Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9EoFkvXzGq.exe

Overview

General Information

Sample name:9EoFkvXzGq.exe
renamed because original name is a hash value
Original sample name:2c667f2ca86b0baf1766f322fcd26c2b2fddae4348f86ef399e11eb0a58093a7.exe
Analysis ID:1501765
MD5:84fa0ceb37f3d3d41404044bbeedc343
SHA1:9d3bfb93fd738c72ea3a64301522b6be47f2a6e8
SHA256:2c667f2ca86b0baf1766f322fcd26c2b2fddae4348f86ef399e11eb0a58093a7
Tags:120-46-149-112exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • 9EoFkvXzGq.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\9EoFkvXzGq.exe" MD5: 84FA0CEB37F3D3D41404044BBEEDC343)
    • WerFault.exe (PID: 7928 cmdline: C:\Windows\system32\WerFault.exe -u -p 7256 -s 1096 MD5: 59550DE0393B1CDD584A1467D6D734E7)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\9EoFkvXzGq.exe, Initiated: true, ProcessId: 7256, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49708
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 9EoFkvXzGq.exeVirustotal: Detection: 26%Perma Link
Source: 9EoFkvXzGq.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: 9EoFkvXzGq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\dy_load\x64\Release\dy_load.pdb source: 9EoFkvXzGq.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 8888
Source: global trafficTCP traffic: 192.168.2.3:49708 -> 120.46.149.112:8888
Source: Joe Sandbox ViewIP Address: 120.46.149.112 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C061000 InternetOpenW,InternetOpenUrlA,InternetReadFile,GetModuleHandleW,GetProcAddress,VirtualProtect,CreateThread,WaitForSingleObject,0_2_00007FF78C061000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478092647.00000072490FA000.00000004.00000010.00020000.00000000.sdmp, 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F7594000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyMF
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyQLv
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyTL
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C0610000_2_00007FF78C061000
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7256 -s 1096
Source: classification engineClassification label: mal56.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7256
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5836afe3-0d39-4a33-a064-c1d03bdb9c8aJump to behavior
Source: 9EoFkvXzGq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 9EoFkvXzGq.exeVirustotal: Detection: 26%
Source: 9EoFkvXzGq.exeReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Users\user\Desktop\9EoFkvXzGq.exe "C:\Users\user\Desktop\9EoFkvXzGq.exe"
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7256 -s 1096
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: 9EoFkvXzGq.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 9EoFkvXzGq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 9EoFkvXzGq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\dy_load\x64\Release\dy_load.pdb source: 9EoFkvXzGq.exe
Source: 9EoFkvXzGq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 9EoFkvXzGq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 9EoFkvXzGq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 9EoFkvXzGq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 9EoFkvXzGq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F7602000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 9c 31 6b 7d 78 89-be 90 b3 22 a5 ab 1b 52
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: 9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F7602000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWA
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C061938 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF78C061938
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C061938 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF78C061938
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C061444 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF78C061444
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C061AE0 SetUnhandledExceptionFilter,0_2_00007FF78C061AE0
Source: C:\Users\user\Desktop\9EoFkvXzGq.exeCode function: 0_2_00007FF78C061810 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF78C061810
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
9EoFkvXzGq.exe27%VirustotalBrowse
9EoFkvXzGq.exe34%ReversingLabsWin64.Trojan.MintZard
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyQLv0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyMF0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyTL0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey4%VirustotalBrowse
http://120.46.149.112/1%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75D9000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyTL9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75BF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyMF9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75D9000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyQLv9EoFkvXzGq.exe, 00000000.00000002.1478419123.00000253F75BF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501765
Start date and time:2024-08-30 12:53:23 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:9EoFkvXzGq.exe
renamed because original name is a hash value
Original Sample Name:2c667f2ca86b0baf1766f322fcd26c2b2fddae4348f86ef399e11eb0a58093a7.exe
Detection:MAL
Classification:mal56.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.20
  • Excluded domains from analysis (whitelisted): www.bing.com, watson.events.data.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollectorcommon.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
06:54:31API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GxEyLSwNqM.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
EI1Hc80wNB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNEI1Hc80wNB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
r67EeWwi9R.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8872446635621932
Encrypted:false
SSDEEP:192:PCgNgmPPOH0Q2qMrxjIJVSuiFAH4lO8nn:6gqmPPOUQzMrxjESuiFAH4lO8n
MD5:9FD9DC8B39E384E3CB5042E86AD5DAE8
SHA1:6B24482BAC4C0BD987FEBCBBCB173E5EB7B472FF
SHA-256:67478819A141A1265132B255B547CED0995FF2EA0D1C2593E37A849C7EA9DC81
SHA-512:E48879857D8C6EF2C4C21F3A2BE20EA92BCF77C7A8576FBAED2C539D058A25BD4F5D204CA3CA5003D34FC26C394AA80F525E87BE4B37F28809B4FBC7C8F8409F
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.8.6.4.9.2.3.1.3.3.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.8.6.5.2.9.8.1.4.1.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.9.3.3.6.5.8.7.-.2.6.3.5.-.4.1.d.b.-.b.0.8.6.-.6.0.0.0.9.9.8.d.f.6.f.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.2.1.1.f.6.d.f.-.6.b.6.d.-.4.e.e.e.-.b.c.7.f.-.3.e.e.2.0.d.c.a.6.3.b.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.9.E.o.F.k.v.X.z.G.q...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.5.8.-.0.0.0.1.-.0.0.1.5.-.1.b.a.9.-.6.9.f.8.c.a.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.a.7.9.2.2.9.5.3.7.e.1.a.2.5.1.e.6.6.9.2.7.c.d.8.f.b.a.4.7.8.5.0.0.0.0.f.f.f.f.!.0.0.0.0.9.d.3.b.f.b.9.3.f.d.7.3.8.c.7.2.e.a.3.a.6.4.3.0.1.5.2.2.b.6.b.e.4.7.f.2.a.6.e.8.!.9.E.o.F.k.v.X.z.G.q...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.8.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:54:25 2024, 0x1205a4 type
Category:dropped
Size (bytes):150788
Entropy (8bit):1.320183421375452
Encrypted:false
SSDEEP:192:0+jaxMFa8Opomha+VeUCLlO5X9BptrvZhin11yyrpgBSKarPQ97:1ayFazimpe/O5XTpqySpgkDe
MD5:A816FDBDC227394583D831744ABE91E7
SHA1:AC49FEDD7ABC6C1B5468D982CEFCC3A638BDBCDB
SHA-256:F738087AB7851CA5D1CBC6C57749DBAF01441D7F04FAF1EA73553E8F20AB858B
SHA-512:1E0716ADDE97CC3A1D09681EB898254804919141C428E0F34A1286EE8F5B695DCC12A137D9D9DFF36EEC7BC3C579B04CB526268D1FD0428F2BF27363CC08F3E6
Malicious:false
Reputation:low
Preview:MDMP..a..... .........f.........................................U..........T.......8...........T............+..4!......................................................................................................eJ......T.......Lw......................T.......X.....f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8726
Entropy (8bit):3.7059064291189796
Encrypted:false
SSDEEP:192:R6l79RJz9NRY6YweRbgmf4l+lprT89bSL5fLgYmm:R6lXJJU6Y5Rbgmf4o8S1fLgw
MD5:1B40D35F1509AAA505441B35A151E429
SHA1:EFB50D503511074C1090764396C7CC88888FF1B4
SHA-256:83E2A2EBBE52166DF9412D13F6CA39C349AFA833A35454D725A4D206697F7440
SHA-512:D04A4C92D8CB0F6709C778D94B0AB437F38EAE23F2E2EA3026C5C0C5D37B663F5CABCDD52E16FB6F106915C4C78881128EF817FD8EB379E462585257E279CA39
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...3.4.4.8...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.3.4.4.8.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.5.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4640
Entropy (8bit):4.480553260116103
Encrypted:false
SSDEEP:48:cvIwr7SGl8zsDJgkZ71I9oycJWpW8VYY6Ym8M4JvpKM6FMFyq85LKW1kk1vAS9Zr:uIafdh7W/7V5JvgM/FuKOkk1v9ZZh9d
MD5:40BE748118CFE3B83CEC12A3D06DE833
SHA1:60AEA08BA01F8DF814DFF5BBD5D0D6A0B429E413
SHA-256:6B3ECCCA867D5F975EA49FA57DC328327D665E824E51599089718CA211B272A1
SHA-512:C6E81439A291FF655A75339EC87B31E9C1ED34810ED61E4CD8FBE268C3C1B4841816724797DC77086687553660CFC8E4C140A56430B0EFB51B497D2BA39D03F9
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="3448" />.. <arg nm="verqfe" val="3448" />.. <arg nm="csdbld" val="3448" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222821986" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.327342734830284
Encrypted:false
SSDEEP:6144:uRJufhX4RxLT+yjH4A0WBIIQfTa765q/E5ySvL+ML61FhcRo5d5OWiBeh:KJD3BIdBvL+SqcIdYFI
MD5:FFB85BE3EAACF68A8D80E27C6C4E44DF
SHA1:0A4322B8223BB31B5AE5CA550B990E3862C3D2F4
SHA-256:DC353798150770F2876359A38E8B55FB493DBE277D47263BEB8890B5A191264C
SHA-512:F109B2BE32A5C4EFCCB3D7E1FF038E9A04A6DDDBA81C8D2049CA42032E60F3F69E1FF700CA3D9D4E75976151CC9D7EFB8102FE416CE3FE91A68599291E1DB776
Malicious:false
Reputation:low
Preview:regfO...O....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.[$..................................................................................................................................................................................................................................................................................................................................................k1.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.73680545199363
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:9EoFkvXzGq.exe
File size:11'776 bytes
MD5:84fa0ceb37f3d3d41404044bbeedc343
SHA1:9d3bfb93fd738c72ea3a64301522b6be47f2a6e8
SHA256:2c667f2ca86b0baf1766f322fcd26c2b2fddae4348f86ef399e11eb0a58093a7
SHA512:8371aa75538a0489a6d798383773eb78950974164e77fe039b96df50b1635973b90e9135e8e12fbfd6dac7a2cbdda05771dc1354c3c49e74e8799ac697a0375d
SSDEEP:192:d/UQrX5YAU8+Beqdy3jDuEh3Q5tf/rrY:RUQrX5YAGpy3vh3z
TLSH:A4323A47FA858AFFD7584374C83B450EE0397A06A36243CB17A8552A3FA27D035556CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S....................I.~.....I.z.....I.{.....I.|.....%.~.......~.......w...............}.....Rich...........................
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001430
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CF8DCF [Wed Aug 28 20:51:27 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:af497e0b158a2512b8448de650c5a0b8
Instruction
dec eax
sub esp, 28h
call 00007FB6C4CB86ACh
dec eax
add esp, 28h
jmp 00007FB6C4CB8147h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000BFBh]
dec eax
mov ecx, ebx
call dword ptr [00000BEAh]
call dword ptr [00000BFCh]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C10h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000BF4h]
test eax, eax
je 00007FB6C4CB82D9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00002C42h]
call 00007FB6C4CB837Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00002D29h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00002CB9h], eax
dec eax
mov eax, dword ptr [00002D12h]
dec eax
mov dword ptr [00002B83h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00002C87h], eax
mov dword ptr [00002B5Dh], C0000409h
mov dword ptr [00002B57h], 00000001h
mov dword ptr [00002B61h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x29540xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1c8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf1c0x1000681a4868a0d4086e74bf664570d362edFalse0.629638671875zlib compressed data5.891985994479724IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x10800x120076ce397692cb04094bbb8786109b4ac8False0.3628472222222222data3.9328880374486217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x40000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xa0000x1800x200bc694575cb4fb31a982939559209ca26False0.4453125data2.9906778217586925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xb0000x1e00x200ae46018e2eb1721187fc1aeee8663872False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xc0000x300x20088391b8fc5db3f0c2387117cfd6cdec1False0.125data0.7245844403890207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xb0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllWaitForSingleObject, CreateThread, GetProcAddress, GetModuleHandleW, RtlLookupFunctionEntry, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, RtlCaptureContext, GetCurrentProcess, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
WININET.dllInternetOpenW, InternetReadFile, InternetOpenUrlA
VCRUNTIME140.dll__C_specific_handler, __current_exception, __current_exception_context, memset, memcpy
api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, terminate, __p___argv, _register_onexit_function, _cexit, _c_exit, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _initialize_onexit_table, _set_app_type, _seh_filter_exe, _register_thread_local_exe_atexit_callback, __p___argc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:54:23.549756050 CEST497088888192.168.2.3120.46.149.112
Aug 30, 2024 12:54:23.555095911 CEST888849708120.46.149.112192.168.2.3
Aug 30, 2024 12:54:23.555192947 CEST497088888192.168.2.3120.46.149.112
Aug 30, 2024 12:54:23.555315018 CEST497088888192.168.2.3120.46.149.112
Aug 30, 2024 12:54:23.560609102 CEST888849708120.46.149.112192.168.2.3
Aug 30, 2024 12:54:25.629158020 CEST888849708120.46.149.112192.168.2.3
Aug 30, 2024 12:54:25.629245996 CEST497088888192.168.2.3120.46.149.112
Aug 30, 2024 12:54:25.629374027 CEST497088888192.168.2.3120.46.149.112
Aug 30, 2024 12:54:25.637365103 CEST888849708120.46.149.112192.168.2.3
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.349708120.46.149.11288887256C:\Users\user\Desktop\9EoFkvXzGq.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:54:23.555315018 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:54:21
Start date:30/08/2024
Path:C:\Users\user\Desktop\9EoFkvXzGq.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\9EoFkvXzGq.exe"
Imagebase:0x7ff78c060000
File size:11'776 bytes
MD5 hash:84FA0CEB37F3D3D41404044BBEEDC343
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:54:24
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7256 -s 1096
Imagebase:0x7ff6e6a50000
File size:576'896 bytes
MD5 hash:59550DE0393B1CDD584A1467D6D734E7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:25.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:24.6%
    Total number of Nodes:65
    Total number of Limit Nodes:3
    execution_graph 374 7ff78c061298 378 7ff78c061ae0 SetUnhandledExceptionFilter 374->378 325 7ff78c0612b4 326 7ff78c0612cd __scrt_initialize_crt 325->326 327 7ff78c06140b 326->327 328 7ff78c0612d5 __scrt_acquire_startup_lock 326->328 354 7ff78c061938 IsProcessorFeaturePresent 327->354 330 7ff78c061415 328->330 336 7ff78c0612f3 __scrt_release_startup_lock 328->336 331 7ff78c061938 9 API calls 330->331 332 7ff78c061420 331->332 334 7ff78c061428 _exit 332->334 333 7ff78c061318 335 7ff78c06139e _get_initial_narrow_environment __p___argv __p___argc 345 7ff78c061000 335->345 336->333 336->335 339 7ff78c061396 _register_thread_local_exe_atexit_callback 336->339 339->335 342 7ff78c0613cb 343 7ff78c0613d5 342->343 344 7ff78c0613d0 _cexit 342->344 343->333 344->343 347 7ff78c061060 InternetOpenW InternetOpenUrlA InternetReadFile 345->347 348 7ff78c0610f3 347->348 348->348 349 7ff78c061108 GetModuleHandleW GetProcAddress VirtualProtect CreateThread WaitForSingleObject 348->349 360 7ff78c0611b0 349->360 352 7ff78c061a8c GetModuleHandleW 353 7ff78c0613c7 352->353 353->332 353->342 355 7ff78c06195e 354->355 356 7ff78c06196c memset RtlCaptureContext RtlLookupFunctionEntry 355->356 357 7ff78c0619a6 RtlVirtualUnwind 356->357 358 7ff78c0619e2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 356->358 357->358 359 7ff78c061a66 358->359 359->330 361 7ff78c0611b9 360->361 362 7ff78c06118a 361->362 363 7ff78c061478 IsProcessorFeaturePresent 361->363 362->352 364 7ff78c061490 363->364 369 7ff78c06154c RtlCaptureContext 364->369 370 7ff78c061566 RtlLookupFunctionEntry 369->370 371 7ff78c06157c RtlVirtualUnwind 370->371 372 7ff78c0614a3 370->372 371->370 371->372 373 7ff78c061444 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 372->373 379 7ff78c061ee6 _seh_filter_exe 380 7ff78c061430 383 7ff78c061810 380->383 384 7ff78c061439 383->384 385 7ff78c061833 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 383->385 385->384 386 7ff78c0611d0 387 7ff78c0611e0 386->387 399 7ff78c061648 387->399 389 7ff78c061938 9 API calls 390 7ff78c061285 389->390 391 7ff78c061204 _RTC_Initialize 397 7ff78c061267 391->397 407 7ff78c0618d0 InitializeSListHead 391->407 397->389 398 7ff78c061275 397->398 400 7ff78c061659 399->400 401 7ff78c06168b 399->401 402 7ff78c0616c8 400->402 405 7ff78c06165e __scrt_release_startup_lock 400->405 401->391 403 7ff78c061938 9 API calls 402->403 404 7ff78c0616d2 403->404 405->401 406 7ff78c06167b _initialize_onexit_table 405->406 406->401 408 7ff78c0613e2 409 7ff78c061a8c GetModuleHandleW 408->409 410 7ff78c0613e9 409->410 411 7ff78c061428 _exit 410->411 412 7ff78c0613ed 410->412

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF78C06176C 7 Function_00007FF78C061D70 0->7 1 Function_00007FF78C061928 2 Function_00007FF78C0618E8 3 Function_00007FF78C0612B4 3->0 3->1 15 Function_00007FF78C061920 3->15 21 Function_00007FF78C061A8C 3->21 25 Function_00007FF78C0616D4 3->25 30 Function_00007FF78C061790 3->30 33 Function_00007FF78C0615FC 3->33 34 Function_00007FF78C061938 3->34 41 Function_00007FF78C061000 3->41 43 Function_00007FF78C0615C0 3->43 4 Function_00007FF78C061930 5 Function_00007FF78C061430 29 Function_00007FF78C061810 5->29 6 Function_00007FF78C0611B0 19 Function_00007FF78C06154C 6->19 37 Function_00007FF78C061444 6->37 8 Function_00007FF78C0618F0 9 Function_00007FF78C061AF0 10 Function_00007FF78C061298 16 Function_00007FF78C061AE0 10->16 32 Function_00007FF78C0618BC 10->32 11 Function_00007FF78C061E24 39 Function_00007FF78C061E44 11->39 12 Function_00007FF78C0618E4 13 Function_00007FF78C061EE6 14 Function_00007FF78C061765 17 Function_00007FF78C0618E0 18 Function_00007FF78C0613E2 18->21 20 Function_00007FF78C061B4C 22 Function_00007FF78C061648 22->7 22->34 23 Function_00007FF78C0618C8 24 Function_00007FF78C061B88 26 Function_00007FF78C061914 27 Function_00007FF78C0618D0 28 Function_00007FF78C0611D0 28->12 28->17 28->20 28->22 28->23 28->26 28->27 28->32 28->34 35 Function_00007FF78C0618F8 28->35 36 Function_00007FF78C0617F8 28->36 42 Function_00007FF78C0618C0 28->42 30->17 31 Function_00007FF78C0617BC 33->17 38 Function_00007FF78C061BC4 33->38 34->4 35->2 35->8 36->31 40 Function_00007FF78C061F04 41->6 43->7

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1478648145.00007FF78C061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78C060000, based on PE: true
    • Associated: 00000000.00000002.1478630703.00007FF78C060000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478664031.00007FF78C062000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478681070.00007FF78C064000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478700306.00007FF78C06A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff78c060000_9EoFkvXzGq.jbxd
    Similarity
    • API ID: Internet$Open$AddressCreateFileHandleModuleObjectProcProtectReadSingleThreadVirtualWait
    • String ID: Virt$kernel32.dll$myapp$rote$ualP$wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
    • API String ID: 2634925598-2589809954
    • Opcode ID: 4f5985fcd011a97b0c0b8095289fc7523365da7e1657cfbcc30d2fcff92c8236
    • Instruction ID: de56d69324583c97475aa4d5a0786a9a9298a9a46d0d0fd856b28cddb7f33737
    • Opcode Fuzzy Hash: 4f5985fcd011a97b0c0b8095289fc7523365da7e1657cfbcc30d2fcff92c8236
    • Instruction Fuzzy Hash: FE41DD22B08B8289FB20DF75E810BA9B760FB487E4F945635DA9D06B99DF3CD244C710

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1478648145.00007FF78C061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78C060000, based on PE: true
    • Associated: 00000000.00000002.1478630703.00007FF78C060000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478664031.00007FF78C062000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478681070.00007FF78C064000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478700306.00007FF78C06A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff78c060000_9EoFkvXzGq.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: b2182c7b14adfddf781b315a9aad4e34d615f6afaae512aacb01ed0b52583733
    • Instruction ID: 0809eef3a04bd52c8c860caf96a25882e8575b522c8c63dea74ff9b037b35b1d
    • Opcode Fuzzy Hash: b2182c7b14adfddf781b315a9aad4e34d615f6afaae512aacb01ed0b52583733
    • Instruction Fuzzy Hash: 6A310221B0C34282EA14BFA1EC11BB9B291BF457C6FE44435EA4E4B6D7DF6CA945C260

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1478648145.00007FF78C061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78C060000, based on PE: true
    • Associated: 00000000.00000002.1478630703.00007FF78C060000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478664031.00007FF78C062000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478681070.00007FF78C064000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478700306.00007FF78C06A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff78c060000_9EoFkvXzGq.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 61a4f350fa6905d8eb88ad8cbefa18689b416e91f7c944afef7cf6b38cd9874d
    • Instruction ID: 1f59fcf7b46c89feea8acf7d43efb4a2e8f0136e14e0c2391389675eb2a118f5
    • Opcode Fuzzy Hash: 61a4f350fa6905d8eb88ad8cbefa18689b416e91f7c944afef7cf6b38cd9874d
    • Instruction Fuzzy Hash: 91313072709B8186EB60AF60E8507EDB361FB84785F94443ADA8E47B95DF3CD648C720
    Memory Dump Source
    • Source File: 00000000.00000002.1478648145.00007FF78C061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78C060000, based on PE: true
    • Associated: 00000000.00000002.1478630703.00007FF78C060000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478664031.00007FF78C062000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478681070.00007FF78C064000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1478700306.00007FF78C06A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff78c060000_9EoFkvXzGq.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b63bb48cba627ffa941d655f75637144dc52ddd976c272408cee291bd5416123
    • Instruction ID: 825595f6c6d9dea2874bfaf183a9d514fd61a9f8a4ba700df4d615d83cec6055
    • Opcode Fuzzy Hash: b63bb48cba627ffa941d655f75637144dc52ddd976c272408cee291bd5416123
    • Instruction Fuzzy Hash: A9A00122A0CA02D4E644AF40AE50924B322BB54385BA00031D04E914A1DF6CA402C660