_00007FF6EC471230 29->13 29->19 29->21 29->23 29->24 29->27 29->28 29->33 29->35 36 Function_00007FF6EC471958 29->36 37 Function_00007FF6EC471858 29->37 42 Function_00007FF6EC471920 29->42 31->19 32 Function_00007FF6EC47181C 34->19 39 Function_00007FF6EC471C24 34->39 35->5 36->2 36->9 37->32 41 Function_00007FF6EC471F64 43->8

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1865874783.00007FF6EC471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EC470000, based on PE: true
    • Associated: 00000000.00000002.1865715432.00007FF6EC470000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865924780.00007FF6EC472000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865939062.00007FF6EC475000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ec470000_CKC6pZyjtH.jbxd
    Similarity
    • API ID: Internet$CreateHeapOpen$AllocateFileObjectReadSingleThreadWaitmallocmemcpy
    • String ID: myapp$qvan
    • API String ID: 3523268839-30057361
    • Opcode ID: 601403a25d13a120b6ed95c598b01e55daef290705fae6c2897b243b251e3c23
    • Instruction ID: f9d9eed6e18fbd87fb9dfebc37fd3a257d74cc7d61ef9ed026255e5f608f6b93
    • Opcode Fuzzy Hash: 601403a25d13a120b6ed95c598b01e55daef290705fae6c2897b243b251e3c23
    • Instruction Fuzzy Hash: 6351C263A086C1C1E7608F24E41473A7B60FB89BD8F405235EE8E87B95DE6ED189DB05

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1865874783.00007FF6EC471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EC470000, based on PE: true
    • Associated: 00000000.00000002.1865715432.00007FF6EC470000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865924780.00007FF6EC472000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865939062.00007FF6EC475000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ec470000_CKC6pZyjtH.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 3f9766248f3dde75f168dabf043cf34b69191d0f2cf72d05da5d6e97454fae8c
    • Instruction ID: 105abc7c22a4670520dd0a809c1384d9afad1d187b39630a3e1308b4a83c8fcb
    • Opcode Fuzzy Hash: 3f9766248f3dde75f168dabf043cf34b69191d0f2cf72d05da5d6e97454fae8c
    • Instruction Fuzzy Hash: 763138A3E08543C1FA14AB21A5123B91291AF4578CF444038FA4ED76D7DE2FA80DE34A

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1865874783.00007FF6EC471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EC470000, based on PE: true
    • Associated: 00000000.00000002.1865715432.00007FF6EC470000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865924780.00007FF6EC472000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865939062.00007FF6EC475000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ec470000_CKC6pZyjtH.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 1c7d183264f64c4706787a35a5c4723a62cb700808ef1d0bb1a5a7943da7b687
    • Instruction ID: bfc1d3e2ca445cea2c79fb0e06945ee5b62ed8142b1b9507dbf5db7e8615f4f4
    • Opcode Fuzzy Hash: 1c7d183264f64c4706787a35a5c4723a62cb700808ef1d0bb1a5a7943da7b687
    • Instruction Fuzzy Hash: 85315CB3609A81C6EB608F60E8403ED2375FB84748F44443ADB8E87A98EF79D64CC714
    Memory Dump Source
    • Source File: 00000000.00000002.1865874783.00007FF6EC471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EC470000, based on PE: true
    • Associated: 00000000.00000002.1865715432.00007FF6EC470000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865924780.00007FF6EC472000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1865939062.00007FF6EC475000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ec470000_CKC6pZyjtH.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 68d7fc76b2f1a82173458d7eb6effaf466c5e7e413434e3fb8678e6358c16782
    • Instruction ID: 53ef122539784add42391e005cf98238f2106ca0b23f7b55130ce2094731cf06
    • Opcode Fuzzy Hash: 68d7fc76b2f1a82173458d7eb6effaf466c5e7e413434e3fb8678e6358c16782
    • Instruction Fuzzy Hash: 2FA0026790CC43D0E6548B01E8687346731FB55348B400031E10EE20F0BF7EA409E31A