Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uivxeWogXy.exe

Overview

General Information

Sample name:uivxeWogXy.exe
renamed because original name is a hash value
Original sample name:6cf1e18762880ec3bc809ee1148aacfc2f536f42.exe
Analysis ID:1542944
MD5:f4e63c81d5af37d0ba01e00b35d950de
SHA1:6cf1e18762880ec3bc809ee1148aacfc2f536f42
SHA256:ad62a16c290a03c72cbe494aa3db539a5c20ed66a5b0dc7047e75a5e6d979831
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • uivxeWogXy.exe (PID: 7060 cmdline: "C:\Users\user\Desktop\uivxeWogXy.exe" MD5: F4E63C81D5AF37D0BA01E00B35D950DE)
    • WerFault.exe (PID: 6100 cmdline: C:\Windows\system32\WerFault.exe -u -p 7060 -s 800 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: uivxeWogXy.exeAvira: detected
Source: uivxeWogXy.exeReversingLabs: Detection: 47%
Source: uivxeWogXy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdb source: uivxeWogXy.exe
Source: Binary string: PresentationFramework.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.pdbPresentationCore.ni.dllSystem.Xaml.ni.dllPresentationCore.dllSystem.Core.ni.dllWindowsBase.ni.dll source: WER5D67.tmp.dmp.3.dr
Source: Binary string: WindowsBase.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb8o source: uivxeWogXy.exe, 00000000.00000002.1882233849.000001F0B4DC5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: WindowsBase.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER5D67.tmp.dmp.3.dr
Source: Binary string: Installation_x64.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb+o source: uivxeWogXy.exe, 00000000.00000002.1882233849.000001F0B4DC5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: WindowsBase.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Xaml.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: mscorlib.pdb source: uivxeWogXy.exe, 00000000.00000002.1882629082.000001F0B6931000.00000004.00000800.00020000.00000000.sdmp, WER5D67.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb0i source: uivxeWogXy.exe, 00000000.00000002.1882233849.000001F0B4D5F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xaml.ni.pdbRSDSDg{V source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationCore.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: WindowsBase.pdbH source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Xaml.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdbSHA256 source: uivxeWogXy.exe
Source: Binary string: System.Core.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationFramework.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationCore.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7060 -s 800
Source: uivxeWogXy.exeStatic PE information: No import functions for PE file found
Source: uivxeWogXy.exeBinary or memory string: OriginalFilenameInstallation_x64.dll2 vs uivxeWogXy.exe
Source: uivxeWogXy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal56.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\uivxeWogXy.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7060
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6e2de749-03c1-44cd-bbb5-b34bde6e06abJump to behavior
Source: uivxeWogXy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: uivxeWogXy.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\uivxeWogXy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: uivxeWogXy.exeReversingLabs: Detection: 47%
Source: uivxeWogXy.exeString found in binary or memory: <.ctor>b__0_0<InitializeAsync>d__1<>u__1IEnumerable`1Task`1List`1label_download1label_done1sendclick1sendopen1ProgressBar1Int32Dictionary`2TaskLoad2label_download2label_done2sendclick2sendopen2TaskLoad3label_done3Installation_x64get_UTF8<p0><p1><Module>CalculadoraWPFSystem.IOotstykdomainpublicSystem.Collections.GenericInitializeAsyncReadAsStringAsyncGetAsyncTinyPatch.MiscconnectionIdSystem.Threading.ThreadTaskLoadAdd_contentLoadedAwaitUnsafeOnCompletedget_IsCompletedSendUriKindReetodEnsureSuccessStatusCodeget_MessageHttpResponseMessageDefenderRechargeIDisposableDownloadFilesecond_file_is_opened_skipping_to_next_filethird_file_is_opened_skipping_to_next_filefour_file_is_opened_skipping_to_next_filefirst_file_is_opened_skipping_to_next_fileIsInRoleWindowsBuiltInRoleSystem.Consoleset_FileNameget_MachineNameGetCpuNameSystem.RuntimeWriteLineCombineIAsyncStateMachineSetStateMachinestateMachineValueTypePresentationCoreRangeBaseButtonBaseCloseDisposeCreateEditorBrowsableState<>1__stateTinyPatch.AnalizateDeleteSTAThreadAttributeEmbeddedAttributeCompilerGeneratedAttributeGeneratedCodeAttributeDebuggerNonUserCodeAttributeAttributeUsageAttributeDebuggableAttributeNullableAttributeEditorBrowsableAttributeAssemblyAssociatedContentFileAttributeAssemblyTitleAttributeAsyncStateMachineAttributeTargetFrameworkAttributeDebuggerHiddenAttributeAssemblyFileVersionAttributeAssemblyInformationalVersionAttributeAssemblyConfigurationAttributeThemeInfoAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCopyrightAttributeNullableContextAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeByteset_ValueTryGetValueDragMovedefender_offFlagTinyPatch.ConfigAppConfigSystem.ThreadingEncodingsecond_bug_downloaded_but_having_problem_with_openningthird_bug_downloaded_but_having_problem_with_openningfour_bug_downloaded_but_having_problem_with_openningFirst_bug_downloaded_but_having_problem_with_openningSystem.Runtime.VersioningFromBase64StringDownloadStringToStringGetStringdownload_second_bugopened_second_bugerror_on_downloading_second_bugerror_on_openning_second_bugdownload_third_bugopened_third_bugerror_on_downloading_third_bugerror_on_openning_third_bugdownload_four_bugopened_four_bugerror_on_downloading_four_bugerror_on_openning_four_bugdownload_first_bugopened_first_bugerror_on_downloading_first_bugerror_on_openning_first_bugSystem.Diagnostics.DebugotstykdomaindebugGetFolderPathset_StartupUriadd_ClickDone_Clickthree_linktwo_linkfirst_linkPresentationFrameworkTaskdomaintaskSystem.Security.PrincipalWindowsPrincipalLabelButton_CancelSystem.ComponentModelInstallation_x64.dllSystem.Xamlget_ItemSystem.IO.FileSystemRandomDoneFormProgressFormMainJoinApplicationResourceDictionaryLocationSystem.ReflectionManagementObjectCollectionSetExceptionButtonContinue_buttonDone_btnRunadd_MouseDownset_StartInfoProcessStartInfoDirectoryInfoSleeptempAppSystem.Net.HttpSystem.Windows.MarkupProgressBarAsyncVoidMethodBuilder<>t__builderSpecialFoldersenderManagementObjectSearcherRo
Source: unknownProcess created: C:\Users\user\Desktop\uivxeWogXy.exe "C:\Users\user\Desktop\uivxeWogXy.exe"
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7060 -s 800
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: uivxeWogXy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: uivxeWogXy.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: uivxeWogXy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: uivxeWogXy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdb source: uivxeWogXy.exe
Source: Binary string: PresentationFramework.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.pdbPresentationCore.ni.dllSystem.Xaml.ni.dllPresentationCore.dllSystem.Core.ni.dllWindowsBase.ni.dll source: WER5D67.tmp.dmp.3.dr
Source: Binary string: WindowsBase.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb8o source: uivxeWogXy.exe, 00000000.00000002.1882233849.000001F0B4DC5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: WindowsBase.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER5D67.tmp.dmp.3.dr
Source: Binary string: Installation_x64.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\PresentationCore.pdb+o source: uivxeWogXy.exe, 00000000.00000002.1882233849.000001F0B4DC5000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationCore.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: Binary string: WindowsBase.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Xaml.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: mscorlib.pdb source: uivxeWogXy.exe, 00000000.00000002.1882629082.000001F0B6931000.00000004.00000800.00020000.00000000.sdmp, WER5D67.tmp.dmp.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb0i source: uivxeWogXy.exe, 00000000.00000002.1882233849.000001F0B4D5F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xaml.ni.pdbRSDSDg{V source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationCore.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: WindowsBase.pdbH source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Xaml.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: C:\Users\Administrator\Documents\CalculadoraWPF-main\CalculadoraWPF\obj\Release\netcoreapp3.1\win-x64\Installation_x64.pdbSHA256 source: uivxeWogXy.exe
Source: Binary string: System.Core.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationFramework.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: PresentationCore.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.ni.pdb source: WER5D67.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER5D67.tmp.dmp.3.dr
Source: uivxeWogXy.exeStatic PE information: 0xD9657B9B [Mon Jul 30 04:44:11 2085 UTC]
Source: C:\Users\user\Desktop\uivxeWogXy.exeCode function: 0_2_00007FFD9B7F00AD pushad ; iretd 0_2_00007FFD9B7F00C1
Source: uivxeWogXy.exeStatic PE information: section name: .text entropy: 7.938911816244926
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeMemory allocated: 1F0B4DF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeMemory allocated: 1F0CE930000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeQueries volume information: C:\Users\user\Desktop\uivxeWogXy.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\uivxeWogXy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
uivxeWogXy.exe47%ReversingLabsWin32.Trojan.Generic
uivxeWogXy.exe100%AviraTR/Agent.uxomi
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1542944
Start date and time:2024-10-26 22:48:33 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:uivxeWogXy.exe
renamed because original name is a hash value
Original Sample Name:6cf1e18762880ec3bc809ee1148aacfc2f536f42.exe
Detection:MAL
Classification:mal56.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.20, 20.42.73.29
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target uivxeWogXy.exe, PID 7060 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtSetInformationFile calls found.
  • VT rate limit hit for: uivxeWogXy.exe
TimeTypeDescription
16:49:45API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.9857411616756653
Encrypted:false
SSDEEP:192:rxSwo4gKDLA0/XojNaKW7NzuiFOZ24lO8QU:swo4gKDLb/YjNatpzuiFOY4lO8QU
MD5:DA3502414C81F1002894EB9EACB8F789
SHA1:331844AF50776F2A6E80859B0657F6F84139C5F6
SHA-256:78195B9F9E12D9072C1664445A3557B777A9677F8F218F719602864C2F3FB31F
SHA-512:816AB1FF4A810E1A5A943120F2DE11F15685CFF1EE08C6C47892ADD14C0FA854728C91599F65665ADD5DD9A969CD90EDF5F82ED871D286A071BF2437095B9A66
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.4.9.3.6.6.9.4.5.2.7.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.4.9.3.6.7.4.9.2.1.4.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.7.8.2.5.2.0.-.a.d.5.7.-.4.4.b.0.-.9.2.0.c.-.4.5.6.a.6.9.0.d.0.3.9.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.7.c.3.0.c.d.-.8.6.a.1.-.4.3.c.7.-.b.d.5.5.-.0.b.5.a.e.2.6.1.c.5.c.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.u.i.v.x.e.W.o.g.X.y...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.n.s.t.a.l.l.a.t.i.o.n._.x.6.4...d.l.l.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.9.4.-.0.0.0.1.-.0.0.1.4.-.8.d.6.5.-.4.b.8.b.e.8.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.d.4.2.5.7.4.7.8.5.6.2.e.d.a.5.3.8.7.8.2.f.c.5.4.8.c.b.a.7.c.1.0.0.0.0.0.0.0.0.!.0.0.0.0.6.c.f.1.e.1.8.7.6.2.8.8.0.e.c.3.b.c.8.0.9.e.e.1.1.4.8.a.a.c.f.c.2.f.5.3.6.f.4.2.!.u.i.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 16 streams, Sat Oct 26 20:49:27 2024, 0x1205a4 type
Category:dropped
Size (bytes):418841
Entropy (8bit):3.8244440128870396
Encrypted:false
SSDEEP:3072:rKK3+vdaT46aDke/saV64NnV+scSlrT9urdZjde5hibTzxzYAC39ULAXBw1CCqZ:rl3Qdd/saoI+YlrT9mLWhGzYfYhq
MD5:0FC545F794FA0BE4280EFA8A7EABFA4D
SHA1:D651CCE2CF8F65668BF69F10087A739A15F390FD
SHA-256:CA675A39E3BD8CB1F2A0AA8C3494681174E91F103B8CD935D3811E001603197B
SHA-512:11D5FAA3A366883CBACA3B1398AB4CF7AECE52B7988B3F80298F551CF4C4A00D5F429D366F695D826FCAB7316A4BEDCC0CB862C4CEDC4CBA14133AEBD111FD96
Malicious:false
Reputation:low
Preview:MDMP..a..... ........U.g....................................$........................-...O..........l.......8...........T...............QD......................................................................................................eJ......(.......Lw......................T............U.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8556
Entropy (8bit):3.702609086607872
Encrypted:false
SSDEEP:192:R6l7wVeJ5SP6Y9Z5tYQgmfN4dbmpr3q89bRRofp7m:R6lXJMP6YD5tYQgmfN4dMR+fo
MD5:93B2F4B8D3975A1E933A8E66B3EC7B67
SHA1:8E3DDFE45860DDB9DCA758996803538C5478891F
SHA-256:569D7B4382B8207EE2D07ACF17FD32A614D8D367A6D49BC899B6D7767162DB55
SHA-512:F428653EB77078CEA9B7C573D135ADFC8210299D9D38094A713D313B21ECD85F13CED7B3D52F3E7834745F35B3EAA5C9BCE6C8FE41E798D9F8CCC8DAADD68550
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.6.0.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.495614645208746
Encrypted:false
SSDEEP:48:cvIwWl8zs8Jg771I9ZeWpW8VYQ1Ym8M4JgsFJ0yq85tO7O3y7PWd:uIjf6I7ef7VvEJKBkMud
MD5:F5026228D9BDBAC9FF4EAB81C7FCF2AF
SHA1:8190F205F31DFBC97FCF19E996123304085C84BD
SHA-256:A26A065D6A3E64F8D0E4627CFE4B8630493EE8D767009BB2C076F94F7EF025EE
SHA-512:78554362C83304D6B93AF2FF70D5DC8EBDCEC9421C1ED61F3A870024F4856ADDDBC4D328044D734F1642B61F4D66D235C7B5098520A2AC0955393E41B0BAD55E
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560872" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.46585355643798
Encrypted:false
SSDEEP:6144:cIXfpi67eLPU9skLmb0b4fWSPKaJG8nAgejZMMhA2gX4WABl0uNtdwBCswSbJ:hXD94fWlLZMM6YFHv+J
MD5:575889F865E4A50E0B18624E47941DA0
SHA1:ACD40AE3D20D1300F1EAA93F2F4E1A21BEF5C88A
SHA-256:90DAB5F1CE065224123BC8F3333989F3D170E07C33590FBAEB856338C22B8807
SHA-512:D0EC12AA8FAA32D7A89875FADC20B479E9E7C1FE52C0B7D9F9ABB5C81D03238114F417017FBEDA1BD5A0C51953ECCBE2FD523032BCB1D14458421543B127F956
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....'...............................................................................................................................................................................................................................................................................................................................................C.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.923848223319801
TrID:
  • Win64 Executable GUI Net Framework (217006/5) 49.88%
  • Win64 Executable GUI (202006/5) 46.43%
  • Win64 Executable (generic) (12005/4) 2.76%
  • Generic Win/DOS Executable (2004/3) 0.46%
  • DOS Executable Generic (2002/1) 0.46%
File name:uivxeWogXy.exe
File size:340'992 bytes
MD5:f4e63c81d5af37d0ba01e00b35d950de
SHA1:6cf1e18762880ec3bc809ee1148aacfc2f536f42
SHA256:ad62a16c290a03c72cbe494aa3db539a5c20ed66a5b0dc7047e75a5e6d979831
SHA512:9c0099f3738bbcbd3602057514b969a8bf8c396029946da2f99056ca646c1b791bfc11a9b9a36e527ee5ed8fb6a74ded68d23d9419e2f381dc06e2cd427b4e21
SSDEEP:6144:H0Ry+bZf0d6McOvwv6zGhtrys2NOr8Yyn5TNOr8Yyn5OQ:H0Ry0ZPMIlhtr8NO4jnhNO4jn9
TLSH:407412E6FB40B130C153883D473C6B4B99B3A4EA2B42C92E1ACC65B5DD461E5CD72D2B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....{e..........."...0......2........... .....@..... .......................`............`...@......@............... .....
Icon Hash:cec6d7979b99d9e6
Entrypoint:0x140000000
Entrypoint Section:
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xD9657B9B [Mon Jul 30 04:44:11 2085 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x31bc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x51e4c0x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x4ff5a0x50000982869b5367edf6c71eeef428311f497False0.936749267578125data7.938911816244926IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x520000x31bc0x3200e1551914edd1534ef7c91639295de682False0.72078125data7.14090165324992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x521000x1c7aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9237311385459533
RT_GROUP_ICON0x53d8c0x14data1.05
RT_VERSION0x53db00x326data0.44168734491315137
RT_MANIFEST0x540e80x10cdXML 1.0 document, Unicode text, UTF-8 (with BOM) text0.41106719367588934
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:16:49:26
Start date:26/10/2024
Path:C:\Users\user\Desktop\uivxeWogXy.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\uivxeWogXy.exe"
Imagebase:0x1f0b4a70000
File size:340'992 bytes
MD5 hash:F4E63C81D5AF37D0BA01E00B35D950DE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:16:49:26
Start date:26/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7060 -s 800
Imagebase:0x7ff6cbd70000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1883032064.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b7f0000_uivxeWogXy.jbxd
    Similarity
    • API ID:
    • String ID: 9M_^
    • API String ID: 0-1708477388
    • Opcode ID: e24e6870d7c31d38cb1de9e4880dfb370cb2d8ecc5b5e14e709522fe586f787b
    • Instruction ID: ca6948b8d0a54b7429ffdc31b0fbf5469a50395c73902980207394d6f37e07d4
    • Opcode Fuzzy Hash: e24e6870d7c31d38cb1de9e4880dfb370cb2d8ecc5b5e14e709522fe586f787b
    • Instruction Fuzzy Hash: 07511807F0F7DA0AE7656AEC28310F87F61AF51B69B1A43F7C0984A1F78C09294182D9
    Memory Dump Source
    • Source File: 00000000.00000002.1883032064.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b7f0000_uivxeWogXy.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 60d6a2a3b66e36910061db3b11e701979a26b44bfffd849e6d2251c5d2b5da59
    • Instruction ID: 21bcbcaf71f566e75942064e363260d2d80d2a6283d61bd2f5993717d7225cc7
    • Opcode Fuzzy Hash: 60d6a2a3b66e36910061db3b11e701979a26b44bfffd849e6d2251c5d2b5da59
    • Instruction Fuzzy Hash: CD01AAA191F3D50FE7275B3488325A47FB0AE43200F4A06EBD4C9CB0E3C91C694AC362
    Memory Dump Source
    • Source File: 00000000.00000002.1883032064.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd9b7f0000_uivxeWogXy.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 55b49ae991d9c18e3bf62d2440e4227e1336d94d0a74ddc5eb3cec9d1f351ff0
    • Instruction ID: 163cb5d00787fd02672d91d3a297eb9af498513ad073b79ff9c53257913cadee
    • Opcode Fuzzy Hash: 55b49ae991d9c18e3bf62d2440e4227e1336d94d0a74ddc5eb3cec9d1f351ff0
    • Instruction Fuzzy Hash: AF510D17F0F7CA0AE76569E86C310F87F61EF92B69B1A03F7C098451F79C09290182D9