Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522727
MD5:1dfcaaf6f77e1a2dc1d4c36305885518
SHA1:e0709a17751bed96486182224fa0f75c261744cd
SHA256:8e65d1ce6e66ab7d6d173444b6a51f890bcd879ad93ecdc2b5d7be0560552d14
Tags:NETexeMSILuser-jstrosch
Infos:

Detection

PureLog Stealer
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • file.exe (PID: 2656 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1DFCAAF6F77E1A2DC1D4C36305885518)
    • WerFault.exe (PID: 5076 cmdline: C:\Windows\system32\WerFault.exe -u -p 2656 -s 908 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1683185150.0000000000062000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.0.file.exe.60000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: file.exeAvira: detected
        Source: file.exeReversingLabs: Detection: 63%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
        Source: file.exeJoe Sandbox ML: detected
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\user\Desktop\file.PDBR source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: mscorlib.pdb source: WER3F64.tmp.dmp.3.dr
        Source: Binary string: C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: ]file.PDB source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WER3F64.tmp.dmp.3.dr
        Source: Binary string: XuOC:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3F64.tmp.dmp.3.dr
        Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFD9B880A000_2_00007FFD9B880A00
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2656 -s 908
        Source: file.exe, 00000000.00000000.1683241362.00000000000BE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXBinder-Output.exe4 vs file.exe
        Source: file.exeBinary or memory string: OriginalFilenameXBinder-Output.exe4 vs file.exe
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: file.exe, Program.csCryptographic APIs: 'TransformFinalBlock'
        Source: file.exe, EwV3ECxYhIse1SOarW.csCryptographic APIs: 'CreateDecryptor'
        Source: file.exe, EwV3ECxYhIse1SOarW.csCryptographic APIs: 'CreateDecryptor'
        Source: classification engineClassification label: mal76.troj.evad.winEXE@2/5@0/0
        Source: C:\Users\user\Desktop\file.exeMutant created: NULL
        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2656
        Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8b26e629-df64-4851-906a-7d5eaa93046cJump to behavior
        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: file.exeReversingLabs: Detection: 63%
        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2656 -s 908
        Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\user\Desktop\file.PDBR source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: mscorlib.pdb source: WER3F64.tmp.dmp.3.dr
        Source: Binary string: C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: ]file.PDB source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WER3F64.tmp.dmp.3.dr
        Source: Binary string: XuOC:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.1812589921.00000000004F5000.00000004.00000010.00020000.00000000.sdmp
        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3F64.tmp.dmp.3.dr

        Data Obfuscation

        barindex
        Source: file.exe, EwV3ECxYhIse1SOarW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: file.exeStatic PE information: section name: .text entropy: 7.794316269977852
        Source: file.exe, Program.csHigh entropy of concatenated method names: 'Main', 'WorkF', 'CreateMutex', 'AES_Decryptor', 'GetTheResource', 'GETP', 'AdminCheck', 'RunBotKiller', 'RemoveFile', 'Inspection'
        Source: file.exe, EwV3ECxYhIse1SOarW.csHigh entropy of concatenated method names: 'PI4eEVrVGSaxaIXvMUx', 'PKM6G6rTXjsrBURgWTY', 'BPTavEfPI8', 'TqIjQNrZAaTWLO9hljc', 'v2wFlGr75W93I6M6HHQ', 'tgkZSxruDq2CAWuGbKo', 'BvHS5PrxrfsRganSelm', 'ybmwLorvUJfSNPwHb0J', 'nnVbTxr2EnSMCMhaRBE', 'FvojAJr9DR1GLVTy9WD'
        Source: file.exe, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'mcXVPd8WuNP3ojmaH0', 'YI2e2cwwyDlWkyjHk6', 'ac3K0PSJNG72bkmcDZ', 'U5l6IfyGVZUBg7JIUX'
        Source: file.exe, geUwbRLwd0WNm7K3QP.csHigh entropy of concatenated method names: 'uylY3gqT4p', 'oit6VsgzSeUkANk3W4n', 'sT14e4rfpJmwClGvSSa', 'RFC0DWrgUW618JuAInO', 'fZpLnYrrEsBWXWUTvFd', 'EGUVB4gcCmTK2uotVs6', 'NxKl0jgMblO7QSRmw8E', 'PnjaFPrYODYCxoLx8G3', 'aGoZEMrkpB77GPNW4vx', 'dkKgh9rBntsRn3kTuSE'
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory allocated: 6F0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory allocated: 1A370000 memory reserve | memory write watchJump to behavior
        Source: Amcache.hve.3.drBinary or memory string: VMware
        Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.3.drBinary or memory string: vmci.sys
        Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.3.drBinary or memory string: VMware20,1
        Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
        Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: file.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.file.exe.60000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1683185150.0000000000062000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: file.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.file.exe.60000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1683185150.0000000000062000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        Process Injection
        2
        Virtualization/Sandbox Evasion
        OS Credential Dumping21
        Security Software Discovery
        Remote Services11
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory2
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
        Software Packing
        Security Account Manager11
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Process Injection
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe63%ReversingLabsByteCode-MSIL.Infostealer.Tinba
        file.exe100%AviraTR/ATRAPS.Gen
        file.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://upx.sf.net0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netAmcache.hve.3.drfalse
        • URL Reputation: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1522727
        Start date and time:2024-09-30 16:08:06 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 3s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:file.exe
        Detection:MAL
        Classification:mal76.troj.evad.winEXE@2/5@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 8
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.189.173.22
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target file.exe, PID 2656 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: file.exe
        TimeTypeDescription
        10:09:10API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.8756480414455323
        Encrypted:false
        SSDEEP:192:2t25BiVvnPiA0PlrQvIxa++zuiFeZ24lO8TVB:o2POn6bPhQyaPzuiFeY4lO8X
        MD5:49935A78B3A6F92FD9CDEA019A42895A
        SHA1:D9F88328132F9C41959F10AA7007CDDCA825034C
        SHA-256:8327CE78EDFC77897BA5C785A3B61A338E2BD7A747606FE28A410A315982B4BF
        SHA-512:F0D1A3AC82A796752EB23124D063D46662FE29996D5F142F3A954BBAEADBA6852270265384DF3C7E12BCB467CB89C34028CBE9705374A0A269F9FB1BB3486985
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.1.7.8.9.3.8.8.9.7.5.5.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.1.7.8.9.3.9.3.9.7.5.3.6.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.8.8.b.9.f.2.9.-.0.6.9.a.-.4.8.0.e.-.b.b.7.8.-.6.b.1.2.b.5.d.4.d.4.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.3.c.6.8.3.a.-.b.9.e.c.-.4.b.4.b.-.a.7.c.d.-.6.2.5.9.f.2.7.e.2.4.6.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.X.B.i.n.d.e.r.-.O.u.t.p.u.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.6.0.-.0.0.0.1.-.0.0.1.4.-.6.a.3.7.-.d.3.4.a.4.2.1.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.b.1.f.5.e.c.8.4.6.3.4.e.a.0.3.a.7.9.a.6.5.e.9.8.c.e.4.7.d.0.a.0.0.0.0.0.0.0.0.!.0.0.0.0.e.0.7.0.9.a.1.7.7.5.1.b.e.d.9.6.4.8.6.1.8.2.2.2.4.f.a.0.f.7.5.c.2.6.1.7.4.4.c.d.!.f.i.l.e...e.x.e.....
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 16 streams, Mon Sep 30 14:08:59 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):246118
        Entropy (8bit):2.593352769231355
        Encrypted:false
        SSDEEP:3072:FLOoGcqFQ9H1CCqWY93+vgtdN9tdN9tdN9tdB:NoO93qWY93Q
        MD5:FE2F9A0CCCB8BFF9B11F7E5A0005ED7D
        SHA1:2C6F9ADC7C86CA45A30B58E00EC8BB2795D08E8C
        SHA-256:4BFA41D3C336F4332D969977860A5FBDBE89006EA36E672BEAFB286FB95A587C
        SHA-512:24E0AB17A3721D1615E2A72F1AAEB08ED096C16D40771AD22020FC4D69C8AE5D796F7DA53D085073A05B6239AD58937B6E8191D1619693E26280D201E99E8290
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... ..........f....................................$............................Q..........l.......8...........T............#..........................................................................................................eJ......0.......Lw......................T.......`......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8524
        Entropy (8bit):3.699056655159593
        Encrypted:false
        SSDEEP:192:R6l7wVeJ1CcTGD6Y9ajZyHhGgmfB24dJ/vprt89b1yTfCwnm:R6lXJTTGD6YAjoggmf84dO12fCN
        MD5:122EBE09C13038A1F29BF1F4503B0325
        SHA1:6AB8062077AC559FC8829BAF8D05C4E63072E775
        SHA-256:3E101AF4C523B660882344F3BBC73D00ADA8B7C35213200A3C569FE0B0F5E299
        SHA-512:34C1AAFE98A169DB66ACC61BE191305AB80541D6B11A8F2A662D740A03DD1936005E0929BA434F40A45BF964770EBDC7733B0DBFE9F3B6DD4324DF5AA992CCCC
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.6.5.6.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4692
        Entropy (8bit):4.463260617717026
        Encrypted:false
        SSDEEP:48:cvIwWl8zsiJg771I9puWpW8VY3Ym8M4JdOsFRAyq85tkTyGq09Xed:uIjfwI72P7VHJO5lD9Xed
        MD5:4D53081FF706C7649DD6FDEC273C4AD1
        SHA1:002153C2AA4AFCBB073EBAA34D276CFCC37E42A9
        SHA-256:73FF1510A9A9DD2CBBF02B2216470C1BC99E68814C574320E611FA670520F5A7
        SHA-512:8DB0374AEE023D6CD0917016DF37B0316C34D64C1F0CE1F88F5F1E10BBE0CD425367E36C129A635572E6D5A4E699B5DB73CFE3C4A0CCC18A35BA75F1048311D5
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="523031" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.465495805591777
        Encrypted:false
        SSDEEP:6144:0IXfpi67eLPU9skLmb0b4hWSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSba:JXD94hWlLZMM6YFH1+a
        MD5:F0177292DB7DE6A52DF0B3035A29F782
        SHA1:3F72073B91DAF364949BBFE4C666EC7D5CB6BCFD
        SHA-256:CB0CA9C5507E18DE4A0CF9F1A3088659BD4586BF920637594BC5071771722AEB
        SHA-512:7646CB3BDEC862FAAC33539A14BD898E753B52726ACD42E4C884E5C614478A1BCF0F38CADDB6579AE17A15B568B3583E27C413CF132C38065969B5DFFF1A0E84
        Malicious:false
        Reputation:low
        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmb.6KB.................................................................................................................................................................................................................................................................................................................................................!.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.733604023820878
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:file.exe
        File size:433'664 bytes
        MD5:1dfcaaf6f77e1a2dc1d4c36305885518
        SHA1:e0709a17751bed96486182224fa0f75c261744cd
        SHA256:8e65d1ce6e66ab7d6d173444b6a51f890bcd879ad93ecdc2b5d7be0560552d14
        SHA512:b88e6d43e4f4a00f8530f1ac368b85de56ecbafa3bf6166706f2d93615bd9ad8dbe5b88dbc9ceb0f8abfaeadeb5b2476da3c33b1d45507bac06e05885f52dbac
        SSDEEP:12288:/OwUtVJHYwNzp4FNesBhSw6cHmpme/T57XZtjNDd6S7sQo:mDLJHYwN14FNesrSw6cs17pv7s
        TLSH:FC94F1A2751A4156C2409B7EC4A3D57003B2AE8A6677CF197DCE2BDB3E033D6E90CB45
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...<N.d............................>.... ........@.. ....................................@................................
        Icon Hash:3e1e5c5c4ce16149
        Entrypoint:0x45c93e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x64BE4E3C [Mon Jul 24 10:11:08 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x5c8f00x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5e0000xef14.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x5a9440x5aa009afc9204dc3319e5250b10b54135939dFalse0.8837688577586207data7.794316269977852IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x5e0000xef140xf0001321c37ebf1a3f3d3dadc408f60cdf1bFalse0.798583984375data7.29341013556895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x6e0000xc0x200b06600170dd675e26bddcbe6edb56cc0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x5e2500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.56636460554371
        RT_ICON0x5f0f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.7287906137184116
        RT_ICON0x5f9a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.7471098265895953
        RT_ICON0x5ff080x909bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9971636186822983
        RT_ICON0x68fa40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.38309128630705397
        RT_ICON0x6b54c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4826454033771107
        RT_ICON0x6c5f40x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.699468085106383
        RT_GROUP_ICON0x6ca5c0x68data0.625
        RT_VERSION0x6cac40x264data0.4624183006535948
        RT_MANIFEST0x6cd280x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
        DLLImport
        mscoree.dll_CorExeMain
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:10:08:58
        Start date:30/09/2024
        Path:C:\Users\user\Desktop\file.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\file.exe"
        Imagebase:0x60000
        File size:433'664 bytes
        MD5 hash:1DFCAAF6F77E1A2DC1D4C36305885518
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1683185150.0000000000062000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:10:08:58
        Start date:30/09/2024
        Path:C:\Windows\System32\WerFault.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\WerFault.exe -u -p 2656 -s 908
        Imagebase:0x7ff6fe180000
        File size:570'736 bytes
        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d9da0b923aa403a0a373691a836c78478d5c84f790a5c58a163dc0c104cfb43a
          • Instruction ID: baa733f7dfb9683ac9d94dcfa2b77745603166a14fe64a235079e770c7c736aa
          • Opcode Fuzzy Hash: d9da0b923aa403a0a373691a836c78478d5c84f790a5c58a163dc0c104cfb43a
          • Instruction Fuzzy Hash: A951A2B2A09A8D8FEB5CCB6898657B53BE0EBA9204F40017ED019D73D1CBB924058741
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID: >O_^$O_^
          • API String ID: 0-3636174786
          • Opcode ID: 1f111490242f3f24701c02e6cf343964cf46fa3adc0eb8d31453f76ed341df41
          • Instruction ID: 53ef8736b1be4ef0b292164fa7ac5c67a40bc1d7e3135bcd657cb437c3974c92
          • Opcode Fuzzy Hash: 1f111490242f3f24701c02e6cf343964cf46fa3adc0eb8d31453f76ed341df41
          • Instruction Fuzzy Hash: E7411857B1EA7A4BE32673ED78354ED3B50DFC0739B0945B3D1ADCA0D3AC18248A45A1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID: =O_^$O_^
          • API String ID: 0-1446287393
          • Opcode ID: dcb0add5ed62dccc05e9b1876d440c21fd8cd2edc104669e9daaa6f61b0a939b
          • Instruction ID: c72604a63d8ffc8815f42375b36bdd1fc919b9f6a928da03e2f88d7e69952876
          • Opcode Fuzzy Hash: dcb0add5ed62dccc05e9b1876d440c21fd8cd2edc104669e9daaa6f61b0a939b
          • Instruction Fuzzy Hash: 8C212C56A1E6A58FE32773AC6C710E83BA4DF45628B0901F7D1ADCB1A3E819144A87A1
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 99aae7e8eb8c4252d2e5fa32a9b82f025575917787f979d903c6466fb48446f2
          • Instruction ID: afe7728ed7910558d2d08b55a0aaefd0e6e77a9cf8d175781108c69d1e7d3050
          • Opcode Fuzzy Hash: 99aae7e8eb8c4252d2e5fa32a9b82f025575917787f979d903c6466fb48446f2
          • Instruction Fuzzy Hash: 98F03A1195FBD98FE72327B05C310A43F30AF07A04B0A01E3D4A8CA0E3D81D2A488362
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3634abd6d0aff5acb272a17050fc8ad988835a924536be74972ea2816c842e68
          • Instruction ID: 84e9d9ac6b948370cad1db32aa036bed1273bc6d2de034706acaac83a676a6c6
          • Opcode Fuzzy Hash: 3634abd6d0aff5acb272a17050fc8ad988835a924536be74972ea2816c842e68
          • Instruction Fuzzy Hash: 68F0811190F7D98FE32763F02C310E53F34AF06208B0A01F3D0AD8A0E3D81D254987A2
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 819c0b3a39df8f4ae83b24694742bb34be8357ba9bc3230373e5266064ca569f
          • Instruction ID: 8765c626d766c9ac402098b02bf42ed31fe3875dc6e67fdd195b1ee66eeaef57
          • Opcode Fuzzy Hash: 819c0b3a39df8f4ae83b24694742bb34be8357ba9bc3230373e5266064ca569f
          • Instruction Fuzzy Hash: 0841C1B1A18A4A8FEB9CCF6898657B93AE0FBA9314F40017ED01EE73D5CBB914058741
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: cc5e2a61dad2a1ae86c8a5f25b784611419192037267a25bfdd7dae3a6b16ff0
          • Instruction ID: acd7ba32cfcd1faa16a2c317132cdc533f674ec0f7e14d4178336d4cdf28c941
          • Opcode Fuzzy Hash: cc5e2a61dad2a1ae86c8a5f25b784611419192037267a25bfdd7dae3a6b16ff0
          • Instruction Fuzzy Hash: 7F110A11A1FACD4FD766577848311A67FA0EF87510B0902F7E0ADC70E3DD2D2A0A8351
          Memory Dump Source
          • Source File: 00000000.00000002.1813564380.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffd9b880000_file.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8c7dee43a9858929acd98f09d84173ef8deab571fe9a3c8cc52ea6c479e3bffb
          • Instruction ID: 8baeeee0321bbc7a40212406f1a5160b97ccce0a69e054f6214b7cd2b2213e09
          • Opcode Fuzzy Hash: 8c7dee43a9858929acd98f09d84173ef8deab571fe9a3c8cc52ea6c479e3bffb
          • Instruction Fuzzy Hash: 20C04C21F1C4564AE388E67C98217685081DB88368F6483F4B53EC36CEDC1C6C059345