Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe

Overview

General Information

Sample name:Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
renamed because original name is a hash value
Original sample name:Po110-11Order_System Electro %100% S51105P-E01 jpg .exe
Analysis ID:1538399
MD5:af04642d86b2e7e785a034d8fd4510bd
SHA1:82b4b45acdec6c64853c5d2c0df36c23026c2e73
SHA256:cb46f693cb4263f0c8832e56fe42d8dd0e1a5e8c70b102e20322a65b428df9ce
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Creates processes with suspicious names
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeReversingLabs: Detection: 26%
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeVirustotal: Detection: 30%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 82.7% probability
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeJoe Sandbox ML: detected
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: mscorlib.pdb source: WERC72A.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WERC72A.tmp.dmp.3.dr
Source: Binary string: uLBJ.pdb source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Binary string: mscorlib.ni.pdbRSDS source: WERC72A.tmp.dmp.3.dr
Source: Binary string: mscorlib.pdbP source: WERC72A.tmp.dmp.3.dr
Source: Binary string: uLBJ.pdbSHA256 source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: initial sampleStatic PE information: Filename: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 780
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe, 00000000.00000002.2185630326.000000000103E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe, 00000000.00000000.1665319160.0000000000A2E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuLBJ.exe" vs Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeBinary or memory string: OriginalFilenameuLBJ.exe" vs Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7312
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\964211f6-b64c-47db-bbc7-177066a7ffb3Jump to behavior
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeReversingLabs: Detection: 26%
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeVirustotal: Detection: 30%
Source: unknownProcess created: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe "C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe"
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 780
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mscorlib.pdb source: WERC72A.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WERC72A.tmp.dmp.3.dr
Source: Binary string: uLBJ.pdb source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Binary string: mscorlib.ni.pdbRSDS source: WERC72A.tmp.dmp.3.dr
Source: Binary string: mscorlib.pdbP source: WERC72A.tmp.dmp.3.dr
Source: Binary string: uLBJ.pdbSHA256 source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Source: Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeStatic PE information: section name: .text entropy: 7.968596594085418
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeFile created: \po110-11#u3000order_system electro %100% s51105p-e01 #uff08#u6700#u65b0#uff09jpg .exe
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeMemory allocated: 2E20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeMemory allocated: 13F0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exeQueries volume information: C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe VolumeInformationJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe26%ReversingLabsWin32.Dropper.Generic
Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe30%VirustotalBrowse
Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1538399
Start date and time:2024-10-21 07:35:00 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 42s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
renamed because original name is a hash value
Original Sample Name:Po110-11Order_System Electro %100% S51105P-E01 jpg .exe
Detection:MAL
Classification:mal60.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.42.65.92
  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.9001443523645993
Encrypted:false
SSDEEP:192:QOxD+wT3PLoPT0BU/yauMzuiFkZ24IO8m:jxqwT3PEPABU/yaNzuiFkY4IO8m
MD5:5AA0C5E2803759C83B0E1DB3E149104A
SHA1:5A7E199A5F28E74BB1D24CF34C5209CA5D89A8EE
SHA-256:EB59E1CFC64C653F3FBCB57DE9BDBA26AFC41F10FDDAAB8D7ECA839E751C8152
SHA-512:C635BE89839147833AEC26F102A88BEB1A6CEB535FB69FB52B81E3BD20A8761ECEEE0304D2A4BF0E6D17E892828A8E4C2B3DF6646B0B8EC728A443C701785958
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.6.2.5.5.1.2.1.8.4.3.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.6.2.5.5.1.6.7.1.5.6.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.5.b.3.3.1.6.-.d.1.e.5.-.4.2.9.a.-.a.b.f.f.-.e.4.7.3.0.6.e.8.f.5.0.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.8.8.5.1.f.e.1.-.e.6.e.7.-.4.8.6.d.-.a.d.7.3.-.4.7.8.3.4.9.3.2.7.3.e.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.P.o.1.1.0.-.1.1.#.U.3.0.0.0.O.r.d.e.r._.S.y.s.t.e.m. .E.l.e.c.t.r.o. . .%.1.0.0.%. .S.5.1.1.0.5.P.-.E.0.1. .#.U.f.f.0.8.#.U.6.7.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.u.L.B.J...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.9.0.-.0.0.0.1.-.0.0.1.4.-.2.5.8.f.-.b.f.1.6.7.b.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.b.c.b.3.c.7.e.3.7.5.4.2.d.3.3.5.b.1.f.0.5.e.a.f.3.7.2.c.f.3.5.0.0.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Mon Oct 21 05:35:51 2024, 0x1205a4 type
Category:dropped
Size (bytes):108388
Entropy (8bit):3.63457404320024
Encrypted:false
SSDEEP:768:AqXkPOVBpNNFWt0zE2vrvC6h9o0gFlHLTggjAXohgFm47+LHi4/Z:Aq3DpN4uE2aO9o0EtLTgAhgFpCDiMZ
MD5:7CDDFA8CB0202B2F07AF51E2B457162F
SHA1:22B487DB7E823A72FE22D858E48D0D70707B3A5C
SHA-256:FEB1692A3BF981E8FD32FEB4CE736558C349E4AF0A43977047CED13797870275
SHA-512:87BACD3D90740A3F1CF2609DD1775B07A74A7A4A8EA1CCE77D45E574AD612B5F82FAC5BE216A98599AA4DDC0388AE4EE276B92E20BE4AAB0898BDD1A2C5CCCDF
Malicious:false
Reputation:low
Preview:MDMP..a..... .......7..g....................................$...............p,..........`.......8...........T...............d.......................................................................................................eJ......\.......GenuineIntel............T...........6..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8564
Entropy (8bit):3.7155270864831738
Encrypted:false
SSDEEP:192:R6l7wVeJU66Z6Y9LSUqKagmfd40qprB89brYsfvn5m:R6lXJx6Z6YBSUqKagmfd40BrLfv0
MD5:9DFB7CF9D344633A71FFEAB5B5A98546
SHA1:8505C32E9CE8EC39018125AB12BF7BC0A4ADB7F0
SHA-256:FB3437228A8CF8A87ECED4EC6F4A5755D80E2247773C842FAB2CEC657581D52D
SHA-512:782A52F55D9C0E0E66552FA6FAF6A12CD5F93167DD98598FF011F9DA2FC2B6AB067FB05690238925A51AE1EB78919A11D8D7773B4A282A56DB017330089E94D3
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.1.2.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4948
Entropy (8bit):4.609532687134556
Encrypted:false
SSDEEP:48:cvIwWl8zsuJg77aI9rgWpW8VYWYm8M4JwHjFEB+q8VvAujoVz4DwMvd:uIjfkI7NZ7VCJwqBJmox4Lvd
MD5:11B72A80EC1B0149FF5F68BE729A384A
SHA1:36810A7065DBC41054AF985594FE89938BB925C6
SHA-256:083B6E71CAFD3897613C9D5F52D5C8DFC6E9260C7E2E4B523E7B8905FB75E1F7
SHA-512:4E9585663D350792835C40AC81B0AC2EF717F316AFA99066E73F4ED10D4F0552C7C9BB66C7633F2DFD622AA4D5C8CEAA93D94794E7F9A82CAEE26EBC14A42E3C
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552758" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.466133125868131
Encrypted:false
SSDEEP:6144:FIXfpi67eLPU9skLmb0b4qWSPKaJG8nAgejZMMhA2gX4WABl0uNVdwBCswSbU:mXD94qWlLZMM6YFHL+U
MD5:66B3917BC47B6BE5C5594322CF72DBDF
SHA1:75078DA47856269382802EFE54D1CA3F67123A45
SHA-256:C4778E377B8762BD2D6AC63F115A557E2486D27A7113222251C87DB311F92B24
SHA-512:BA1FF78391C77F7F74ED9AAC9171B5DF0EDBF2A5A91E7685A1CA2FA5D2500A80F5FEBEA0A6C3A0C70BB627F2CB9F8AE6FE7435618C478AA3526F718F26BBE049
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm2D..{#................................................................................................................................................................................................................................................................................................................................................."........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.95965114192294
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
  • Win32 Executable (generic) a (10002005/4) 49.75%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Windows Screen Saver (13104/52) 0.07%
  • Win16/32 Executable Delphi generic (2074/23) 0.01%
File name:Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
File size:574'464 bytes
MD5:af04642d86b2e7e785a034d8fd4510bd
SHA1:82b4b45acdec6c64853c5d2c0df36c23026c2e73
SHA256:cb46f693cb4263f0c8832e56fe42d8dd0e1a5e8c70b102e20322a65b428df9ce
SHA512:762bcf964b6e9d693cd9984f84f1819fbd4a4924d0bb131157df8ac4b76a0df7113cd013a36230a2a726a7fdb2eb62338537e5c54bcbfa5b43934bc3190cb04c
SSDEEP:12288:vfAYXkhMOoltiJKeGrLW02pIGyuJdaRQMn6iE30nYjk7L:tkh5oDiJKe4f5QdaRj6ipgk7
TLSH:DCC4232477DC1F8AD9BF63FA54A0266403F6986890D3FB5D8C9190CA62B274C4D90FB7
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0.................. ........@.. ....................... ............@................................
Icon Hash:070b2365ecc8682b
Entrypoint:0x48c2ba
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x6715CD83 [Mon Oct 21 03:41:55 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add dword ptr [eax], eax
add byte ptr [eax], al
add al, byte ptr [eax]
add byte ptr [eax], al
add eax, dword ptr [eax]
add byte ptr [eax], al
add al, 00h
add byte ptr [eax], al
add eax, 06000000h
add byte ptr [eax], al
add byte ptr [edi], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8c2650x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x1aac.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x900000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x8a9240x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x8a2e00x8a400f7dd93e5d682001f72ca63f34105b17aFalse0.9687994462025317OpenPGP Public Key7.968596594085418IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x8e0000x1aac0x1c00dcd22e0f983a43f6993ac74ca761b2feFalse0.8445870535714286data7.147668367258078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x900000xc0x2003dcd32d5d91fc57b547dec6973936111False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x8e0c80x16a5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9608418147317578
RT_GROUP_ICON0x8f7800x14data1.05
RT_VERSION0x8f7a40x304data0.44689119170984454
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:01:35:50
Start date:21/10/2024
Path:C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\Po110-11#U3000Order_System Electro %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09jpg .exe"
Imagebase:0x9a0000
File size:574'464 bytes
MD5 hash:AF04642D86B2E7E785A034D8FD4510BD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:01:35:51
Start date:21/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7312 -s 780
Imagebase:0x650000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly