Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
p9VvTmGme1.exe

Overview

General Information

Sample name:p9VvTmGme1.exe
renamed because original name is a hash value
Original sample name:aa468efb191a4430d3e7470ca05e0dc96f8ab206.exe
Analysis ID:1542941
MD5:361df818c661b4cdc52ec248aa8c8db7
SHA1:aa468efb191a4430d3e7470ca05e0dc96f8ab206
SHA256:ec7fd123c43a8d15a2301075f9c90ff330cbc513d14fc1992b247edb7d7f474b
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

JohnWalkerTexasLoader
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected JohnWalkerTexasLoader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • p9VvTmGme1.exe (PID: 6176 cmdline: "C:\Users\user\Desktop\p9VvTmGme1.exe" MD5: 361DF818C661B4CDC52EC248AA8C8DB7)
    • WerFault.exe (PID: 6100 cmdline: C:\Windows\system32\WerFault.exe -u -p 6176 -s 676 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
p9VvTmGme1.exeJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2019137764.0000025C26E32000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
      Process Memory Space: p9VvTmGme1.exe PID: 6176JoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.p9VvTmGme1.exe.25c26e30000.0.unpackJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: p9VvTmGme1.exeAvira: detected
          Source: p9VvTmGme1.exeReversingLabs: Detection: 50%
          Source: p9VvTmGme1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: CalculoTiny.pdb source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: mscorlib.pdb source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: mscorlib.ni.pdb source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: C:\Users\Administrator\Downloads\CalculadoraWPF-main\CalculadoraWPF\obj\Release\net6.0-windows\win-x64\CalculoTiny.pdb source: p9VvTmGme1.exe
          Source: Binary string: C:\Users\Administrator\Downloads\CalculadoraWPF-main\CalculadoraWPF\obj\Release\net6.0-windows\win-x64\CalculoTiny.pdbSHA2561 source: p9VvTmGme1.exe
          Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
          Source: p9VvTmGme1.exeString found in binary or memory: http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
          Source: p9VvTmGme1.exeString found in binary or memory: https://ipinfo.io/country
          Source: p9VvTmGme1.exeString found in binary or memory: https://ipinfo.io/ip
          Source: p9VvTmGme1.exeString found in binary or memory: https://rafadaiart.com
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6176 -s 676
          Source: p9VvTmGme1.exeStatic PE information: No import functions for PE file found
          Source: p9VvTmGme1.exe, 00000000.00000000.2019195940.0000025C26E54000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCalculoTiny.dllD vs p9VvTmGme1.exe
          Source: p9VvTmGme1.exeBinary or memory string: OriginalFilenameCalculoTiny.dllD vs p9VvTmGme1.exe
          Source: classification engineClassification label: mal64.troj.winEXE@2/5@0/0
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeMutant created: NULL
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6176
          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\78fcd096-a01e-4f81-a202-451061a0945bJump to behavior
          Source: p9VvTmGme1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: p9VvTmGme1.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: p9VvTmGme1.exeReversingLabs: Detection: 50%
          Source: unknownProcess created: C:\Users\user\Desktop\p9VvTmGme1.exe "C:\Users\user\Desktop\p9VvTmGme1.exe"
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6176 -s 676
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: p9VvTmGme1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: p9VvTmGme1.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: p9VvTmGme1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: p9VvTmGme1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: CalculoTiny.pdb source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: mscorlib.pdb source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: mscorlib.ni.pdb source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER84FA.tmp.dmp.4.dr
          Source: Binary string: C:\Users\Administrator\Downloads\CalculadoraWPF-main\CalculadoraWPF\obj\Release\net6.0-windows\win-x64\CalculoTiny.pdb source: p9VvTmGme1.exe
          Source: Binary string: C:\Users\Administrator\Downloads\CalculadoraWPF-main\CalculadoraWPF\obj\Release\net6.0-windows\win-x64\CalculoTiny.pdbSHA2561 source: p9VvTmGme1.exe
          Source: p9VvTmGme1.exeStatic PE information: 0x8E060F9A [Tue Jul 4 06:18:02 2045 UTC]
          Source: p9VvTmGme1.exeStatic PE information: section name: .text entropy: 7.191590684580298
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeMemory allocated: 25C27180000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeMemory allocated: 25C40C10000 memory reserve | memory write watchJump to behavior
          Source: Amcache.hve.4.drBinary or memory string: VMware
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\p9VvTmGme1.exeQueries volume information: C:\Users\user\Desktop\p9VvTmGme1.exe VolumeInformationJump to behavior
          Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: p9VvTmGme1.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.p9VvTmGme1.exe.25c26e30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2019137764.0000025C26E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: p9VvTmGme1.exe PID: 6176, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: p9VvTmGme1.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.p9VvTmGme1.exe.25c26e30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2019137764.0000025C26E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: p9VvTmGme1.exe PID: 6176, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Process Injection
          2
          Virtualization/Sandbox Evasion
          OS Credential Dumping21
          Security Software Discovery
          Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Software Packing
          Security Account Manager11
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Process Injection
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Timestomp
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Obfuscated Files or Information
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          p9VvTmGme1.exe50%ReversingLabsByteCode-MSIL.Trojan.Walgentz
          p9VvTmGme1.exe100%AviraTR/AVI.Agent.bcpto
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://upx.sf.net0%URL Reputationsafe
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          https://ipinfo.io/countryp9VvTmGme1.exefalse
            unknown
            http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.phpp9VvTmGme1.exefalse
              unknown
              http://upx.sf.netAmcache.hve.4.drfalse
              • URL Reputation: safe
              unknown
              https://rafadaiart.comp9VvTmGme1.exefalse
                unknown
                https://ipinfo.io/ipp9VvTmGme1.exefalse
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1542941
                  Start date and time:2024-10-26 22:48:34 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 57s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:p9VvTmGme1.exe
                  renamed because original name is a hash value
                  Original Sample Name:aa468efb191a4430d3e7470ca05e0dc96f8ab206.exe
                  Detection:MAL
                  Classification:mal64.troj.winEXE@2/5@0/0
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.42.65.92
                  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • VT rate limit hit for: p9VvTmGme1.exe
                  TimeTypeDescription
                  16:49:42API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8257242939659165
                  Encrypted:false
                  SSDEEP:96:CmFpy3YMGKs3bGhzxymTpQXIDcQ1c6mcEqcw3Qdx+BHUHZopAnQFdE7HeSv+xnjX:NlMGK7A0biwMUaKtzuiFOZ24lO8612
                  MD5:FDC3F1F88D345B8B85327E38AF1D1930
                  SHA1:5E0D07F5429D88759A3F3466F3E166FD0AF1B7A5
                  SHA-256:A4D8051A0AC52B494184E2E96775108BBC43FE3E3F9A5790A614E4C756DD7BCA
                  SHA-512:663BF2F5126FB33597E5C282ED13B218285FBAC3F6D830CA30C19BC0E2CF8F9956F1EB4789C1B5DD5EB62E25DC01602CDD7D14746E3D0652A0C43CF5066F57B1
                  Malicious:true
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.4.9.3.6.5.3.8.6.8.5.3.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.4.9.3.6.5.8.0.8.7.3.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.b.7.9.8.6.b.d.-.4.8.3.8.-.4.7.b.9.-.b.b.6.f.-.b.0.c.3.7.b.a.8.e.f.b.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.7.b.9.e.0.4.-.1.6.9.2.-.4.6.8.7.-.9.e.3.6.-.2.2.3.8.4.0.f.8.3.1.4.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.9.V.v.T.m.G.m.e.1...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.a.l.c.u.l.o.T.i.n.y...d.l.l.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.2.0.-.0.0.0.1.-.0.0.1.4.-.2.0.e.c.-.8.8.8.a.e.8.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.2.c.1.6.8.8.a.3.c.e.4.f.6.7.c.9.c.b.4.e.6.e.a.7.6.0.c.2.e.0.2.0.0.0.0.0.0.0.0.!.0.0.0.0.a.a.4.6.8.e.f.b.1.9.1.a.4.4.3.0.d.3.e.7.4.7.0.c.a.0.5.e.0.d.c.9.6.f.8.a.b.2.0.6.!.p.9.V.v.T.m.G.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:Mini DuMP crash report, 16 streams, Sat Oct 26 20:49:25 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):181284
                  Entropy (8bit):2.8254164656282534
                  Encrypted:false
                  SSDEEP:1536:xIHUsqgQoS6FsZ9jCC8jH/E1pcJmXh5+vM+tAH:RvgA1CCq6a63+vs
                  MD5:6E256641DF2D47FBA8A29EFD4B8A1170
                  SHA1:5A917C8E5C0A6A955C3AF50A978C15C585E57F5D
                  SHA-256:3899FD42445180FED8AB3F999B32A7D65FFFECB8D7C8D9384468100C1F5FB46B
                  SHA-512:6BFBEA8433A7A478DDB80486C26AF0E2FD651E9CF64BD804EC30A6BAF2468479A23C86C54D14457FC316030BD5A709B10C10B84D6DFDBB775B923C9A739997F9
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... ........U.g............$...............D.......$...............<............>..........l.......8...........T...............4...........P...........<...............................................................................eJ..............Lw......................T....... ....U.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8540
                  Entropy (8bit):3.708323846374027
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJ5hG6YEIvc4Zugmfh4dv/prB89bDQxNkfjhm:R6lXJvG6YEAc4Qgmfh4dv8DQrkf4
                  MD5:974E4C7B03CFAD06CC9AB00EC2CCB676
                  SHA1:2B994396796620DF8C672C248313B02EF38DEC19
                  SHA-256:B9A7A990DB59ACD09F71AD766A3B1BC7D73205432323D1C74C141E15451AA443
                  SHA-512:04A5A92098EAEFD75D12F78E5D6230252206224AACF86A51B54C99F05B9848BD9F03EE02DD7B5C0FD601D3B363F5C2B6CD12226BAD036F0C3C920771F542186E
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.7.6.<./.P.i.
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4719
                  Entropy (8bit):4.480242174982859
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zs8Jg771I93kPWpW8VYQ9Ym8M4JQkE6E2sFQipyq85jEcLfPA8GuGuKd:uIjf6I7/e7VvcJQ39pplilGuGuKd
                  MD5:96BC346490A43EF1AE09EE82E67D3237
                  SHA1:3B03EF5DB7D2E341A15E88221137D57F5475A843
                  SHA-256:F4F9D681E56FE09C225B8E87FDA47F78630D873F84A7D6B30D264EE94C8121C0
                  SHA-512:548A41287EC2A8CC4CF3D3F597AB2C5B9988B40FF34FB72D90D1436C7BDE63E3D88B68775BCCB1B864C28EEF587DE230D25D3BCCC53983889AA6B682F7905523
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560872" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\System32\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.421687332837138
                  Encrypted:false
                  SSDEEP:6144:cSvfpi6ceLP/9skLmb0OTxWSPHaJG8nAgeMZMMhA2fX4WABlEnNU0uhiTw:HvloTxW+EZMM6DFyi03w
                  MD5:F79F868C70E856790A9DB22DE3DCD530
                  SHA1:9678227A40DB6E5A5081C3B235D9467FCFEBF027
                  SHA-256:29A4AD9B87CB318D68CAC44AD1EBB8E9E9D86D3BEC16EF3CD302646ED73678A1
                  SHA-512:8965EF66FCA666190D0411DCAB1C6FEEB58D3FBE22D693C5027A52AF8F8B44DB5E32ED01E0617BFE7DC7CA724D8F8414CB6604472824FA20ADA5BA65E1DB496A
                  Malicious:false
                  Reputation:low
                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....'.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.38945535341622
                  TrID:
                  • Win64 Executable GUI Net Framework (217006/5) 49.88%
                  • Win64 Executable GUI (202006/5) 46.43%
                  • Win64 Executable (generic) (12005/4) 2.76%
                  • Generic Win/DOS Executable (2004/3) 0.46%
                  • DOS Executable Generic (2002/1) 0.46%
                  File name:p9VvTmGme1.exe
                  File size:139'776 bytes
                  MD5:361df818c661b4cdc52ec248aa8c8db7
                  SHA1:aa468efb191a4430d3e7470ca05e0dc96f8ab206
                  SHA256:ec7fd123c43a8d15a2301075f9c90ff330cbc513d14fc1992b247edb7d7f474b
                  SHA512:b9731cd63748a0754ece700b902b881eede06c8c4baab25d4e5fa7f4979a822569438b7035345fcf3adb8f86d3bfa07fba95ccea35b3b6713b9133e546eb03f7
                  SSDEEP:3072:d6wdJVoDP1bZw+QC87B38vkIJUUxzqkbppqYaUoZZJt/:fH+bZfC7BzUxW0pA++
                  TLSH:ECD3BFC1FB184360C6FE8AB658256D4106F36CBF59E1D22F3ADE726D16F2161032AB47
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0.................. .....@..... .......................`............`...@......@............... .....
                  Icon Hash:6357330d08d8cc1f
                  Entrypoint:0x140000000
                  Entrypoint Section:
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x8E060F9A [Tue Jul 4 06:18:02 2045 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:
                  Instruction
                  dec ebp
                  pop edx
                  nop
                  add byte ptr [ebx], al
                  add byte ptr [eax], al
                  add byte ptr [eax+eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x11d3c.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x120340x54.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x1013e0x10200261a953cd61393edf1d6ec1e635db53bFalse0.6717538759689923data7.191590684580298IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x140000x11d3c0x11e00a0e0c97167611c8b31cb04e8916a62c6False0.3430807473776224data5.151829759715169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0x141000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2834 x 2834 px/m0.3365668993256832
                  RT_GROUP_ICON0x249380x14data1.15
                  RT_VERSION0x2495c0x2fcdata0.44502617801047123
                  RT_MANIFEST0x24c680x10cdXML 1.0 document, Unicode text, UTF-8 (with BOM) text0.41106719367588934
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:16:49:24
                  Start date:26/10/2024
                  Path:C:\Users\user\Desktop\p9VvTmGme1.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\p9VvTmGme1.exe"
                  Imagebase:0x25c26e30000
                  File size:139'776 bytes
                  MD5 hash:361DF818C661B4CDC52EC248AA8C8DB7
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000000.2019137764.0000025C26E32000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:4
                  Start time:16:49:25
                  Start date:26/10/2024
                  Path:C:\Windows\System32\WerFault.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\WerFault.exe -u -p 6176 -s 676
                  Imagebase:0x7ff7e28b0000
                  File size:570'736 bytes
                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  No disassembly