Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522731
MD5:f8fcb0234088cbe227ef3c2430cc8047
SHA1:cd5de70e694f7df2894339c0ddfc5c2d38d80571
SHA256:67171d07a02baf9312b5d4ae70e64462de6f1b29cee4035a9c5bd2073e9fbc8b
Tags:exeuser-jstrosch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
One or more processes crash
PE file contains an invalid checksum
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6524 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F8FCB0234088CBE227EF3C2430CC8047)
    • WerFault.exe (PID: 1260 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 396 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: file.exeReversingLabs: Detection: 68%
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 396
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6524
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7ba39ca2-a8a4-4d0a-9d23-fe2338f0597aJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 396
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mfc42.dllJump to behavior
Source: file.exeStatic PE information: real checksum: 0xb1729 should be: 0x5fc11
Source: C:\Users\user\Desktop\file.exeCode function: 6_2_00403FD0 push eax; ret 6_2_00403FFE

Hooking and other Techniques for Hiding and Protection

barindex
Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (2).png
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\file.exeCode function: 6_2_00402435 LdrInitializeThunk,6_2_00402435
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe68%ReversingLabsWin32.Downloader.Upatre
file.exe100%AviraTR/Dropper.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.10.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522731
Start date and time:2024-09-30 16:10:46 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 5s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal64.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.21
  • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target file.exe, PID 6524 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: file.exe
TimeTypeDescription
11:43:17API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.7437696426095218
Encrypted:false
SSDEEP:192:QKq6A0vNPjo04DmIwshP3jdqzuiFlZ24IO8kOBx:FNLD4Dm9spjgzuiFlY4IO8vx
MD5:CB569148A6CEE4C6458A2903C7EB4235
SHA1:BA5E8D461DE9E7A4432B43739EAADFA0CCAA4E5C
SHA-256:BA016B5E6EB1068130971F3785CACBFBE5103D9F0C0812C6FA8FC24EB4942A61
SHA-512:21C55D87DDAB427A1E6C8DC535F82676FEB4CE95ADD9F35B712047B9B5D00E3587604031AAEDB23AD344F3E15E7421DC0FA8B90FAE76CBAA43ACA984914D6760
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.1.7.9.1.0.3.8.8.5.7.0.6.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.1.7.9.1.0.6.1.3.5.7.3.7.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.4.7.a.1.f.a.4.-.8.4.2.7.-.4.6.b.0.-.8.2.2.d.-.e.a.5.5.1.c.1.7.2.5.9.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.7.f.c.8.c.3.8.-.e.9.b.8.-.4.b.5.2.-.a.2.b.d.-.a.d.f.3.b.2.e.8.f.8.7.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.7.c.-.0.0.0.1.-.0.0.1.4.-.c.b.2.b.-.1.9.a.d.4.2.1.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.c.d.5.d.e.7.0.e.6.9.4.f.7.d.f.2.8.9.4.3.3.9.c.0.d.d.f.c.5.c.2.d.3.8.d.8.0.5.7.1.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.5././.1.2././.0.3.:.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon Sep 30 14:11:44 2024, 0x1205a4 type
Category:dropped
Size (bytes):1071224
Entropy (8bit):0.8641347493546171
Encrypted:false
SSDEEP:1536:70and4EMlJ4VEQJ261rHuRGRlAh5GfekBX3V6:J+VQJQW6Cek/6
MD5:08A0E18747E79795B30811A5EFB686C0
SHA1:385BDAD372A0C550017A34E622F96B6AF1328CA8
SHA-256:630079FC262922DB50998A30DD4FF0BE7409960A430E5C5337ED563F6331DF3C
SHA-512:C0AB2E0F4B4575E462FD0950AF48BE90F50223262DD5404B13D15457706A5470BF2183C0BB63ABA1588867F6B428AC85CFB9BD318ED24420312A064BEBDBAFC7
Malicious:false
Reputation:low
Preview:MDMP..a..... ..........f........................................x ..........T.......8...........T................H..........|...........h...............................................................................eJ..............GenuineIntel............T.......|......f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8382
Entropy (8bit):3.6906259499707335
Encrypted:false
SSDEEP:192:R6l7wVeJXC26w6g6YN0SU9h6gmf6fb6cIdEqpD089bYbsfoIm:R6lXJj6w6g6Y+SU9h6gmfqb6c2EWYgfO
MD5:2A5FF1504B84EE191B36FF8137E40CAA
SHA1:C72383AEF8DC98183C13B28AC6781DD222EC5D88
SHA-256:7FA3710276377903FBA2EA41339A9728864B1E9177FDDB4AFF1886FDED371327
SHA-512:4E8EA94F3FDA3B7777A50901174482C9ADB332D4A43C2FF04B53E611CF1229E1AD8494711471B52B9B8CB17426B5DDC90074E2722D4C1FCE71157102C32CEA55
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.2.4.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4698
Entropy (8bit):4.463408863223226
Encrypted:false
SSDEEP:48:cvIwWl8zsVJg77aI9HQnWpW8VY4Ym8M4JGSO6NO3FGd+q8v/SO6NOOl+ydd:uIjfvI7lQW7V8JBxdKUll+ydd
MD5:B443F317AAA67F97338E4A65DA581728
SHA1:C5B091647E08D61F962BC1007C01E976D85BD8A6
SHA-256:A981681C9CF8535BEA05CA15EA6035311233CA464033F16EAD6DA1A30D90ACBB
SHA-512:4D0C525581805DA5E527A5F1F788D540235F453B3323D8A913B69D6933C3DDA153982195FBB508A5A964AAF965FCBD94F43E0B607C3D32F5E61F0A37637C2191
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="523034" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.416525624501387
Encrypted:false
SSDEEP:6144:1cifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuN85+:Si58oSWIZBk2MM6AFBqo
MD5:872133A2A9AA757CEDE5A94CB98F7295
SHA1:27F06D69E39D88BEA0667FC3563FF520182F7E43
SHA-256:2C2F63B0C755DBDEC7FFACFF07FA8A8AA09F3FFB27E7AEFD18FB42983F5043C8
SHA-512:1D0FAD58DDAE1DA085E27FBD3629D2DFB5C5AE8761BF1A5BBD85119694B05FB76355ECF4A7D4A88B0389614785E987114A898B3569438AE0D1D062907D27B881
Malicious:false
Reputation:low
Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....B...............................................................................................................................................................................................................................................................................................................................................n...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.233207270345814
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:348'160 bytes
MD5:f8fcb0234088cbe227ef3c2430cc8047
SHA1:cd5de70e694f7df2894339c0ddfc5c2d38d80571
SHA256:67171d07a02baf9312b5d4ae70e64462de6f1b29cee4035a9c5bd2073e9fbc8b
SHA512:68008d279b8a9cbedac837ace5193d4e1653c8d8473750abc74fa9747144332418ca4e5a9aa3e72671f8bcf8af1f90b46818fd364f16048d8060fed47dbb71cc
SSDEEP:3072:GFkSALQw7jrEYuvufsN+hzWsCtoS4jaETK0/SryFoWiYc+/vcbef50JUaRKV/1ac:GySALQw7rbj1
TLSH:9F741881E14498A9D41F12BA583AE911180A7F8D477555FB2A3A7F1A3FB33C22C76D0F
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........o...<...<...<$..<...<d..<...<...<...<...<...<...<...<...<...<...<...<...<...< ..<...<Rich...<........................PE..L..
Icon Hash:1b9898899bab819b
Entrypoint:0x403e12
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x56608E42 [Thu Dec 3 18:47:30 2015 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:97a6aa6f8e948e45c539cfb23487d527
Instruction
push ebp
mov ebp, esp
push FFFFFFFFh
push FDB97890h
push FDB9404Ch
mov eax, dword ptr fs:[00000000h]
push eax
mov dword ptr fs:[00000000h], esp
sub esp, 68h
push ebx
push esi
push edi
mov dword ptr [ebp-18h], esp
xor ebx, ebx
mov dword ptr [ebp-04h], ebx
push 00000002h
call dword ptr [FDB9BAE0h]
pop ecx
or dword ptr [FDB9AC18h], FFFFFFFFh
or dword ptr [FDB9AC28h], FFFFFFFFh
call dword ptr [FDB9BAE4h]
mov ecx, dword ptr [FDB9AC04h]
mov dword ptr [eax], ecx
call dword ptr [FDB9BAE8h]
mov ecx, dword ptr [FDB9AC00h]
mov dword ptr [eax], ecx
mov eax, dword ptr [FDB9BB10h]
mov eax, dword ptr [eax]
mov dword ptr [FDB9AC0Ch], eax
call 00007F9270F9631Dh
cmp dword ptr [FDB9A9D0h], ebx
jne 00007F9270F9616Eh
push FDB94036h
call dword ptr [FDB9BB14h]
pop ecx
call 00007F9270F962E9h
push FDB98514h
push FDB98410h
call 00007F9270F962D4h
mov eax, dword ptr [FDB9ABFCh]
mov dword ptr [ebp-6Ch], eax
lea eax, dword ptr [ebp-6Ch]
push eax
push dword ptr [FDB9ABF8h]
lea eax, dword ptr [ebp-64h]
push eax
lea eax, dword ptr [ebp-70h]
push eax
lea eax, dword ptr [ebp-60h]
push eax
call dword ptr [FDB9BB08h]
push FDB9830Ch
push FDB98000h
call 00007F9270F962A1h
Programming Language:
  • [C++] VS98 (6.0) SP6 build 8804
  • [C++] VS98 (6.0) build 8168
  • [EXP] VC++ 6.0 SP5 build 8804
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xb0000x8c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x47968.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x540000x624.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xb6180x58c.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x54f60x6000fd046dd0ff0ac1fe3d108d8ad42b085aFalse0.207275390625data3.793509550873923IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x70000xdc30x10009030053bc337663659eed47a986a4cd5False0.22802734375data3.1195362496936068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x80000x2c2c0x3000e07fcc32ca00d7792e40354eecf1dedcFalse0.2965494791666667data3.39149737220928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0xb0000xff00x100097ea4f74e3648343ee43cd0d2febf560False0.30810546875data4.167572038830161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xc0000x479680x480005934cfff714515c481a65a18fba4488aFalse0.056783040364583336data3.8945110777584255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x540000x7ce0x1000314810055e47c3a5dc4032b6c759fbe4False0.33837890625data3.3028930959148983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_BITMAP0xc2c80xfe8Device independent bitmap graphic, 256 x 31 x 4, image size 3968SpanishMexico0.06311394891944991
RT_ICON0xd2b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.17468879668049792
RT_ICON0xf8580x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04544782081249815
RT_ICON0x518800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.22303001876172607
RT_ICON0x529280x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.30778688524590164
RT_ICON0x532b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3670212765957447
RT_MENU0x537180x118dataSlovenianSlovenia0.45714285714285713
RT_DIALOG0x538300x5adataItalianItaly0.9
RT_ACCELERATOR0x5388c0x68dataSwedishSweden0.7211538461538461
RT_GROUP_ICON0x538f40x4cdata0.7763157894736842
None0x539400x1cdataSpanishMexico1.2142857142857142
DLLImport
MFC42.DLL
MSVCRT.dll_controlfp, _onexit, __dllonexit, _except_handler3, __set_app_type, __p__fmode, __p__commode, __CxxFrameHandler, _setmbcp, strtol, _exit, _XcptFilter, exit, _acmdln, __getmainargs, _initterm, _adjust_fdiv, __setusermatherr
KERNEL32.dllGetLocaleInfoA, GetStringTypeA, SetStdHandle, GetModuleHandleA, GetModuleFileNameW, DeleteFileW, CreateFileA, GetModuleFileNameA, GetStartupInfoA, LocalFree, GetCommandLineA
USER32.dllMsgWaitForMultipleObjects, IsIconic, CheckMenuItem, FlashWindow, SetTimer, SetRect, EnableWindow, UpdateWindow, ReleaseCapture
GDI32.dllRectangle, GetTextMetricsA, SelectObject, SetPaletteEntries
ADVAPI32.dllRegDeleteKeyW, CopySid, RegDeleteValueW
Language of compilation systemCountry where language is spokenMap
SpanishMexico
SlovenianSlovenia
ItalianItaly
SwedishSweden
TimestampSource PortDest PortSource IPDest IP
Sep 30, 2024 16:11:47.471448898 CEST53527041.1.1.1192.168.2.7

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:6
Start time:10:11:43
Start date:30/09/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x400000
File size:348'160 bytes
MD5 hash:F8FCB0234088CBE227EF3C2430CC8047
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:10
Start time:10:11:43
Start date:30/09/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 396
Imagebase:0x7ff7b4ee0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000006.00000002.1508137449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000006.00000002.1508119357.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508153830.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508169404.0000000000408000.00000008.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508185422.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508200667.000000000040C000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508200667.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508200667.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000006.00000002.1508200667.0000000000451000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_6_2_400000_file.jbxd
    Similarity
    • API ID:
    • String ID: 4(@P
    • API String ID: 0-4081170755
    • Opcode ID: 20bba12d65fe96c8526fc40d0053f7099fbca473d8ca0298e642da7d8e5e44ee
    • Instruction ID: 3324b83634ac65d42d495c4e094248c52c50f7ace7e5b1c6dd9571397ceb6849
    • Opcode Fuzzy Hash: 20bba12d65fe96c8526fc40d0053f7099fbca473d8ca0298e642da7d8e5e44ee
    • Instruction Fuzzy Hash: E0712731905249AEDB04EFA5C952BEEBB78AF14308F10456EF406B72C2DB785B05C779