Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4sRugP90qT.exe

Overview

General Information

Sample name:4sRugP90qT.exe
renamed because original name is a hash value
Original sample name:495a309c4e81ae179a37e54e1aadfd36e2c9c5e72eaeb737e1a90654e31d2a8d.exe
Analysis ID:1501764
MD5:7f8fbda2741e7092aff9152986efc770
SHA1:cfaff1034c6b7cc1f59464de57eb77fea7576ac0
SHA256:495a309c4e81ae179a37e54e1aadfd36e2c9c5e72eaeb737e1a90654e31d2a8d
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
IP address seen in connection with other malware
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • 4sRugP90qT.exe (PID: 7136 cmdline: "C:\Users\user\Desktop\4sRugP90qT.exe" MD5: 7F8FBDA2741E7092AFF9152986EFC770)
    • WerFault.exe (PID: 6720 cmdline: C:\Windows\system32\WerFault.exe -u -p 7136 -s 1084 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\4sRugP90qT.exe, Initiated: true, ProcessId: 7136, Protocol: tcp, SourceIp: 192.168.2.12, SourceIsIpv6: false, SourcePort: 49710
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 4sRugP90qT.exeReversingLabs: Detection: 57%
Source: 4sRugP90qT.exeVirustotal: Detection: 61%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: 4sRugP90qT.exeJoe Sandbox ML: detected
Source: 4sRugP90qT.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: 4sRugP90qT.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 8888
Source: global trafficTCP traffic: 192.168.2.12:49710 -> 120.46.149.112:8888
Source: Joe Sandbox ViewIP Address: 120.46.149.112 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\4sRugP90qT.exeCode function: 0_2_00007FF6A5EF1000 InternetOpenW,InternetOpenUrlA,InternetReadFile,VirtualProtect,CreateThread,WaitForSingleObject,0_2_00007FF6A5EF1000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DF9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/UT
Source: 4sRugP90qT.exeString found in binary or memory: http://120.46.149.112:8888/safekey
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey(m
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey1p
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyjm
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyrp
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\4sRugP90qT.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7136 -s 1084
Source: classification engineClassification label: mal60.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7136
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\716b6d00-2961-47e1-a909-73c7cba744f1Jump to behavior
Source: 4sRugP90qT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\4sRugP90qT.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 4sRugP90qT.exeReversingLabs: Detection: 57%
Source: 4sRugP90qT.exeVirustotal: Detection: 61%
Source: unknownProcess created: C:\Users\user\Desktop\4sRugP90qT.exe "C:\Users\user\Desktop\4sRugP90qT.exe"
Source: C:\Users\user\Desktop\4sRugP90qT.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7136 -s 1084
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: 4sRugP90qT.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 4sRugP90qT.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 4sRugP90qT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: 4sRugP90qT.exe
Source: 4sRugP90qT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 4sRugP90qT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 4sRugP90qT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 4sRugP90qT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 4sRugP90qT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 6e d0 59 6b 97 52-b4 9a 7f 42 1f 0e 66 9c
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWxL3}
Source: 4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DF9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\4sRugP90qT.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\4sRugP90qT.exeCode function: 0_2_00007FF6A5EF1868 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A5EF1868
Source: C:\Users\user\Desktop\4sRugP90qT.exeCode function: 0_2_00007FF6A5EF1A10 SetUnhandledExceptionFilter,0_2_00007FF6A5EF1A10
Source: C:\Users\user\Desktop\4sRugP90qT.exeCode function: 0_2_00007FF6A5EF1374 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6A5EF1374
Source: C:\Users\user\Desktop\4sRugP90qT.exeCode function: 0_2_00007FF6A5EF1868 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A5EF1868
Source: C:\Users\user\Desktop\4sRugP90qT.exeCode function: 0_2_00007FF6A5EF1740 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6A5EF1740
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
4sRugP90qT.exe58%ReversingLabsWin64.Trojan.MintZard
4sRugP90qT.exe62%VirustotalBrowse
4sRugP90qT.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey(m0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyrp0%Avira URL Cloudsafe
http://120.46.149.112/UT0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyjm0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey1p0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey4%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyjm4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey(m4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/UT4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DF9D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyrp4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey1p4sRugP90qT.exe, 00000000.00000002.2480656125.000001C95DFC0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501764
Start date and time:2024-08-30 12:53:19 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:4sRugP90qT.exe
renamed because original name is a hash value
Original Sample Name:495a309c4e81ae179a37e54e1aadfd36e2c9c5e72eaeb737e1a90654e31d2a8d.exe
Detection:MAL
Classification:mal60.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
TimeTypeDescription
06:54:34API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112r67EeWwi9R.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GxEyLSwNqM.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNEI1Hc80wNB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
r67EeWwi9R.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8849713760864013
Encrypted:false
SSDEEP:96:jZFBot4ssmhqmSc7qm3fjQXIDcQQc6ZcE9cw31+HbHg/ZjWORXyGLGCI72bBuOy1:F64sGm8ms0+dHWjI5VzuiF4Z24lO8T
MD5:6729A6ADCF0D05CB150F6560D38D3C92
SHA1:3DC257E0728A3592929251AC71A53768D3E1E34E
SHA-256:35C2BB3D624991AA10A217C64EF173E2CB1682FF991152855BB0E1B975BB35AF
SHA-512:256386E0AF77F298D5F1D01CF159C8D7D14F4555E21E4F71435A39692CD0D4359EC0D442EC9044809414E81A132C4152EE1D015D964CC34A7031DCD8E6DEB3C1
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.8.6.8.0.2.4.8.0.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.8.6.8.4.7.7.9.2.2.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.2.0.7.6.a.f.9.-.5.f.c.6.-.4.0.7.1.-.b.0.0.6.-.b.8.a.7.d.2.c.8.0.4.b.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.6.1.d.3.4.c.e.-.8.0.0.9.-.4.8.9.d.-.9.e.7.a.-.f.d.7.6.0.a.7.2.c.9.9.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.4.s.R.u.g.P.9.0.q.T...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.e.0.-.0.0.0.1.-.0.0.1.4.-.9.7.1.c.-.3.d.f.a.c.a.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.9.9.e.a.7.b.7.8.f.3.1.a.7.8.5.e.4.f.c.0.0.3.2.3.d.3.d.1.3.6.1.0.0.0.0.f.f.f.f.!.0.0.0.0.c.f.a.f.f.1.0.3.4.c.6.b.7.c.c.1.f.5.9.4.6.4.d.e.5.7.e.b.7.7.f.e.a.7.5.7.6.a.c.0.!.4.s.R.u.g.P.9.0.q.T...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.7.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:54:28 2024, 0x1205a4 type
Category:dropped
Size (bytes):152916
Entropy (8bit):1.3022684791847636
Encrypted:false
SSDEEP:192:ZdWPkl971hmClN33OpotTEopVujlFDsCw0rxMsILPD5ebv483YiT7La5YEVIoa9G:d971h/3eilGZS75aAFiCBR86j
MD5:F5DEEF5B2AD74B7338F94C9825AEE08E
SHA1:D0B83A249F44C73077FAEF5910F68C211B273212
SHA-256:F628A884D3404DEACD130DE9CB0EC58E3406B7ED6B12912A0F2BC852234108CB
SHA-512:3FF862400B143A42CA0B8CA40D70ED7A842658BA42CE9CA91A6C49097F6EDAF62D6D7C2CC5E28F0E621CBD948794769B2303452DFFB7FD32A42B2BCBE8C065FC
Malicious:false
Reputation:low
Preview:MDMP..a..... .........f.........................................U..........T.......8...........T............+...)......................................................................................................eJ......T.......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8724
Entropy (8bit):3.700519136892346
Encrypted:false
SSDEEP:192:R6l7wVeJxVcI6Y+XsGgmf2HprH89b3Vzq1fodm:R6lXJzJ6YusGgmf2C3Bq1fP
MD5:E03E9A8C2CBDF0B5F26A588E8D1E21F7
SHA1:25E26A72F1A3E3C2F1AF3C0AA577CCE83196B56D
SHA-256:FA8AA52BF6AFDBF7DAA448BACDFD5C32CB04C2FE6C9C87C2B9C1A3CD808F6365
SHA-512:38017836EDCFAA8DCC4551675A6FC959FB3B83BD2BABB26707E9CBFC9097A08B50F0F697937AFD17AA37E3134484C1FA4BC4DE2A9A7E1997E62F7C4BA02602A8
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.3.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4637
Entropy (8bit):4.456758557282705
Encrypted:false
SSDEEP:48:cvIwWl8zsKrJg771I9HUz7WpW8VYYXoYm8M4JZm6Fxyq85Z/JrRqId:uIjfaI7Pm7V7JgSkJrRqId
MD5:481D3C0289CBC6BBA5484A0D7AC66875
SHA1:3B53DB1326EFDFF1F967A80AE18846B1316667F1
SHA-256:AE635017DA365EC41BF13D8CEDDE8DF9325151BD89F3B29F86C5DB4DF7A9B0AF
SHA-512:E9A7528B4FA28F05B4AF59DF64E19FF06F509BCA13DBCC60FE23583B97326B6F905CE70B97D3FFABC2C2C4CC81AB0F158B182698611F6DFF42BF8918B78E02DD
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478197" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.568596809505913
Encrypted:false
SSDEEP:6144:4oPefZnQMa3tfLPbn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGAsBsL6:1PHAooVJHnsg/d1T2qG
MD5:13CD14A5D75E51C12BF394CEF24774FC
SHA1:151C792C3F7B1BCC4F6FB0B2AA9C133DB0BC6A24
SHA-256:BAA0F6AA5168FDE18B915955344BCF075E0D2ED844F7D6D9A6F2BDC1DDA8D3DB
SHA-512:C81C51CB75668DC6AB8FA7F55FC209E83FCFCAC02113D60C3D612E0B8B16458781DC42209E03E5869A8C4CAFF3E81FD6DF18C8CC07677B3AD2D12717C3301C7D
Malicious:false
Reputation:low
Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.773312624432815
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:4sRugP90qT.exe
File size:11'264 bytes
MD5:7f8fbda2741e7092aff9152986efc770
SHA1:cfaff1034c6b7cc1f59464de57eb77fea7576ac0
SHA256:495a309c4e81ae179a37e54e1aadfd36e2c9c5e72eaeb737e1a90654e31d2a8d
SHA512:1a202b40c5f48dd101ff3fd77533a83c5fe870ee20f0736f133bb93bc830dabb659075b839a0beb71569c360f8a2977fd3dd5bfb01f4319255eefa13393e0115
SSDEEP:96:AQifVwu3IuC4adfKrj5bxeJVLQlOezl16EsItSJ02aoCYUJv6RRnyu8m73Q5tf0q:AQTuYRoGQlOe+ScTEYKv6Rb3Q5tf/rc
TLSH:87322B0FF68189FBD2284339CA3F4A9EE0B57601672357CB177845192F6279166292CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S....................I.~.....I.z.....I.{.....I.|.....%.~.......~.......w...............}.....Rich...........................
Icon Hash:00928e8e8686b000
Entrypoint:0x140001360
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CE555A [Tue Aug 27 22:38:18 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:0db8e5c52f15ac1d17fec9e329483b0a
Instruction
dec eax
sub esp, 28h
call 00007FCE587D674Ch
dec eax
add esp, 28h
jmp 00007FCE587D61E7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000CC3h]
dec eax
mov ecx, ebx
call dword ptr [00000CB2h]
call dword ptr [00000CBCh]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000CE0h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000CC4h]
test eax, eax
je 00007FCE587D6379h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001D12h]
call 00007FCE587D641Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001DF9h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001D89h], eax
dec eax
mov eax, dword ptr [00001DE2h]
dec eax
mov dword ptr [00001C53h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001D57h], eax
mov dword ptr [00001C2Dh], C0000409h
mov dword ptr [00001C27h], 00000001h
mov dword ptr [00001C31h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28cc0xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x90000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24000x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22c00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1c8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xe4c0x10001c7da7b382774d8123315e28a0bc406eFalse0.592041015625data5.6290806162074585IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xff80x1000e6f02a77ce818cb2368349b20fb6d43fFalse0.39794921875data4.2515515002780635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x90000x1800x200a1c6949cb3a79058b140cddd021ca262False0.4453125data2.9505725425456624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xa0000x1e00x200101f04294dcfeea9dfe10d3c920461d9False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xb0000x300x200eb592baf4f8e32571d60e52a6fb0ea45False0.126953125data0.7195083879349718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xa0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllVirtualProtect, WaitForSingleObject, CreateThread, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenW, InternetReadFile, InternetOpenUrlA
VCRUNTIME140.dll__C_specific_handler, __current_exception, memset, __current_exception_context, memcpy
api-ms-win-crt-runtime-l1-1-0.dllterminate, _cexit, _crt_atexit, _c_exit, _register_onexit_function, _register_thread_local_exe_atexit_callback, _initialize_onexit_table, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, _seh_filter_exe, __p___argc, __p___argv
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:54:26.143062115 CEST497108888192.168.2.12120.46.149.112
Aug 30, 2024 12:54:26.148629904 CEST888849710120.46.149.112192.168.2.12
Aug 30, 2024 12:54:26.148714066 CEST497108888192.168.2.12120.46.149.112
Aug 30, 2024 12:54:26.148845911 CEST497108888192.168.2.12120.46.149.112
Aug 30, 2024 12:54:26.173228979 CEST888849710120.46.149.112192.168.2.12
Aug 30, 2024 12:54:28.260324001 CEST888849710120.46.149.112192.168.2.12
Aug 30, 2024 12:54:28.260413885 CEST497108888192.168.2.12120.46.149.112
Aug 30, 2024 12:54:28.260628939 CEST497108888192.168.2.12120.46.149.112
Aug 30, 2024 12:54:28.265513897 CEST888849710120.46.149.112192.168.2.12
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.1249710120.46.149.11288887136C:\Users\user\Desktop\4sRugP90qT.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:54:26.148845911 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:54:24
Start date:30/08/2024
Path:C:\Users\user\Desktop\4sRugP90qT.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\4sRugP90qT.exe"
Imagebase:0x7ff6a5ef0000
File size:11'264 bytes
MD5 hash:7F8FBDA2741E7092AFF9152986EFC770
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:54:27
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7136 -s 1084
Imagebase:0x7ff7f80b0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:22.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:21%
    Total number of Nodes:62
    Total number of Limit Nodes:3
    execution_graph 316 7ff6a5ef11e4 317 7ff6a5ef11fd __scrt_initialize_crt 316->317 318 7ff6a5ef1205 __scrt_acquire_startup_lock 317->318 319 7ff6a5ef133b 317->319 321 7ff6a5ef1345 318->321 327 7ff6a5ef1223 __scrt_release_startup_lock 318->327 341 7ff6a5ef1868 IsProcessorFeaturePresent 319->341 322 7ff6a5ef1868 9 API calls 321->322 323 7ff6a5ef1350 322->323 325 7ff6a5ef1358 _exit 323->325 324 7ff6a5ef1248 326 7ff6a5ef12ce _get_initial_narrow_environment __p___argv __p___argc 336 7ff6a5ef1000 6 API calls 326->336 327->324 327->326 331 7ff6a5ef12c6 _register_thread_local_exe_atexit_callback 327->331 331->326 333 7ff6a5ef12fb 334 7ff6a5ef1300 _cexit 333->334 335 7ff6a5ef1305 333->335 334->335 335->324 347 7ff6a5ef10e0 336->347 339 7ff6a5ef19bc GetModuleHandleW 340 7ff6a5ef12f7 339->340 340->323 340->333 342 7ff6a5ef188e 341->342 343 7ff6a5ef189c memset RtlCaptureContext RtlLookupFunctionEntry 342->343 344 7ff6a5ef1912 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 343->344 345 7ff6a5ef18d6 RtlVirtualUnwind 343->345 346 7ff6a5ef1996 344->346 345->344 346->321 348 7ff6a5ef10e9 347->348 349 7ff6a5ef10c4 348->349 350 7ff6a5ef13a8 IsProcessorFeaturePresent 348->350 349->339 351 7ff6a5ef13c0 350->351 356 7ff6a5ef147c RtlCaptureContext 351->356 357 7ff6a5ef1496 RtlLookupFunctionEntry 356->357 358 7ff6a5ef13d3 357->358 359 7ff6a5ef14ac RtlVirtualUnwind 357->359 360 7ff6a5ef1374 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 358->360 359->357 359->358 361 7ff6a5ef1312 362 7ff6a5ef19bc GetModuleHandleW 361->362 363 7ff6a5ef1319 362->363 364 7ff6a5ef131d 363->364 365 7ff6a5ef1358 _exit 363->365 366 7ff6a5ef1360 369 7ff6a5ef1740 366->369 370 7ff6a5ef1763 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 369->370 371 7ff6a5ef1369 369->371 370->371 372 7ff6a5ef1100 373 7ff6a5ef1110 372->373 385 7ff6a5ef1578 373->385 375 7ff6a5ef1868 9 API calls 376 7ff6a5ef11b5 375->376 377 7ff6a5ef1134 _RTC_Initialize 383 7ff6a5ef1197 377->383 393 7ff6a5ef1800 InitializeSListHead 377->393 383->375 384 7ff6a5ef11a5 383->384 386 7ff6a5ef15bb 385->386 387 7ff6a5ef1589 385->387 386->377 388 7ff6a5ef15f8 387->388 391 7ff6a5ef158e __scrt_release_startup_lock 387->391 389 7ff6a5ef1868 9 API calls 388->389 390 7ff6a5ef1602 389->390 391->386 392 7ff6a5ef15ab _initialize_onexit_table 391->392 392->386 394 7ff6a5ef11c8 398 7ff6a5ef1a10 SetUnhandledExceptionFilter 394->398 399 7ff6a5ef1e16 _seh_filter_exe

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6A5EF1E34 1 Function_00007FF6A5EF1374 2 Function_00007FF6A5EF1AF4 3 Function_00007FF6A5EF1D74 4 Function_00007FF6A5EF17F0 5 Function_00007FF6A5EF14F0 15 Function_00007FF6A5EF1CA0 5->15 6 Function_00007FF6A5EF152C 6->2 28 Function_00007FF6A5EF1810 6->28 7 Function_00007FF6A5EF16EC 8 Function_00007FF6A5EF17EC 9 Function_00007FF6A5EF1728 9->7 10 Function_00007FF6A5EF1828 14 Function_00007FF6A5EF1820 10->14 20 Function_00007FF6A5EF1818 10->20 11 Function_00007FF6A5EF1868 16 Function_00007FF6A5EF1860 11->16 12 Function_00007FF6A5EF11E4 12->5 12->6 12->11 19 Function_00007FF6A5EF169C 12->19 21 Function_00007FF6A5EF1858 12->21 29 Function_00007FF6A5EF1850 12->29 31 Function_00007FF6A5EF1604 12->31 33 Function_00007FF6A5EF1000 12->33 37 Function_00007FF6A5EF16C0 12->37 40 Function_00007FF6A5EF19BC 12->40 13 Function_00007FF6A5EF1A20 17 Function_00007FF6A5EF10E0 17->1 38 Function_00007FF6A5EF147C 17->38 18 Function_00007FF6A5EF1360 36 Function_00007FF6A5EF1740 18->36 19->15 22 Function_00007FF6A5EF1E16 23 Function_00007FF6A5EF1814 24 Function_00007FF6A5EF1D54 24->3 25 Function_00007FF6A5EF1695 26 Function_00007FF6A5EF1312 26->40 27 Function_00007FF6A5EF1A10 30 Function_00007FF6A5EF11C8 30->8 30->27 32 Function_00007FF6A5EF1844 33->17 34 Function_00007FF6A5EF1800 35 Function_00007FF6A5EF1100 35->4 35->8 35->9 35->10 35->11 35->23 35->28 35->32 35->34 39 Function_00007FF6A5EF1A7C 35->39 41 Function_00007FF6A5EF1578 35->41 42 Function_00007FF6A5EF17F8 35->42 37->28 41->11 41->15 43 Function_00007FF6A5EF1AB8

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2480872157.00007FF6A5EF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A5EF0000, based on PE: true
    • Associated: 00000000.00000002.2480858908.00007FF6A5EF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480885816.00007FF6A5EF2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480899505.00007FF6A5EF9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a5ef0000_4sRugP90qT.jbxd
    Similarity
    • API ID: Internet$Open$CreateFileObjectProtectReadSingleThreadVirtualWait
    • String ID: http://120.46.149.112:8888/safekey$myapp
    • API String ID: 593446812-2661280236
    • Opcode ID: 146231c0edff906b082c6d7a255dc9f98b3b113195260dc2d2b1aa3ef92d2b2e
    • Instruction ID: a898285be427094114ac46f57979bc14f94eb2cc8029304a66870a50a3d8f04c
    • Opcode Fuzzy Hash: 146231c0edff906b082c6d7a255dc9f98b3b113195260dc2d2b1aa3ef92d2b2e
    • Instruction Fuzzy Hash: F8114F72A1AA4282E720CF60FD50AAA7761FF89B54F905136E94E86B64DF3CD54CCB40

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2480872157.00007FF6A5EF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A5EF0000, based on PE: true
    • Associated: 00000000.00000002.2480858908.00007FF6A5EF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480885816.00007FF6A5EF2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480899505.00007FF6A5EF9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a5ef0000_4sRugP90qT.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: c6c27bfd29588ab3c2aec4038d0d4f839e39a18cb6b2207648ac8c4f4f3e1d13
    • Instruction ID: 0231d7536382f091a54c27df54b64a9605e9690fd8ba95aa7769d9fcf48b667b
    • Opcode Fuzzy Hash: c6c27bfd29588ab3c2aec4038d0d4f839e39a18cb6b2207648ac8c4f4f3e1d13
    • Instruction Fuzzy Hash: A131F531E0E64A81FA18EB65F6513B93291BF87F84F445039EA4DC76D7DE2DAC0D8211

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2480872157.00007FF6A5EF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A5EF0000, based on PE: true
    • Associated: 00000000.00000002.2480858908.00007FF6A5EF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480885816.00007FF6A5EF2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480899505.00007FF6A5EF9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a5ef0000_4sRugP90qT.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: df7ab41cbe3bf3c08c7da13a65cf1b2f38e42a0b337fd61a9f760d58cce64e80
    • Instruction ID: 53158efb10aec35cd441a09118d4fa09cd7672ab9112c0efd110d965246c9e29
    • Opcode Fuzzy Hash: df7ab41cbe3bf3c08c7da13a65cf1b2f38e42a0b337fd61a9f760d58cce64e80
    • Instruction Fuzzy Hash: FA313A72A0AA8586EB64DF60F9407E97360FB85B44F44443ADA4E87B94DF38DA4CC710
    Memory Dump Source
    • Source File: 00000000.00000002.2480872157.00007FF6A5EF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A5EF0000, based on PE: true
    • Associated: 00000000.00000002.2480858908.00007FF6A5EF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480885816.00007FF6A5EF2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2480899505.00007FF6A5EF9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a5ef0000_4sRugP90qT.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0611e92d3c807327bf07e5ba493823187bdca07838227aee77197a44389e0769
    • Instruction ID: d92e4faa4d52d908cfbcc5cc41624e5d406085a72cec8234ed8ef526785b691c
    • Opcode Fuzzy Hash: 0611e92d3c807327bf07e5ba493823187bdca07838227aee77197a44389e0769
    • Instruction Fuzzy Hash: 1AA00132D1AD46D0E648CB00FE504203220BF56B40B408431E00E914A09F2DAC58C211