Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r67EeWwi9R.exe

Overview

General Information

Sample name:r67EeWwi9R.exe
renamed because original name is a hash value
Original sample name:89cb6e6616375706d583da6a678db422b19f201ec1457cd70d826747f824657b.exe
Analysis ID:1501767
MD5:f55ac9389486da2991b1bb8a7005c5a4
SHA1:a65e0b8f6a2dd1841a144422a8cb31e47001c2ac
SHA256:89cb6e6616375706d583da6a678db422b19f201ec1457cd70d826747f824657b
Tags:120-46-149-112exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • r67EeWwi9R.exe (PID: 5040 cmdline: "C:\Users\user\Desktop\r67EeWwi9R.exe" MD5: F55AC9389486DA2991B1BB8A7005C5A4)
    • WerFault.exe (PID: 5728 cmdline: C:\Windows\system32\WerFault.exe -u -p 5040 -s 1116 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\r67EeWwi9R.exe, Initiated: true, ProcessId: 5040, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49704
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: r67EeWwi9R.exeReversingLabs: Detection: 21%
Source: r67EeWwi9R.exeVirustotal: Detection: 16%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: r67EeWwi9R.exeJoe Sandbox ML: detected
Source: r67EeWwi9R.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: r67EeWwi9R.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
Source: global trafficTCP traffic: 192.168.2.8:49704 -> 120.46.149.112:8888
Source: Joe Sandbox ViewIP Address: 120.46.149.112 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C51000 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,RtlAllocateHeap,memcpy,0_2_00007FF719C51000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/x
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A87C000.00000004.00000020.00020000.00000000.sdmp, r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8A1000.00000004.00000020.00020000.00000000.sdmp, r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmp, r67EeWwi9R.exe, 00000000.00000002.1570853536.000000EED90FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey/
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey4
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyi
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyt
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C510000_2_00007FF719C51000
Source: C:\Users\user\Desktop\r67EeWwi9R.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5040 -s 1116
Source: classification engineClassification label: mal60.troj.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5040
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\22b90a7e-1c0b-4658-8c6f-7fdc3ca0d62aJump to behavior
Source: r67EeWwi9R.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\r67EeWwi9R.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: r67EeWwi9R.exeReversingLabs: Detection: 21%
Source: r67EeWwi9R.exeVirustotal: Detection: 16%
Source: unknownProcess created: C:\Users\user\Desktop\r67EeWwi9R.exe "C:\Users\user\Desktop\r67EeWwi9R.exe"
Source: C:\Users\user\Desktop\r67EeWwi9R.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5040 -s 1116
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: r67EeWwi9R.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: r67EeWwi9R.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: r67EeWwi9R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: r67EeWwi9R.exe
Source: r67EeWwi9R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: r67EeWwi9R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: r67EeWwi9R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: r67EeWwi9R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: r67EeWwi9R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8E6000.00000004.00000020.00020000.00000000.sdmp, r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\r67EeWwi9R.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C51908 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF719C51908
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C51908 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF719C51908
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C51414 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF719C51414
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C51AB0 SetUnhandledExceptionFilter,0_2_00007FF719C51AB0
Source: C:\Users\user\Desktop\r67EeWwi9R.exeCode function: 0_2_00007FF719C517E0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF719C517E0
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
r67EeWwi9R.exe21%ReversingLabsWin64.Trojan.Generic
r67EeWwi9R.exe16%VirustotalBrowse
r67EeWwi9R.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey40%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyt0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey4%VirustotalBrowse
http://120.46.149.112/x0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyi0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekey4r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeytr67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/xr67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8BE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey/r67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8C4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyir67EeWwi9R.exe, 00000000.00000002.1571306650.0000020E4A8A1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501767
Start date and time:2024-08-30 12:52:58 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:r67EeWwi9R.exe
renamed because original name is a hash value
Original Sample Name:89cb6e6616375706d583da6a678db422b19f201ec1457cd70d826747f824657b.exe
Detection:MAL
Classification:mal60.troj.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.73.29
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
06:54:09API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GxEyLSwNqM.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
EI1Hc80wNB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNal7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GxEyLSwNqM.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
EI1Hc80wNB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.888096140260386
Encrypted:false
SSDEEP:96:yZFtMWVsUhqxo57JnSQXIDcQuc66picEP/cw3Ph+HbHg/ZjnZ+ZFGLGCI72bBuO8:K3MWVAi0A9tajoxVzuiFTZ24lO8e
MD5:1D739F645D524B0553C342B47180960C
SHA1:731D7D2D1AB86A3815B4EC7542FA61EBBAE85664
SHA-256:156C66054CBF69EBA21E9476675B0E8D4FF80358CD9AF7B8B74CDEA93B56BED0
SHA-512:DC91F90696F31FC86510B85D683CDBAE6E57E4929C11F9684D8CA2A2588A1FCCEAD599325D7A693B142D9BFA7A06E60C7843A884320AA41BCC1C355849CD795C
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.8.4.4.0.0.1.0.5.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.8.4.4.4.0.7.3.0.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.4.e.b.6.9.2.1.-.4.2.a.6.-.4.5.5.6.-.a.7.d.a.-.1.5.3.7.2.4.5.e.5.0.2.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.5.6.c.0.a.7.2.-.9.d.8.3.-.4.4.3.c.-.8.f.3.e.-.2.8.a.9.b.2.b.e.a.f.2.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.6.7.E.e.W.w.i.9.R...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.b.0.-.0.0.0.1.-.0.0.1.4.-.9.f.b.d.-.c.1.e.b.c.a.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.3.5.a.b.4.3.5.2.9.a.0.0.b.9.3.1.b.0.5.3.9.b.9.c.4.e.f.e.d.8.1.0.0.0.0.f.f.f.f.!.0.0.0.0.a.6.5.e.0.b.8.f.6.a.2.d.d.1.8.4.1.a.1.4.4.4.2.2.a.8.c.b.3.1.e.4.7.0.0.1.c.2.a.c.!.r.6.7.E.e.W.w.i.9.R...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.8.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:54:04 2024, 0x1205a4 type
Category:dropped
Size (bytes):141750
Entropy (8bit):1.4207071712622565
Encrypted:false
SSDEEP:768:xhlJKdJ4w5zKrnlGMg0szTs1Bz7rVT8Qjc:Yv5zKrlGMg0szTQz7rVTvjc
MD5:6850D5E4E633A8FC518CEDCBCFDEEE2E
SHA1:EEA82BB3E49F184E9C8778B157FA368C7525444C
SHA-256:696452AAD93AD1C096D23C229A79662B3FFAE1ABD3518C62300626895D9D0B14
SHA-512:707B2FF8C05BBF09820080B7A9E1657DED047BF9A72C2131D4D1A927920CDC74A083597F8F8FC525926ED6D004919DCA5E5D68373B191644F8BF1A94B819D6FB
Malicious:false
Reputation:low
Preview:MDMP..a..... .........f.........................................P..........T.......8...........T...........X+..^.......................................................................................................eJ......$.......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8766
Entropy (8bit):3.7037686157460157
Encrypted:false
SSDEEP:192:R6l7wVeJZWkU6YSGsCLgmftNprH89b5WEf+ETm:R6lXJ496YTsCLgmftI5Nfa
MD5:0BD33EE9A56D347E672A23926108DF94
SHA1:53A01215DBE314CD61D877DB71380BCD2BEFED7D
SHA-256:FB473A06A4F2A0A8E024B22DEB9ADD46DD9B3259D896CAFEC4F4733C2393CF1B
SHA-512:4FEFAAFFB823CE05B2E440DA2B4AFF70732159B8FF6191FE200A9E243D83888BE1916FBD534C7901C51CD8F90B116141853046C9A27DE31AC2D538CDF1EA1E41
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.4.0.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4677
Entropy (8bit):4.487458814283926
Encrypted:false
SSDEEP:48:cvIwWl8zsrJg771I9L4WpW8VYYOYm8M4JbwRFxyq85lRegmEILd:uIjfFI7Yx7VtJefnEILd
MD5:B1944F63340F3A7D3E6509BCBFF255A2
SHA1:7E86C465B80BE6F06E2514D36ACCF15441AB5618
SHA-256:A28C66F8219C627B34CA8369CF53FDE5717B818073A0DA580C8C805E6FD28361
SHA-512:AF71757BF68F3EC91D695CB2783B41EF54A59E8B9E295ED00CAC166024D7ACAE7A277609BFE9C6167C450FF9D475C0D47DCC4F6F3D0487C077974671E9FC8EC3
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478196" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.372195224250188
Encrypted:false
SSDEEP:6144:SFVfpi6ceLP/9skLmb04yWWSPtaJG8nAge35OlMMhA2AX4WABlguNriL:6V1GyWWI/glMM6kF79q
MD5:8E5E900F6D7B38C3E0F9A2D331699AE6
SHA1:E215251D2D5B95415E661F039C0536383FEBC6CA
SHA-256:A25F83ECA5C59E9089533CE75EC7627C4097F1C8340982ED10F79DB8BEF730A4
SHA-512:EE32C66D861DEBE762BDC988DFE90BBDD6D3B07B9F64929B97DC994CD4D05DA21C7C0B5CFABF2FC0F6BEA61347D6CF47ADF191960C6B86A5E4703A1C14066700
Malicious:false
Reputation:low
Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm6...................................................................................................................................................................................................................................................................................................................................................Z...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.856531079476391
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:r67EeWwi9R.exe
File size:11'264 bytes
MD5:f55ac9389486da2991b1bb8a7005c5a4
SHA1:a65e0b8f6a2dd1841a144422a8cb31e47001c2ac
SHA256:89cb6e6616375706d583da6a678db422b19f201ec1457cd70d826747f824657b
SHA512:b554fdaa8f7d269952af71db7a1a5a9ec7a8d4490e6b4dd39da95fd68388b189087faf230a7f9feefbd9744bcc6c1ed453d6b74adcf13a602ffd6cacd383ffc0
SSDEEP:96:8k2Qiq3EaS3JTVVx3LhrBGb5JaLUeQ1OsDXEWhh2Ivu4F8mw3Q5tfcQrOEWUxO:92Q50lbhfUes0W/2Ivu4E3Q5tfXrS
TLSH:E1323A56F645CCFAD62D0239C93F479EE074B602A72363CF13A848192F223E172562CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S....................I.~.....I.z.....I.{.....I.|.....%.~.......~.......w...............}.....Rich...........................
Icon Hash:00928e8e8686b000
Entrypoint:0x140001400
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CFB119 [Wed Aug 28 23:22:01 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:eebb9b852c2f8e22962c540a29adf39a
Instruction
dec eax
sub esp, 28h
call 00007F5BD093667Ch
dec eax
add esp, 28h
jmp 00007F5BD0936117h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000C1Bh]
dec eax
mov ecx, ebx
call dword ptr [00000C0Ah]
call dword ptr [00000C14h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C08h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000C1Ch]
test eax, eax
je 00007F5BD09362A9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001C72h]
call 00007F5BD093634Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001D59h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001CE9h], eax
dec eax
mov eax, dword ptr [00001D42h]
dec eax
mov dword ptr [00001BB3h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001CB7h], eax
mov dword ptr [00001B8Dh], C0000409h
mov dword ptr [00001B87h], 00000001h
mov dword ptr [00001B91h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x24000x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22c00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1c8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xeec0x1000a3a622747318eca3be014f4717f9a8d4False0.620849609375zlib compressed data5.818635671875901IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xfec0x10008ce9334d681dd53ca5134e8605263813False0.3974609375data4.253498960387227IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x6380x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x40000x1800x2008c12dc838aaf4a6c9af7cc0b513f5903False0.4453125data2.91207005449716IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x50000x1e00x2004dde323af9808a00b376d6895922dc1fFalse0.525390625data4.696122618599126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000x300x200eb592baf4f8e32571d60e52a6fb0ea45False0.126953125data0.7195083879349718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x50600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllHeapCreate, HeapAlloc, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, RtlCaptureContext
WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
VCRUNTIME140.dll__C_specific_handler, __current_exception, __current_exception_context, memset, memcpy
api-ms-win-crt-heap-l1-1-0.dllmalloc, _set_new_mode
api-ms-win-crt-runtime-l1-1-0.dllterminate, _cexit, _crt_atexit, _register_onexit_function, _c_exit, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, __p___argc, _set_app_type, _seh_filter_exe, _register_thread_local_exe_atexit_callback, __p___argv, _initialize_onexit_table
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:54:02.559983015 CEST497048888192.168.2.8120.46.149.112
Aug 30, 2024 12:54:02.566535950 CEST888849704120.46.149.112192.168.2.8
Aug 30, 2024 12:54:02.566657066 CEST497048888192.168.2.8120.46.149.112
Aug 30, 2024 12:54:02.566839933 CEST497048888192.168.2.8120.46.149.112
Aug 30, 2024 12:54:02.573246002 CEST888849704120.46.149.112192.168.2.8
Aug 30, 2024 12:54:04.672796965 CEST888849704120.46.149.112192.168.2.8
Aug 30, 2024 12:54:04.672888041 CEST497048888192.168.2.8120.46.149.112
Aug 30, 2024 12:54:04.673048973 CEST497048888192.168.2.8120.46.149.112
Aug 30, 2024 12:54:04.695648909 CEST888849704120.46.149.112192.168.2.8
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.849704120.46.149.11288885040C:\Users\user\Desktop\r67EeWwi9R.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:54:02.566839933 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:54:00
Start date:30/08/2024
Path:C:\Users\user\Desktop\r67EeWwi9R.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\r67EeWwi9R.exe"
Imagebase:0x7ff719c50000
File size:11'264 bytes
MD5 hash:F55AC9389486DA2991B1BB8A7005C5A4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:54:03
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 5040 -s 1116
Imagebase:0x7ff647ae0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:23.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:26.9%
    Total number of Nodes:67
    Total number of Limit Nodes:3
    execution_graph 377 7ff719c51268 381 7ff719c51ab0 SetUnhandledExceptionFilter 377->381 327 7ff719c51284 328 7ff719c5129d __scrt_initialize_crt 327->328 329 7ff719c513db 328->329 330 7ff719c512a5 __scrt_acquire_startup_lock 328->330 357 7ff719c51908 IsProcessorFeaturePresent 329->357 332 7ff719c513e5 330->332 333 7ff719c512c3 __scrt_release_startup_lock 330->333 334 7ff719c51908 9 API calls 332->334 336 7ff719c512e8 333->336 338 7ff719c5136e _get_initial_narrow_environment __p___argv __p___argc 333->338 341 7ff719c51366 _register_thread_local_exe_atexit_callback 333->341 335 7ff719c513f0 334->335 337 7ff719c513f8 _exit 335->337 347 7ff719c51000 malloc 338->347 341->338 344 7ff719c5139b 345 7ff719c513a5 344->345 346 7ff719c513a0 _cexit 344->346 345->336 346->345 348 7ff719c51067 347->348 348->348 349 7ff719c510a6 InternetOpenW InternetOpenUrlA InternetReadFile 348->349 350 7ff719c51101 349->350 350->350 351 7ff719c51112 HeapCreate RtlAllocateHeap memcpy 350->351 352 7ff719c5114f 351->352 363 7ff719c51180 352->363 355 7ff719c51a5c GetModuleHandleW 356 7ff719c51397 355->356 356->335 356->344 358 7ff719c5192e 357->358 359 7ff719c5193c memset RtlCaptureContext RtlLookupFunctionEntry 358->359 360 7ff719c51976 RtlVirtualUnwind 359->360 361 7ff719c519b2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 359->361 360->361 362 7ff719c51a36 361->362 362->332 364 7ff719c51189 363->364 365 7ff719c5115e 364->365 366 7ff719c51448 IsProcessorFeaturePresent 364->366 365->355 367 7ff719c51460 366->367 372 7ff719c5151c RtlCaptureContext 367->372 373 7ff719c51536 RtlLookupFunctionEntry 372->373 374 7ff719c5154c RtlVirtualUnwind 373->374 375 7ff719c51473 373->375 374->373 374->375 376 7ff719c51414 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 375->376 382 7ff719c51eb6 _seh_filter_exe 383 7ff719c511a0 384 7ff719c511b0 383->384 396 7ff719c51618 384->396 386 7ff719c51908 9 API calls 387 7ff719c51255 386->387 388 7ff719c511d4 _RTC_Initialize 394 7ff719c51237 388->394 404 7ff719c518a0 InitializeSListHead 388->404 394->386 395 7ff719c51245 394->395 397 7ff719c51629 396->397 402 7ff719c5165b 396->402 398 7ff719c51698 397->398 401 7ff719c5162e __scrt_release_startup_lock 397->401 399 7ff719c51908 9 API calls 398->399 400 7ff719c516a2 399->400 401->402 403 7ff719c5164b _initialize_onexit_table 401->403 402->388 403->402 405 7ff719c51400 408 7ff719c517e0 405->408 409 7ff719c51409 408->409 410 7ff719c51803 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 408->410 410->409 411 7ff719c513b2 412 7ff719c51a5c GetModuleHandleW 411->412 413 7ff719c513b9 412->413 414 7ff719c513bd 413->414 415 7ff719c513f8 _exit 413->415

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF719C51268 6 Function_00007FF719C51AB0 0->6 23 Function_00007FF719C5188C 0->23 1 Function_00007FF719C51DF4 28 Function_00007FF719C51E14 1->28 2 Function_00007FF719C518B4 3 Function_00007FF719C51735 4 Function_00007FF719C51EB6 5 Function_00007FF719C518F0 7 Function_00007FF719C518B0 8 Function_00007FF719C513B2 9 Function_00007FF719C51A5C 8->9 10 Function_00007FF719C5151C 11 Function_00007FF719C51B1C 12 Function_00007FF719C51B58 13 Function_00007FF719C51618 25 Function_00007FF719C51908 13->25 42 Function_00007FF719C51D40 13->42 14 Function_00007FF719C51898 15 Function_00007FF719C518E4 16 Function_00007FF719C516A4 17 Function_0000020E4C600008 18 Function_00007FF719C51760 18->7 19 Function_00007FF719C517E0 20 Function_00007FF719C518A0 21 Function_00007FF719C511A0 21->2 21->7 21->11 21->13 21->14 21->15 21->20 21->23 21->25 26 Function_00007FF719C518C8 21->26 27 Function_00007FF719C517C8 21->27 32 Function_00007FF719C51890 21->32 22 Function_00007FF719C5178C 24 Function_00007FF719C515CC 24->7 29 Function_00007FF719C51B94 24->29 39 Function_00007FF719C51900 25->39 36 Function_00007FF719C518B8 26->36 43 Function_00007FF719C518C0 26->43 27->22 30 Function_00007FF719C51414 31 Function_00007FF719C51ED4 33 Function_00007FF719C51590 33->42 34 Function_00007FF719C5173C 34->42 35 Function_00007FF719C518F8 37 Function_00007FF719C51284 37->5 37->9 37->16 37->18 37->24 37->25 37->33 37->34 37->35 38 Function_00007FF719C51000 37->38 40 Function_00007FF719C51180 38->40 40->10 40->30 41 Function_00007FF719C51400 41->19 44 Function_00007FF719C51AC0

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1571590993.00007FF719C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719C50000, based on PE: true
    • Associated: 00000000.00000002.1571572596.00007FF719C50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571607778.00007FF719C52000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571631202.00007FF719C54000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff719c50000_r67EeWwi9R.jbxd
    Similarity
    • API ID: Internet$HeapOpen$AllocateCreateFileReadmallocmemcpy
    • String ID: myapp
    • API String ID: 1972642005-2274886186
    • Opcode ID: 21a7fb402e502490224ea1c7477a0117ab537fb4f9a7f79d78efc054a26f2318
    • Instruction ID: 7445bd3103e198125645c39fa3e90b242b89cccd3e16dde3ca22b16a00458850
    • Opcode Fuzzy Hash: 21a7fb402e502490224ea1c7477a0117ab537fb4f9a7f79d78efc054a26f2318
    • Instruction Fuzzy Hash: 37318021B1DA81A2F7509F34A85427AA7B2FB857B4FC05235EA9E03B95DE2CD189C710

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1571590993.00007FF719C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719C50000, based on PE: true
    • Associated: 00000000.00000002.1571572596.00007FF719C50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571607778.00007FF719C52000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571631202.00007FF719C54000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff719c50000_r67EeWwi9R.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 33eb15ad6fae3bb1d55c088fbecb9cd72cf6c6665f2b68eda05c42d96e743874
    • Instruction ID: 5797c669115f0b1c4bec68eac43db9495986859893950fd31f251a2f761ea2f2
    • Opcode Fuzzy Hash: 33eb15ad6fae3bb1d55c088fbecb9cd72cf6c6665f2b68eda05c42d96e743874
    • Instruction Fuzzy Hash: A1312921B0CA42A1FA10BF3594693B992B1BFC57ACFC40434E98E476D7DE2DE44E8321

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1571590993.00007FF719C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719C50000, based on PE: true
    • Associated: 00000000.00000002.1571572596.00007FF719C50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571607778.00007FF719C52000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571631202.00007FF719C54000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff719c50000_r67EeWwi9R.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 415e6dc189ca3849d3f66eb4b492430562ee3e69de56415a02d8782bc71e7823
    • Instruction ID: bf2ccf676a9c3b310d67770b9a79582a377e7df8fa2d052bb772078adad10353
    • Opcode Fuzzy Hash: 415e6dc189ca3849d3f66eb4b492430562ee3e69de56415a02d8782bc71e7823
    • Instruction Fuzzy Hash: 85312E72709E8196FB60AF60E8443FAA371FB84758F84443ADA8E47699EF38D549C710
    Memory Dump Source
    • Source File: 00000000.00000002.1571590993.00007FF719C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719C50000, based on PE: true
    • Associated: 00000000.00000002.1571572596.00007FF719C50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571607778.00007FF719C52000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1571631202.00007FF719C54000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff719c50000_r67EeWwi9R.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d769b23c26ccf8a2fc661941fcd44daac738a4be4a6d46bfc1d29c946d915e36
    • Instruction ID: b8c856614c91d88dd0aad2d83c1862c45aab5cba054605c32b8594d4817354d0
    • Opcode Fuzzy Hash: d769b23c26ccf8a2fc661941fcd44daac738a4be4a6d46bfc1d29c946d915e36
    • Instruction Fuzzy Hash: 60A00125A09C02E1F649AF20A954131A6B2BBA0768BC44031E08E914A09E2CA50AD761