Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
al7hCrfLj7.exe

Overview

General Information

Sample name:al7hCrfLj7.exe
renamed because original name is a hash value
Original sample name:240e09debc48c35fe091a9f67781cf90276fa2a6df9054793013124cd4b32bf7.exe
Analysis ID:1501762
MD5:2473c1903c8cc4af31caba70b049ae53
SHA1:5aeab819faebfb7175cdb5e7508a24a3c028d910
SHA256:240e09debc48c35fe091a9f67781cf90276fa2a6df9054793013124cd4b32bf7
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • al7hCrfLj7.exe (PID: 6136 cmdline: "C:\Users\user\Desktop\al7hCrfLj7.exe" MD5: 2473C1903C8CC4AF31CABA70B049AE53)
    • WerFault.exe (PID: 4956 cmdline: C:\Windows\system32\WerFault.exe -u -p 6136 -s 1104 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\al7hCrfLj7.exe, Initiated: true, ProcessId: 6136, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49707
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: al7hCrfLj7.exeVirustotal: Detection: 13%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: al7hCrfLj7.exeJoe Sandbox ML: detected
Source: al7hCrfLj7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: al7hCrfLj7.exe
Source: Binary string: o E:\Project\remote_cs\x64\Release\remote_cs.pdb source: al7hCrfLj7.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8888
Source: global trafficTCP traffic: 192.168.2.5:49707 -> 120.46.149.112:8888
Source: Joe Sandbox ViewIP Address: 120.46.149.112 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B1000 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,SleepEx,RtlAllocateHeap,memcpy,0_2_00007FF6776B1000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F543000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/a81-46d0-b6b6-535557bcc5faP
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmp, al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F51C000.00000004.00000020.00020000.00000000.sdmp, al7hCrfLj7.exe, 00000000.00000002.2191275880.0000004D16F4A000.00000004.00000010.00020000.00000000.sdmp, al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F543000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey#
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyb
Source: al7hCrfLj7.exe, 00000000.00000002.2191275880.0000004D16F4A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyj
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyl
Source: al7hCrfLj7.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: al7hCrfLj7.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: al7hCrfLj7.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: al7hCrfLj7.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: al7hCrfLj7.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: al7hCrfLj7.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: al7hCrfLj7.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: al7hCrfLj7.exeString found in binary or memory: https://sectigo.com/CPS0
Source: al7hCrfLj7.exeString found in binary or memory: https://sectigo.com/CPS0D
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B10000_2_00007FF6776B1000
Source: C:\Users\user\Desktop\al7hCrfLj7.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6136 -s 1104
Source: al7hCrfLj7.exeStatic PE information: invalid certificate
Source: classification engineClassification label: mal60.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6136
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7e0668d1-b6b0-4be5-ba42-fd9919a437bfJump to behavior
Source: al7hCrfLj7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\al7hCrfLj7.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: al7hCrfLj7.exeVirustotal: Detection: 13%
Source: unknownProcess created: C:\Users\user\Desktop\al7hCrfLj7.exe "C:\Users\user\Desktop\al7hCrfLj7.exe"
Source: C:\Users\user\Desktop\al7hCrfLj7.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6136 -s 1104
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: al7hCrfLj7.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: al7hCrfLj7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: al7hCrfLj7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: al7hCrfLj7.exe
Source: Binary string: o E:\Project\remote_cs\x64\Release\remote_cs.pdb source: al7hCrfLj7.exe
Source: al7hCrfLj7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: al7hCrfLj7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: al7hCrfLj7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: al7hCrfLj7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: al7hCrfLj7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exe TID: 2892Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeThread delayed: delay time: 60000Jump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F583000.00000004.00000020.00020000.00000000.sdmp, al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F543000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\al7hCrfLj7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B1918 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6776B1918
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B1424 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6776B1424
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B1918 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6776B1918
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B1AC0 SetUnhandledExceptionFilter,0_2_00007FF6776B1AC0
Source: C:\Users\user\Desktop\al7hCrfLj7.exeCode function: 0_2_00007FF6776B17F0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6776B17F0
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
al7hCrfLj7.exe11%ReversingLabsWin32.Trojan.Generic
al7hCrfLj7.exe13%VirustotalBrowse
al7hCrfLj7.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
https://sectigo.com/CPS0D0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyb0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112/a81-46d0-b6b6-535557bcc5faP0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey#0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyl0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyj0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey#4%VirustotalBrowse
http://120.46.149.112:8888/safekey4%VirustotalBrowse
http://120.46.149.112:8888/safekeyj1%VirustotalBrowse
http://120.46.149.112/1%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tal7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
http://120.46.149.112/al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F543000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0al7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0al7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#al7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
https://sectigo.com/CPS0Dal7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
http://120.46.149.112:8888/safekey#al7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeybal7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sal7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
http://120.46.149.112/a81-46d0-b6b6-535557bcc5faPal7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#al7hCrfLj7.exefalse
  • URL Reputation: safe
unknown
http://120.46.149.112:8888/safekeylal7hCrfLj7.exe, 00000000.00000002.2191580977.000002194F55E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyjal7hCrfLj7.exe, 00000000.00000002.2191275880.0000004D16F4A000.00000004.00000010.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501762
Start date and time:2024-08-30 12:46:04 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 56s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:al7hCrfLj7.exe
renamed because original name is a hash value
Original Sample Name:240e09debc48c35fe091a9f67781cf90276fa2a6df9054793013124cd4b32bf7.exe
Detection:MAL
Classification:mal60.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 104.208.16.94
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
TimeTypeDescription
06:46:54API Interceptor1x Sleep call for process: al7hCrfLj7.exe modified
06:47:08API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNlApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
sora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.888369350998642
Encrypted:false
SSDEEP:96:iLFunJsZhqDof7JnuQXIDcQoc6ucEjcw3T+HbHg/ZjnZ+ZFGLGCI72bBuOyPCpiE:MwnJPq0GqZMjoxVzuiFVZ24lO87
MD5:28798D69AB762790CEA4B2D66EE00C89
SHA1:F4F43F6B9480D6EA5FF751188A23FD4CAE0CE9CE
SHA-256:3FB69BE80EFC4523F6EF8912363E063282FA17A1E9CEB5AABE5AFBB24451EFD4
SHA-512:F10D8D1CB58A3E1372F1BBDFBED97BB4EDF5A124384E79873CEC8A3DDE5F0762F96836A84E1207E4A3B84BCB8F1E9EE46EE65ED3C7C5E19BE438D1D660E6C18D
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.4.1.4.5.0.8.7.2.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.4.1.4.8.5.2.4.6.9.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.3.0.6.d.3.d.2.-.6.9.6.4.-.4.f.1.9.-.b.7.a.7.-.3.e.5.2.e.0.a.c.b.b.4.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.8.e.e.1.d.e.-.1.1.9.7.-.4.2.7.b.-.9.7.e.9.-.d.3.1.6.5.7.4.0.d.1.c.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.a.l.7.h.C.r.f.L.j.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.f.8.-.0.0.0.1.-.0.0.1.4.-.c.5.9.c.-.3.4.e.c.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.b.4.c.a.8.4.2.e.b.f.2.0.6.b.3.a.0.e.2.3.a.8.8.8.5.1.8.f.6.1.4.0.0.0.0.f.f.f.f.!.0.0.0.0.5.a.e.a.b.8.1.9.f.a.e.b.f.b.7.1.7.5.c.d.b.5.e.7.5.0.8.a.2.4.a.3.c.0.2.8.d.9.1.0.!.a.l.7.h.C.r.f.L.j.7...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.8.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:46:54 2024, 0x1205a4 type
Category:dropped
Size (bytes):153010
Entropy (8bit):1.3652768943598963
Encrypted:false
SSDEEP:384:X6WFEa3K4Y4p3g2cNmqtuguuYx5houVu/zopbw/AOS:KD4K4Jg2GYvhode7O
MD5:CFAFFAAAD1F3D0219F5D79E18087DDAF
SHA1:64A6561B878BA83478E4F883FC16BA646112AF60
SHA-256:9BFBC0569FB01F8DE2C806E8260968B79CE528949977F4426EE6A74C12C46A78
SHA-512:F5AAAA4811D522AE585D2705A2B501C62298577CF90B7608CA26DFF260ACEC1A707A90E6D411C43F5B97035099EB44DA23FB94288887282449E665DAE460A11D
Malicious:false
Reputation:low
Preview:MDMP..a..... ..........f.........................................U..........T.......8...........T............+..2*......................................................................................................eJ......T.......Lw......................T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8778
Entropy (8bit):3.7088378154670822
Encrypted:false
SSDEEP:192:R6l7wVeJvqEAq6YEIiWavgmfmIprc89bnL1Uf0ztm:R6lXJS06YE9WqgmfmcnL2f9
MD5:771B47E66AD7E9832A6A5924C8FC375E
SHA1:8A75A37F02A95A99B80FAD5AEC0D55C4B7C3D026
SHA-256:5E3988D4AD44077B96CE6D1243BDEB6FB1DE8261FC2C78EC7E6C4AF9B942C121
SHA-512:092EEEE6FEDE34FEAA2080DAFAC4D4DAA7D19497C10D114420CE3AEED5E0AEC5949E0F94E2B0D2F4C952EE6E3B62475E2F9C7D03D5494DEF42C31CE3798A294C
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.3.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4677
Entropy (8bit):4.493440053445118
Encrypted:false
SSDEEP:48:cvIwWl8zsUiJg771I9HsWpW8VYYEYm8M4Jj43FvwIyq85IdD8jOFd:uIjfZI7EF7VfJ83HZ8jOFd
MD5:D701EE4E95E769749D1F377593DCF35C
SHA1:925FF6E61D614757448BA86A7A6DBDA349C11F39
SHA-256:CE7750B666EE28EF471ADCB74975690F0888F230AFCE943B831DB225AB4CAAC4
SHA-512:6ACFF8A40D880F9C2ACCE95DB6FF099A061C977238B9AC9D11A5533FF132F2B6EF0F21CA5CA4C9F27682BB5C4CB4128F18227C83A04B1CCA30E284294487B237
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478189" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.421633602119478
Encrypted:false
SSDEEP:6144:YSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNR0uhiTw:jvloTMW+EZMM6DFyn03w
MD5:8FEEE0A1910735547078D20994032CFF
SHA1:E3F29ED278B2B71465725C7BCE518CDF9D3DE5CC
SHA-256:89AA8C2F4E5B86AF3C55F9A59143AE80380C5DBAE368BD8E9B5E240FB7023A4D
SHA-512:16A4A49D9185B8279D49FBAA8C82AAFD8D1CE49CAAE48C2513F2939DDCC27D08D9CD9D8205BD4ED9854DDEBD74D9E51304C3CBC490DF952AE1DDD258F4CD662A
Malicious:false
Reputation:low
Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm^...................................................................................................................................................................................................................................................................................................................................................1...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.456380640189485
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:al7hCrfLj7.exe
File size:20'712 bytes
MD5:2473c1903c8cc4af31caba70b049ae53
SHA1:5aeab819faebfb7175cdb5e7508a24a3c028d910
SHA256:240e09debc48c35fe091a9f67781cf90276fa2a6df9054793013124cd4b32bf7
SHA512:8c8917ae943efa4a6d5dea4e35087646bfdbf3232dd4813fbb2087eb0730493c2ba517c3974bc6b22be47e2006d6c95ca020377e877f8a84711a9fc60132c161
SSDEEP:384:eQiuDGUdWPrm+3yTGfZb8ZpHSGAp9E+S7Wh:Ziu6dPrz3ywbiRGp9E+Syh
TLSH:75926CDBBE04A8E2DE460534C6EB4A7BECB1B251BF9001CB27B8C4652F963D1766504F
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..S6...6...6...?...<.....~.4.....z.%.....{.<.....|.5.....~.3...6.~.......w.7.......7.....}.7...Rich6...................PE..d..
Icon Hash:00928e8e8686b000
Entrypoint:0x140001410
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CFB344 [Wed Aug 28 23:31:16 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:4cdc3b8103447d926abc4caf8e6617aa
Signature Valid:false
Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
Signature Validation Error:The digital signature of the object did not verify
Error Number:-2146869232
Not Before, Not After
  • 07/12/2020 01:00:00 08/12/2021 00:59:59
Subject Chain
  • CN=SweetScape Software, O=SweetScape Software, STREET=148 Pownal Rd. RTE 26, L=Mount Mellick, S=Prince Edward Island, PostalCode=C1B 3S3, C=CA
Version:3
Thumbprint MD5:8093E555DC0BFC22F0BACC71088F65FE
Thumbprint SHA-1:431253E010DCD016471DDDADF9BB143ACFCAA3F0
Thumbprint SHA-256:314BF2CF88CFF2EA4CAA308676E75923777DFD35BEE6553366F03566C08D4B83
Serial:649F6633FF8421F59A0610222341FAA2
Instruction
dec eax
sub esp, 28h
call 00007FCE3125ABACh
dec eax
add esp, 28h
jmp 00007FCE3125A647h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000C13h]
dec eax
mov ecx, ebx
call dword ptr [00000C02h]
call dword ptr [00000C0Ch]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C30h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000C14h]
test eax, eax
je 00007FCE3125A7D9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001C62h]
call 00007FCE3125A87Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001D49h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001CD9h], eax
dec eax
mov eax, dword ptr [00001D32h]
dec eax
mov dword ptr [00001BA3h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001CA7h], eax
mov dword ptr [00001B7Dh], C0000409h
mov dword ptr [00001B77h], 00000001h
mov dword ptr [00001B81h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x2c000x24e8
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24000x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22c00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1d0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xefc0x10009ce65b38649c20931c9516876e2db22bFalse0.6220703125zlib compressed data5.82258458300169IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xffc0x1000fcc5b97d95de9fe976e8e9f6f316440fFalse0.40087890625data4.2798913838528785IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x6380x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x40000x1800x20091616863532ca51b60547faaf64f904eFalse0.455078125data2.972590137958416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x50000x1e00x2004dde323af9808a00b376d6895922dc1fFalse0.525390625data4.696122618599126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000x300x20045e579f1661fd93b8920c264138e82c3False0.125data0.6978762918720139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x50600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllHeapCreate, Sleep, HeapAlloc, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, malloc
api-ms-win-crt-runtime-l1-1-0.dllterminate, _initialize_onexit_table, _cexit, _crt_atexit, __p___argc, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _register_onexit_function, _set_app_type, _seh_filter_exe, _c_exit, __p___argv, _register_thread_local_exe_atexit_callback
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:46:53.251749039 CEST497078888192.168.2.5120.46.149.112
Aug 30, 2024 12:46:53.256788969 CEST888849707120.46.149.112192.168.2.5
Aug 30, 2024 12:46:53.256864071 CEST497078888192.168.2.5120.46.149.112
Aug 30, 2024 12:46:53.257133961 CEST497078888192.168.2.5120.46.149.112
Aug 30, 2024 12:46:53.262115955 CEST888849707120.46.149.112192.168.2.5
Aug 30, 2024 12:46:55.321899891 CEST888849707120.46.149.112192.168.2.5
Aug 30, 2024 12:46:55.322005033 CEST497078888192.168.2.5120.46.149.112
Aug 30, 2024 12:46:55.322146893 CEST497078888192.168.2.5120.46.149.112
Aug 30, 2024 12:46:55.327378035 CEST888849707120.46.149.112192.168.2.5
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.549707120.46.149.11288886136C:\Users\user\Desktop\al7hCrfLj7.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:46:53.257133961 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:46:51
Start date:30/08/2024
Path:C:\Users\user\Desktop\al7hCrfLj7.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\al7hCrfLj7.exe"
Imagebase:0x7ff6776b0000
File size:20'712 bytes
MD5 hash:2473C1903C8CC4AF31CABA70B049AE53
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:06:46:54
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 6136 -s 1104
Imagebase:0x7ff72f5f0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:23.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:25.8%
    Total number of Nodes:66
    Total number of Limit Nodes:3
    execution_graph 377 7ff6776b11b0 378 7ff6776b11c0 377->378 390 7ff6776b1628 378->390 380 7ff6776b1918 9 API calls 381 7ff6776b1265 380->381 382 7ff6776b11e4 _RTC_Initialize 388 7ff6776b1247 382->388 398 7ff6776b18b0 InitializeSListHead 382->398 388->380 389 7ff6776b1255 388->389 391 7ff6776b166b 390->391 392 7ff6776b1639 390->392 391->382 393 7ff6776b16a8 392->393 396 7ff6776b163e __scrt_acquire_startup_lock 392->396 394 7ff6776b1918 9 API calls 393->394 395 7ff6776b16b2 394->395 396->391 397 7ff6776b165b _initialize_onexit_table 396->397 397->391 399 7ff6776b1410 402 7ff6776b17f0 399->402 403 7ff6776b1813 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 402->403 404 7ff6776b1419 402->404 403->404 327 7ff6776b1294 328 7ff6776b12ad __scrt_initialize_crt 327->328 329 7ff6776b12b5 __scrt_acquire_startup_lock 328->329 330 7ff6776b13eb 328->330 332 7ff6776b13f5 329->332 333 7ff6776b12d3 __scrt_release_startup_lock 329->333 357 7ff6776b1918 IsProcessorFeaturePresent 330->357 334 7ff6776b1918 9 API calls 332->334 336 7ff6776b12f8 333->336 338 7ff6776b137e _get_initial_narrow_environment __p___argv __p___argc 333->338 341 7ff6776b1376 _register_thread_local_exe_atexit_callback 333->341 335 7ff6776b1400 334->335 337 7ff6776b1408 _exit 335->337 347 7ff6776b1000 malloc 338->347 341->338 344 7ff6776b13ab 345 7ff6776b13b0 _cexit 344->345 346 7ff6776b13b5 344->346 345->346 346->336 349 7ff6776b1067 InternetOpenW InternetOpenUrlA InternetReadFile 347->349 350 7ff6776b1101 349->350 350->350 351 7ff6776b1112 HeapCreate SleepEx RtlAllocateHeap memcpy 350->351 352 7ff6776b115d 351->352 363 7ff6776b1190 352->363 355 7ff6776b1a6c GetModuleHandleW 356 7ff6776b13a7 355->356 356->335 356->344 358 7ff6776b193e 357->358 359 7ff6776b194c memset RtlCaptureContext RtlLookupFunctionEntry 358->359 360 7ff6776b19c2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 359->360 361 7ff6776b1986 RtlVirtualUnwind 359->361 362 7ff6776b1a46 360->362 361->360 362->332 364 7ff6776b1199 363->364 365 7ff6776b116c 364->365 366 7ff6776b1458 IsProcessorFeaturePresent 364->366 365->355 367 7ff6776b1470 366->367 372 7ff6776b152c RtlCaptureContext 367->372 373 7ff6776b1546 RtlLookupFunctionEntry 372->373 374 7ff6776b1483 373->374 375 7ff6776b155c RtlVirtualUnwind 373->375 376 7ff6776b1424 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 374->376 375->373 375->374 405 7ff6776b13c2 406 7ff6776b1a6c GetModuleHandleW 405->406 407 7ff6776b13c9 406->407 408 7ff6776b1408 _exit 407->408 409 7ff6776b13cd 407->409 410 7ff6776b1278 414 7ff6776b1ac0 SetUnhandledExceptionFilter 410->414 415 7ff6776b1ec6 _seh_filter_exe

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6776B18B0 1 Function_00007FF6776B11B0 1->0 5 Function_00007FF6776B18F4 1->5 6 Function_00007FF6776B18A8 1->6 7 Function_00007FF6776B1628 1->7 10 Function_00007FF6776B1B2C 1->10 13 Function_00007FF6776B18A0 1->13 18 Function_00007FF6776B1918 1->18 19 Function_00007FF6776B18D8 1->19 20 Function_00007FF6776B17D8 1->20 22 Function_00007FF6776B189C 1->22 38 Function_00007FF6776B18C0 1->38 40 Function_00007FF6776B18C4 1->40 2 Function_00007FF6776B17F0 3 Function_00007FF6776B1770 3->38 4 Function_00007FF6776B16B4 7->18 27 Function_00007FF6776B1D50 7->27 8 Function_00007FF6776B1B68 9 Function_00007FF6776B152C 11 Function_00007FF6776B1A6C 12 Function_00007FF6776B15A0 12->27 14 Function_00007FF6776B1E24 15 Function_00007FF6776B1BA4 16 Function_00007FF6776B1424 17 Function_00007FF6776B1EE4 24 Function_00007FF6776B1910 18->24 28 Function_00007FF6776B18D0 19->28 32 Function_00007FF6776B18C8 19->32 21 Function_00007FF6776B179C 20->21 23 Function_00007FF6776B15DC 23->15 23->38 25 Function_00007FF6776B1410 25->2 26 Function_00007FF6776B1190 26->9 26->16 29 Function_00007FF6776B1AD0 30 Function_00007FF6776B1294 30->3 30->4 30->11 30->12 30->18 30->23 31 Function_00007FF6776B1908 30->31 34 Function_00007FF6776B174C 30->34 35 Function_00007FF6776B1000 30->35 36 Function_00007FF6776B1900 30->36 33 Function_00007FF6776B1EC6 34->27 35->26 37 Function_00007FF6776B1AC0 39 Function_00007FF6776B1E04 39->14 41 Function_00007FF6776B1745 42 Function_00007FF6776B13C2 42->11 43 Function_00007FF6776B1278 43->22 43->37 44 Function_00000219512C000B

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2191890870.00007FF6776B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6776B0000, based on PE: true
    • Associated: 00000000.00000002.2191872859.00007FF6776B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191906291.00007FF6776B2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191932304.00007FF6776B4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6776b0000_al7hCrfLj7.jbxd
    Similarity
    • API ID: Internet$HeapOpen$AllocateCreateFileReadSleepmallocmemcpy
    • String ID: myapp
    • API String ID: 4041867304-2274886186
    • Opcode ID: 50ccfa08cc6b4554cfcf1f24d8e04faf77c5766a8bb3eafddc3df48baa665a10
    • Instruction ID: 6a54e810d5fd896f32f366df865501df30d73f01d37dea54ab6151be83bc4887
    • Opcode Fuzzy Hash: 50ccfa08cc6b4554cfcf1f24d8e04faf77c5766a8bb3eafddc3df48baa665a10
    • Instruction Fuzzy Hash: C241E763A2C6C5C5EB508B24E45023B6792FB86790F605634EE9E83BA9DE2CF184C700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2191890870.00007FF6776B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6776B0000, based on PE: true
    • Associated: 00000000.00000002.2191872859.00007FF6776B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191906291.00007FF6776B2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191932304.00007FF6776B4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6776b0000_al7hCrfLj7.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 3bdd32e6ce0d059c15cbdedad4d588f6ca58287415938838a7787d015f76203f
    • Instruction ID: 0143eeb9e5201bf5b698e18553d00981b80614d4603909c977eca66f8a01628b
    • Opcode Fuzzy Hash: 3bdd32e6ce0d059c15cbdedad4d588f6ca58287415938838a7787d015f76203f
    • Instruction Fuzzy Hash: 78311193A28142E1EE18AB25D4553BB13939F47784F640835FE4DC76FFEE2CB848A251

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2191890870.00007FF6776B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6776B0000, based on PE: true
    • Associated: 00000000.00000002.2191872859.00007FF6776B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191906291.00007FF6776B2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191932304.00007FF6776B4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6776b0000_al7hCrfLj7.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 4e385748ae73c01983aede97a4f9598c3b9bcafd3c4cc12f15a90dbcdc14e8bc
    • Instruction ID: cb61221d844c940b1577dc84ad66d35fde086d966edc1286bc6338b4d08ae50c
    • Opcode Fuzzy Hash: 4e385748ae73c01983aede97a4f9598c3b9bcafd3c4cc12f15a90dbcdc14e8bc
    • Instruction Fuzzy Hash: B7316273619AC1D9EB649F60E8403EE33A2FB45744F54483AEA4D87AA8DF3CE548C700
    Memory Dump Source
    • Source File: 00000000.00000002.2191890870.00007FF6776B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6776B0000, based on PE: true
    • Associated: 00000000.00000002.2191872859.00007FF6776B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191906291.00007FF6776B2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2191932304.00007FF6776B4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6776b0000_al7hCrfLj7.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e586a8f0a108684954c46712566809879d82fea8b963e5fa66e67aefbe12965f
    • Instruction ID: 738d2510b3b62a054830e1335429107adbff1207bf30a3e63e3b527be58a07b5
    • Opcode Fuzzy Hash: e586a8f0a108684954c46712566809879d82fea8b963e5fa66e67aefbe12965f
    • Instruction Fuzzy Hash: D0A0016296CC46E4EA488B01A9500222272EB62340B604831E81E918B8DE2CB444E300