Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
24v3hhTWiA.exe

Overview

General Information

Sample name:24v3hhTWiA.exe
renamed because original name is a hash value
Original sample name:d290985e36803440a2ae30b48b10a25ff4dd3767.exe
Analysis ID:1542938
MD5:6f01497cfde767443ea1d54a7f5fcb62
SHA1:d290985e36803440a2ae30b48b10a25ff4dd3767
SHA256:a2ddde9e5f90ed6af941572a4363eddd78d1680e080fca9612c595aa0ab90961
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • 24v3hhTWiA.exe (PID: 7292 cmdline: "C:\Users\user\Desktop\24v3hhTWiA.exe" MD5: 6F01497CFDE767443EA1D54A7F5FCB62)
    • WerFault.exe (PID: 7440 cmdline: C:\Windows\system32\WerFault.exe -u -p 7292 -s 808 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 24v3hhTWiA.exeReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 82.0% probability
Source: 24v3hhTWiA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdb source: 24v3hhTWiA.exe
Source: Binary string: PresentationFramework.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb0 source: WERA74E.tmp.dmp.4.dr
Source: Binary string: Installation_x64.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: WindowsBase.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Xaml.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: 24v3hhTWiA.exe, 00000000.00000002.1828208028.0000014000001000.00000004.00000800.00020000.00000000.sdmp, WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Xaml.ni.pdbRSDSDg{V source: WERA74E.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\PresentationCore.pdb source: 24v3hhTWiA.exe, 00000000.00000002.1828357286.00000140741D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationCore.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbla source: 24v3hhTWiA.exe, 00000000.00000002.1828357286.00000140741D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdbH source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdbSHA256 source: 24v3hhTWiA.exe
Source: Binary string: Installation_x64.pdbA9 source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.pdbMZ@ source: WERA74E.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb source: 24v3hhTWiA.exe, 00000000.00000002.1828357286.00000140741D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbh source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationCore.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7292 -s 808
Source: 24v3hhTWiA.exeStatic PE information: No import functions for PE file found
Source: 24v3hhTWiA.exe, 00000000.00000000.1445053589.0000014073FB4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInstallation_x64.dll6 vs 24v3hhTWiA.exe
Source: 24v3hhTWiA.exeBinary or memory string: OriginalFilenameInstallation_x64.dll6 vs 24v3hhTWiA.exe
Source: 24v3hhTWiA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal52.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\24v3hhTWiA.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7292
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c236bbf8-16e0-444b-9565-e9729369032cJump to behavior
Source: 24v3hhTWiA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 24v3hhTWiA.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\24v3hhTWiA.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 24v3hhTWiA.exeReversingLabs: Detection: 28%
Source: 24v3hhTWiA.exeString found in binary or memory: <.ctor>b__0_0<InitializeAsync>d__1<>u__1IEnumerable`1Task`1List`1label_download1label_done1sendclick1sendopen1ProgressBar1Int32Dictionary`2TaskLoad2label_download2label_done2sendclick2sendopen2TaskLoad3label_done3Installation_x64get_UTF8<p0><p1><Module>CalculadoraWPFSystem.IOotstykdomainpublicSystem.Collections.GenericInitializeAsyncReadAsStringAsyncGetAsyncTinyPatch.MiscconnectionIdSystem.Threading.ThreadTaskLoadAdd_contentLoadedAwaitUnsafeOnCompletedget_IsCompletedSendUriKindEnsureSuccessStatusCodeget_MessageHttpResponseMessageDefenderRechargeIDisposableDownloadFilesecond_file_is_opened_skipping_to_next_filethird_file_is_opened_skipping_to_next_filefour_file_is_opened_skipping_to_next_filefirst_file_is_opened_skipping_to_next_fileIsInRoleWindowsBuiltInRoleSystem.Consoleset_FileNameget_MachineNameGetCpuNameSystem.RuntimeWriteLineCombineIAsyncStateMachineSetStateMachinestateMachineValueTypePresentationCoreMoreRangeBaseButtonBaseCloseDisposeCreateEditorBrowsableState<>1__stateTinyPatch.AnalizateDeleteSTAThreadAttributeEmbeddedAttributeCompilerGeneratedAttributeGeneratedCodeAttributeDebuggerNonUserCodeAttributeAttributeUsageAttributeDebuggableAttributeNullableAttributeEditorBrowsableAttributeAssemblyAssociatedContentFileAttributeAssemblyTitleAttributeAsyncStateMachineAttributeTargetFrameworkAttributeDebuggerHiddenAttributeAssemblyFileVersionAttributeAssemblyInformationalVersionAttributeAssemblyConfigurationAttributeThemeInfoAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCopyrightAttributeNullableContextAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeset_UseShellExecuteByteset_ValueTryGetValueDragMovedefender_offFlagTinyPatch.ConfigAppConfigSystem.ThreadingEncodingsecond_bug_downloaded_but_having_problem_with_openningthird_bug_downloaded_but_having_problem_with_openningfour_bug_downloaded_but_having_problem_with_openningFirst_bug_downloaded_but_having_problem_with_openningSystem.Runtime.VersioningFromBase64StringDownloadStringToStringGetStringdownload_second_bugopened_second_bugerror_on_downloading_second_bugerror_on_openning_second_bugdownload_third_bugopened_third_bugerror_on_downloading_third_bugerror_on_openning_third_bugdownload_four_bugopened_four_bugerror_on_downloading_four_bugerror_on_openning_four_bugdownload_first_bugopened_first_bugerror_on_downloading_first_bugerror_on_openning_first_bugSystem.Diagnostics.DebugotstykdomaindebugFlushGetFolderPathset_StartupUriadd_ClickDone_Clickthree_linktwo_linkfirst_linkPresentationFrameworkTaskdomaintaskSystem.Security.PrincipalWindowsPrincipalLabelButton_CancelSystem.ComponentModelInstallation_x64.dllSystem.Xamlget_ItemSystem.IO.FileSystemRandomDoneFormProgressFormMainJoinApplicationResourceDictionaryLocationSystem.ReflectionManagementObjectCollectionSetExceptionButtonContinue_buttonDone_btnRunadd_MouseDownset_StartInfoProcessStartInfoDirectoryInfoSleeptempAppSystem.Net.HttpSystem.Windows.MarkupProgressBarAsyncVoidMethodBuilder<>t__builderSpecialFoldersenderMana
Source: unknownProcess created: C:\Users\user\Desktop\24v3hhTWiA.exe "C:\Users\user\Desktop\24v3hhTWiA.exe"
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7292 -s 808
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 24v3hhTWiA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 24v3hhTWiA.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 24v3hhTWiA.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 24v3hhTWiA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdb source: 24v3hhTWiA.exe
Source: Binary string: PresentationFramework.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb0 source: WERA74E.tmp.dmp.4.dr
Source: Binary string: Installation_x64.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: Binary string: WindowsBase.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Xaml.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: 24v3hhTWiA.exe, 00000000.00000002.1828208028.0000014000001000.00000004.00000800.00020000.00000000.sdmp, WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Xaml.ni.pdbRSDSDg{V source: WERA74E.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\PresentationCore.pdb source: 24v3hhTWiA.exe, 00000000.00000002.1828357286.00000140741D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationCore.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbla source: 24v3hhTWiA.exe, 00000000.00000002.1828357286.00000140741D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdbH source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdbSHA256 source: 24v3hhTWiA.exe
Source: Binary string: Installation_x64.pdbA9 source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.pdbMZ@ source: WERA74E.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb source: 24v3hhTWiA.exe, 00000000.00000002.1828357286.00000140741D6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbh source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationFramework.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: PresentationCore.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WERA74E.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERA74E.tmp.dmp.4.dr
Source: 24v3hhTWiA.exeStatic PE information: 0xFDB831FF [Fri Nov 21 10:37:51 2104 UTC]
Source: 24v3hhTWiA.exeStatic PE information: section name: .text entropy: 7.936226193861261
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeMemory allocated: 140742E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeMemory allocated: 14075BD0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeQueries volume information: C:\Users\user\Desktop\24v3hhTWiA.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\24v3hhTWiA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
24v3hhTWiA.exe29%ReversingLabsByteCode-MSIL.Trojan.Walgentz
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1542938
Start date and time:2024-10-26 22:46:55 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:24v3hhTWiA.exe
renamed because original name is a hash value
Original Sample Name:d290985e36803440a2ae30b48b10a25ff4dd3767.exe
Detection:MAL
Classification:mal52.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.168.117.173
  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target 24v3hhTWiA.exe, PID 7292 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtSetInformationFile calls found.
  • VT rate limit hit for: 24v3hhTWiA.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.9863035212255045
Encrypted:false
SSDEEP:192:S7oZVdcA0/Xoj9aKW7NzuiFYZ24lO8QM3:WoZVdcb/Yj9atpzuiFYY4lO8QM
MD5:CD88DF8230C10B7068F4E21813670292
SHA1:C95C41FFF514ADEAE14A528AC54F7F183EE97377
SHA-256:1805F6E08086BA82D75E0FB10DD7AED2AF860C54C636B89511C5E4B144615162
SHA-512:B7D52A216CA7A2EF7455D0C7962AFA2D78FBD26AAE45CCC23F8FEF078B460597D4EF4141AF76D8CEDF9BF80AD3779A808F8F5F01A00CE7CBE100481C7056A8DF
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.4.9.2.7.5.0.3.8.4.1.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.4.9.2.7.6.6.1.6.5.3.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.1.e.9.5.d.6.-.b.9.f.a.-.4.5.0.0.-.9.7.7.0.-.b.4.8.9.7.4.8.4.f.d.6.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.6.5.f.e.c.f.4.-.c.9.c.6.-.4.1.1.d.-.b.f.6.f.-.9.0.6.5.c.e.9.5.9.4.b.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.2.4.v.3.h.h.T.W.i.A...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.n.s.t.a.l.l.a.t.i.o.n._.x.6.4...d.l.l.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.7.c.-.0.0.0.1.-.0.0.1.4.-.a.0.d.7.-.7.f.5.4.e.8.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.b.3.d.5.2.f.7.4.6.9.f.3.1.3.9.c.9.6.2.0.c.4.b.d.2.6.5.4.a.c.1.0.0.0.0.0.0.0.0.!.0.0.0.0.d.2.9.0.9.8.5.e.3.6.8.0.3.4.4.0.a.2.a.e.3.0.b.4.8.b.1.0.a.2.5.f.f.4.d.d.3.7.6.7.!.2.4.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 16 streams, Sat Oct 26 20:47:55 2024, 0x1205a4 type
Category:dropped
Size (bytes):432641
Entropy (8bit):3.736306746411228
Encrypted:false
SSDEEP:6144:KAqrTvMjBuKzYfobfmK5isqYdEsaQ3Q5:JKu/5PqYdEqQ5
MD5:AE4FE92877E3DCABDF764E5FCC5BB12A
SHA1:EC6D2C6E78BA427ACB84C8AC2425BFF826D38675
SHA-256:34DC4EF87CE90A0C60E3D0E97C9C93A427C000006F1C242A2AC9C31A183F9A2E
SHA-512:4AA30C708EF96D4C1C1A46C05165533FF2AB3CBB5828D1DC69FFAADB54F900335875F474D6A7C6D9272639BDC07B32FE7018A61C33BD022C5C72ED9B9F69A66D
Malicious:false
Reputation:low
Preview:MDMP..a..... .......{U.g....................................$.......................T-...T..........l.......8...........T...............9z......................................................................................................eJ......X.......Lw......................T.......|...zU.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8750
Entropy (8bit):3.7076912845770797
Encrypted:false
SSDEEP:192:R6l7wVeJnvk6YSR8Kgmfi4dbIpry89bK5EfyOm:R6lXJvk6Y08Kgmfi4daK6fS
MD5:1BD0EC88C377DF3559444381291F45EF
SHA1:FAFA7B6E4D93B1B76A40AE54AE4C4A4E8C7BD24D
SHA-256:B5E811F5C0287FA213AD0CE734DE7FE60068CD9B8322C5604C055C5D74AF750E
SHA-512:FF971B1C461F450E4393CF17F7FACE02B980B8FDC154CA4A11F2AFD4E5AD9BCCFE978BB08E22650BEF1B312E2E7BE622F317F99D180A5911C6C82F7EA4EE3F74
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.9.2.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.498926531218177
Encrypted:false
SSDEEP:48:cvIwWl8zs2Jg771I9sfWpW8VY2Ym8M4JgsFn2Pyq85aLEar29fvEmIWd:uIjfMI7vO7VSJMXEa+fvpdd
MD5:8D065B8CAD601DF4F2B411E32E5D2B1C
SHA1:3032C87F1FDDF2A45F2DC6E4F5E7A013C2DACC3B
SHA-256:0042E96D300D2DECB5F98BB63BA67E8E1A03C96B30286CB891CA965C4E442223
SHA-512:450E85FB0A234ECB0E801E61DF0E5A13931D3347F40DA52EED679A777EE5276EDF7D5D0E22D03F9B1C786811124DB428907609542FAC9474B4469D610C4ADE52
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560870" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.372520148021646
Encrypted:false
SSDEEP:6144:7FVfpi6ceLP/9skLmb0byWWSPtaJG8nAge35OlMMhA2AX4WABlguNHiL:BV1ByWWI/glMM6kF7Rq
MD5:00540D354C336EEE8CDE052F3687C67F
SHA1:2F19C846CDA95FF83876FD490C724A1BCB41B1CA
SHA-256:92D3A3450A27BBF8374A29A75651529B864CC2DACE613E6C94677BE28B8F7CAB
SHA-512:86BC6114F20F2C844E5D7F1FAC29FC36B86A74AECDB9FA9D01B2223CCC162DA12AD0AB8EAD00FD092DA5FC2F9FBECF40431CD86B7427276F448DFD93947321D1
Malicious:false
Reputation:low
Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...U.'...............................................................................................................................................................................................................................................................................................................................................o.a........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.921080858518125
TrID:
  • Win64 Executable GUI Net Framework (217006/5) 49.88%
  • Win64 Executable GUI (202006/5) 46.43%
  • Win64 Executable (generic) (12005/4) 2.76%
  • Generic Win/DOS Executable (2004/3) 0.46%
  • DOS Executable Generic (2002/1) 0.46%
File name:24v3hhTWiA.exe
File size:341'504 bytes
MD5:6f01497cfde767443ea1d54a7f5fcb62
SHA1:d290985e36803440a2ae30b48b10a25ff4dd3767
SHA256:a2ddde9e5f90ed6af941572a4363eddd78d1680e080fca9612c595aa0ab90961
SHA512:f7d7b822fdddcaca5eb29c72217fb6870e2f331a53e5c29303e935069c6265ae304b08b4956052d02327f3bc640588043db92c300d5fa4d79f297611c6365786
SSDEEP:6144:WKRss+bZf0d6McOvwv6zGhtrys2NOr8Yyn5TNOr8Yyn5XU:WKRss0ZPMIlhtr8NO4jnhNO4jni
TLSH:BC7412D3FB50B530C253883D427C6B4B99B364EA2B86C82E1DCC76A5DD4A1A1CD71D2B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....1............"...0......2........... .....@..... ....................................`...@......@............... .....
Icon Hash:cec6d7979b99d9e6
Entrypoint:0x140000000
Entrypoint Section:
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xFDB831FF [Fri Nov 21 10:37:51 2104 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x31b8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x51f380x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x500460x502002aa67e07884b4b10bb9a8c303e333a3dFalse0.9354219481279251data7.936226193861261IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x540000x31b80x32003903cdcffcff75be2ea71bd7325c4a75False0.719609375data7.140534332411796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x541000x1c7aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9237311385459533
RT_GROUP_ICON0x55d8c0x14data1.05
RT_VERSION0x55db00x322data0.43017456359102246
RT_MANIFEST0x560e40x10cdXML 1.0 document, Unicode text, UTF-8 (with BOM) text0.41106719367588934
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:16:47:54
Start date:26/10/2024
Path:C:\Users\user\Desktop\24v3hhTWiA.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\24v3hhTWiA.exe"
Imagebase:0x14073f60000
File size:341'504 bytes
MD5 hash:6F01497CFDE767443EA1D54A7F5FCB62
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:16:47:54
Start date:26/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7292 -s 808
Imagebase:0x7ff6fdad0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1829193975.00007FFB4B460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B460000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb4b460000_24v3hhTWiA.jbxd
    Similarity
    • API ID:
    • String ID: 9O_^
    • API String ID: 0-1716625314
    • Opcode ID: f6452258b9804ea7509c1bfe558c4e4975e467695a13633a3c4dbc54a1b1491d
    • Instruction ID: c5b5c001c0323ead488588526998847d74be89c7aac745cc203d26f3c4a12596
    • Opcode Fuzzy Hash: f6452258b9804ea7509c1bfe558c4e4975e467695a13633a3c4dbc54a1b1491d
    • Instruction Fuzzy Hash: F151FAD398E6830AE3567EFCE5561F82B81DF81765F18C0BFD58C8A2D3DC0C684582A6
    Memory Dump Source
    • Source File: 00000000.00000002.1829193975.00007FFB4B460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B460000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb4b460000_24v3hhTWiA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d1393e69c50f4058eabf9ebbaf4ea8f09e025563650b16fc0bf6d17f179a61e2
    • Instruction ID: 29cc36ce45451ac6afa71c0fdb4746328a86f8c33ab133bf5bf72f46c57643b4
    • Opcode Fuzzy Hash: d1393e69c50f4058eabf9ebbaf4ea8f09e025563650b16fc0bf6d17f179a61e2
    • Instruction Fuzzy Hash: 8801CCA181E3D50FE7176B3888625A47FB0AE13200B8A45EBD1C5CB0E3C51C694AC362
    Memory Dump Source
    • Source File: 00000000.00000002.1829193975.00007FFB4B460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B460000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb4b460000_24v3hhTWiA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 46c1d9d8779760949c6091a6a1d01e89eff16064bc453d14221546ce004f9e55
    • Instruction ID: 2f0b059431f0101c8c4c6e8cb3a04eb64774473708ad9879b3a24b6cf07fc28a
    • Opcode Fuzzy Hash: 46c1d9d8779760949c6091a6a1d01e89eff16064bc453d14221546ce004f9e55
    • Instruction Fuzzy Hash: 85510DD3D8E6834EE3567EBCE5561F82B91DF81765B1880FBD18CCA1D3DC0C284542A2
    Memory Dump Source
    • Source File: 00000000.00000002.1829193975.00007FFB4B460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B460000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb4b460000_24v3hhTWiA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6e9b87951b820ea55dd93e7497643a103ba3b92f53d8e32486d75c225ccf46b8
    • Instruction ID: 5f7a71e2fd295104f68725ed4a58bb5d4ee45f4e42b08573fcf3a98f2e001ef9
    • Opcode Fuzzy Hash: 6e9b87951b820ea55dd93e7497643a103ba3b92f53d8e32486d75c225ccf46b8
    • Instruction Fuzzy Hash: 8721DBE290E6C10FE34A9A7C98562A57F91DF4A351B1880FFD188CB6D7D8195C45C392
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1829193975.00007FFB4B460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B460000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb4b460000_24v3hhTWiA.jbxd
    Similarity
    • API ID:
    • String ID: @*4K$@*4K$@*4K$H&4K
    • API String ID: 0-199169678
    • Opcode ID: 9945a0fe87e21097b4c09b955308d4487e49550ffb0121f4d7ad19c6e07b70c8
    • Instruction ID: a01cd8056a7a98dde9ac88cfeea7298d5f10e219e029fb58bbbd288d0f631e56
    • Opcode Fuzzy Hash: 9945a0fe87e21097b4c09b955308d4487e49550ffb0121f4d7ad19c6e07b70c8
    • Instruction Fuzzy Hash: 54F13074A18A0E8FDF58EF6CC455AA977E2FFA8300F144169D54ED7295CA38F852CB80