Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe

Overview

General Information

Sample name:173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe
Analysis ID:1544506
MD5:1b5080ed4191301d6bf2c55db9776f2f
SHA1:6bf5c25c39e4c5cf2c903593343a2e2c61fbf2c0
SHA256:91808f0aa30e326b1ae07d127280b47a5a2f78e1e6020d18be5b362df60e9a5c
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["dilemmadu.site", "authorisev.site", "goalyfeastz.site", "seallysl.site", "contemteny.site", "opposezmny.site", "revirepart.biz", "faulteyotk.site", "servicedny.site"], "Build id": "HpOoIh--2a727a032c4d"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["dilemmadu.site", "authorisev.site", "goalyfeastz.site", "seallysl.site", "contemteny.site", "opposezmny.site", "revirepart.biz", "faulteyotk.site", "servicedny.site"], "Build id": "HpOoIh--2a727a032c4d"}
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeReversingLabs: Detection: 23%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeJoe Sandbox ML: detected
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: servicedny.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: authorisev.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: faulteyotk.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: contemteny.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: goalyfeastz.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: opposezmny.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: seallysl.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: revirepart.biz
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: Workgroup: -
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeString decryptor: HpOoIh--2a727a032c4d
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_00401000
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040111D
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040392F
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_00403933
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040393A
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h0_2_0040D33A

    Networking

    barindex
    Source: Malware configuration extractorURLs: dilemmadu.site
    Source: Malware configuration extractorURLs: authorisev.site
    Source: Malware configuration extractorURLs: goalyfeastz.site
    Source: Malware configuration extractorURLs: seallysl.site
    Source: Malware configuration extractorURLs: contemteny.site
    Source: Malware configuration extractorURLs: opposezmny.site
    Source: Malware configuration extractorURLs: revirepart.biz
    Source: Malware configuration extractorURLs: faulteyotk.site
    Source: Malware configuration extractorURLs: servicedny.site
    Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 0_2_00441AE50_2_00441AE5
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 224
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6908
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\350c1be0-f205-4c3a-81bf-eed673dd590aJump to behavior
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeReversingLabs: Detection: 23%
    Source: unknownProcess created: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe "C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe"
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 224
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeCode function: 0_2_00401525 push dword ptr [edx+eax-77h]; ret 0_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.3.drBinary or memory string: VMware
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: servicedny.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: authorisev.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: faulteyotk.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dilemmadu.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: contemteny.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: goalyfeastz.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: opposezmny.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: seallysl.site
    Source: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, 00000000.00000000.1744205543.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: revirepart.biz
    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe24%ReversingLabs
    173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    goalyfeastz.sitetrue
      unknown
      servicedny.sitetrue
        unknown
        contemteny.sitetrue
          unknown
          faulteyotk.sitetrue
            unknown
            opposezmny.sitetrue
              unknown
              dilemmadu.sitetrue
                unknown
                seallysl.sitetrue
                  unknown
                  revirepart.biztrue
                    unknown
                    authorisev.sitetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.3.drfalse
                      • URL Reputation: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1544506
                      Start date and time:2024-10-29 14:21:08 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 12s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe
                      Detection:MAL
                      Classification:mal84.troj.evad.winEXE@2/5@0/0
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 9
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.189.173.20
                      • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe, PID 6908 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: 173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe
                      TimeTypeDescription
                      09:22:21API Interceptor1x Sleep call for process: WerFault.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.7130658588366473
                      Encrypted:false
                      SSDEEP:192:KgY+g7YZC60NXf5EOjEzuiFvZ24IO8mJG:Kf+g7YZCBNXf5EOjEzuiFvY4IO8mJG
                      MD5:218D1CAF9108638D548D85F0133FFF66
                      SHA1:0F038066C7620607BEACB55C7CE0BCF547C67418
                      SHA-256:C9254E80BED5D167B302FBD29C4032CC1144F4414121ECAB207746CDCCCD2F04
                      SHA-512:32D92F469BDCAA9197FCA339CFBDD5C59ABBE9BB19F0F4EFFC4AE42BF303F5CB751D0ED7E49438F6C0C9D48788EA2C9202EF87748B639CFBEFA287D0A4F589DB
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.8.1.7.2.7.0.9.0.4.4.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.8.1.7.2.7.3.7.1.6.9.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.5.b.a.8.0.d.4.-.9.1.6.3.-.4.7.e.9.-.9.2.8.5.-.1.3.c.2.5.c.6.1.a.6.1.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.7.4.8.6.9.7.b.-.8.0.1.d.-.4.5.0.1.-.a.6.c.e.-.2.9.a.3.8.a.d.3.a.a.4.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.2.0.8.0.1.0.9.1.b.6.d.9.3.c.c.b.9.1.4.0.d.8.7.b.7.1.a.f.6.2.e.e.5.3.9.5.a.2.c.4.0.8.3.6.f.7.2.d.5.0.7.e.c.1.2.a.0.6.8.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.f.c.-.0.0.0.1.-.0.0.1.4.-.9.5.1.0.-.f.1.8.c.0.5.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.0.9.5.a.5.5.9.0.d.9.4.d.a.6.9.5.2.0.7.7.6.2.1.a.2.8.9.9.b.b.d.0.0.0.0.f.f.f.f.!.0.0.0.0.6.b.f.5.c.2.5.c.3.9.e.4.c.5.c.f.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 13:22:07 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):19618
                      Entropy (8bit):2.053961534019206
                      Encrypted:false
                      SSDEEP:96:52821d6FzRPj8BAFi7nCsmujJVRgNWI/WItoIZHv5d:LxUiOJmuVfgFHBd
                      MD5:D5E242BC4165F0F05FF794E72721CA3A
                      SHA1:B5011774C9DEA1801B08DDC8282200D78F00E308
                      SHA-256:FF8B769B717D1CDBF9E6D14160B6EEBF17C637EE81B73BF6A98C631CD23566EE
                      SHA-512:11309F2674FFE6D5E8A5C55B98DFD0F75E347ACE6C66341922972FDC38C464AC82B9AD1D052086C8A2BE3049991364AA45D03EBA37390EFC5D626E35FC379B61
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... ......... g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T...........~. g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8546
                      Entropy (8bit):3.698903898135279
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJUlI6j6Y9dSU9fpgmfomJPWO0px789btb2sf0Injm:R6lXJUa6j6YHSU9fpgmfomJPWOPtbVfY
                      MD5:072A1EC6790122A5E46F7F9DB5DEE549
                      SHA1:7113EA48FA2F28BE3D3994F532F9DD746F319C29
                      SHA-256:3BCD43CD2246762BEC55FE07FCD7B14958F7FC83D5E79A7865AAC43D3FC709E9
                      SHA-512:1A60039FC27264BC50945FF3DC61912C28A3B803B4DD8C0C9C850677EF85E904D9E1E3C1630B795F2C872CA4C64A87A62E8EE7D3FAEAC341119D0DFC80E67B65
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.0.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4893
                      Entropy (8bit):4.548850483543288
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsY/Jg77aI9ACaWpW8VYAL0Ym8M4JyYpKF4L+q8/oWDKrv2bA2bTd:uIjfiI7zb7VtdJyYpLCHD+vaAaTd
                      MD5:0A752972758C1809776776CF125A5100
                      SHA1:461D23DA89185BD8A800871B7AF7AB92A8CCFB40
                      SHA-256:94B0B5D94BB500FA292DC570669050FAD3BA390522C4830DC6EE0BEE52F08957
                      SHA-512:7EA004E7307AC008E47D3E8D457A38CBD0F97D8B3CD98F83E0E8F0A3DDD105EED9544E81C6E294DEE9B1E599AB0208900D075CBE021600E650791C2A3ECB5FBC
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="564744" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.465980251546287
                      Encrypted:false
                      SSDEEP:6144:PIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNldwBCswSbP:gXD94+WlLZMM6YFHf+P
                      MD5:03323DF6A833DCFFF8A8869E84A5098B
                      SHA1:73DC7429E614F83829B3CF3F64CAE0409DEDCE63
                      SHA-256:974A0960E6DEBCEFEA25FB2FF9C037FD2E6A1D15A10B4AABC2D0DAEC984D4C15
                      SHA-512:0893F763B70EC91740022176C15F4CC4706DC29B0251C2585E9C3945D7FACF73A62F96382277DFB11A9FA5ED8B2A9334002E5C4B925826D1652CBBA28652EEBA
                      Malicious:false
                      Reputation:low
                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm:.:..*................................................................................................................................................................................................................................................................................................................................................-.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.798307046087284
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe
                      File size:352'821 bytes
                      MD5:1b5080ed4191301d6bf2c55db9776f2f
                      SHA1:6bf5c25c39e4c5cf2c903593343a2e2c61fbf2c0
                      SHA256:91808f0aa30e326b1ae07d127280b47a5a2f78e1e6020d18be5b362df60e9a5c
                      SHA512:4267958fd2065c01054be77e7378cb22d0b2fb1bc85cd6b7795eba9c1c28ffe89db418a1e3c963911cda43fcf4115c42818127a9c2a3b494f6c7db592da8749c
                      SSDEEP:6144:7dGH3aV6ldgUHXAvgYi8w2HewuhLJcm7S3AXLyRmx6qA8gF/ddee:7yqV6ldgUHXRi4JcwKJRmx6H8yTH
                      TLSH:EF749D05EB7380A1CCC78C7561DEB77F997A6A0447384ED7CB5CDEA428A36E13839906
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......g.................D........................@.......................................@.................................R......
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x40d0b0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6715CDA7 [Mon Oct 21 03:42:31 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      nop
                      nop
                      nop
                      nop
                      nop
                      add eax, dword ptr [esp+edx*4+34h]
                      add eax, eax
                      mov dword ptr [esp+edx*4+0000093Ch], eax
                      add eax, dword ptr [esp+edx*4+38h]
                      add eax, eax
                      mov dword ptr [esp+edx*4+00000940h], eax
                      add edx, 02h
                      cmp ebx, edx
                      jne 00007FDE5CDE9892h
                      loopne 00007FDE5CDE9910h
                      mov bh, 83h
                      retn F602h
                      rol dword ptr [ecx], FFFFFF8Bh
                      mov word ptr [eax+ecx*8], fs
                      adc eax, 0D740000h
                      add eax, dword ptr [esp+edx*4+2Ch]
                      add eax, eax
                      mov dword ptr [esp+edx*4+00000934h], eax
                      test ecx, ecx
                      jng 00007FDE5CDE9993h
                      xor eax, eax
                      mov edx, dword ptr [esp+20h]
                      lea edi, dword ptr [edx+edx*8]
                      mov dword ptr [esi], ecx
                      add al, EBh
                      jp 00007FDE5CDE9883h
                      loop 00007FDE5CDE98C7h
                      mov esi, dword ptr [esp+10h]
                      add edx, esi
                      shl edi, 06h
                      add edi, esi
                      mov dword ptr [esp+04h], edi
                      jmp 00007FDE5CDE98EAh
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      mov ecx, dword ptr [esp+04h]
                      mov word ptr [ecx+eax*2+00008852h], di
                      mov ecx, dword ptr [esp+000015C8h]
                      inc eax
                      cmp eax, ecx
                      add al, ah
                      dec esi
                      mov bh, 84h
                      xchg byte ptr [eax], al
                      add byte ptr [eax], al
                      add al, ah
                      dec esi
                      mov bh, B6h
                      pushfd
                      adc byte ptr [edx], dl
                      pop dword ptr [eax]
                      add byte ptr [ebp-74148B25h], al
                      mov word ptr [esp+esi-72FFFFF7h], ds
                      jns 00007FDE5CDE98C3h
                      mov dword ptr [esp+ebx*4+00000934h], edi
                      xor eax, esi
                      loopne 00007FDE5CDE9910h
                      mov bh, 80h
                      push cs
                      add al, EBh
                      jnp 00007FDE5CDE98C6h
                      jc 00007FDE5CDE9901h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4b80.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x4819c0xbc.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x442b80x444002cd4ae25ebdaee6c85ce1315e56eabcfFalse0.5441170157967034data6.641637773832036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x460000x25270x26009175939b333ffddb8594b46408474ea6False0.6291118421052632data6.741066085511267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x490000xf5180x6200580e4ebf5ef7b42c1a5c8cd998757ea2False0.5075733418367347data6.802531585804453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x590000x4b800x4c00b7b2a990d5bc166254c4c3f27d4f72c9False0.5265727796052632data6.220468273783409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 29, 2024 14:22:50.355763912 CET5356827162.159.36.2192.168.2.4
                      Oct 29, 2024 14:22:51.180452108 CET53537891.1.1.1192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:09:22:06
                      Start date:29/10/2024
                      Path:C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105f3fc219.dat-decoded.exe"
                      Imagebase:0x400000
                      File size:352'821 bytes
                      MD5 hash:1B5080ED4191301D6BF2C55DB9776F2F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:3
                      Start time:09:22:06
                      Start date:29/10/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 224
                      Imagebase:0x250000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                        • Instruction ID: 50ea3f66718b9f0aec2dde1cafbd8e4c0de0bc4ea73b4abfd2f3b225e7e50961
                        • Opcode Fuzzy Hash: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                        • Instruction Fuzzy Hash: AC515CB16047418FD32A8F28C8947A67F96EF62305F1941AFD0825B3A1D7B89E4AC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                        • Instruction ID: f7c5b6151606094664de1af60f9128b8343ad51cb9d90a512a25ca090a2e4e3f
                        • Opcode Fuzzy Hash: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                        • Instruction Fuzzy Hash: 333109B15047419FD32A8F24889862B7F57AB62305B1982BFC4511B3E2D3F8DA19C7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                        • Instruction ID: 8d1535539f6c5361cf9dca1fd3e7e74b7c3d02e9c21871ba0092eb5ffd02d52e
                        • Opcode Fuzzy Hash: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                        • Instruction Fuzzy Hash: 6131A3B1A047115ED32A8F14889862BBE97AB62315F1982BBC0516B3E1D3F8DA1DC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                        • Instruction ID: 667a8602ed86c8e57a971cd8e4128e82d883590cc2420ca462f20316beda6c97
                        • Opcode Fuzzy Hash: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                        • Instruction Fuzzy Hash: 8A31B2B19047115ED32A8F14889872BBE57AB62315F1982BBC0516B3E1D3F89A1DC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                        • Instruction ID: a3f89da26ddce334d935fd876fc161bfabed00f9a58923f1678de83345a9f44d
                        • Opcode Fuzzy Hash: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                        • Instruction Fuzzy Hash: 1E015EF25113008FC32E8F41D8D493BBF27A6B2314326A2AFC0402B261D3B5C62DCB88
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: ;:54
                        • API String ID: 0-2887251705
                        • Opcode ID: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                        • Instruction ID: c9837bf11cf4ad60dd6dd8dd9122ae42f90ca62632c53ad74a67825a83bc24ac
                        • Opcode Fuzzy Hash: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                        • Instruction Fuzzy Hash: F5A1BE72B153809FE715DA29DC807A6BF93EB96300F1D84AFD481DB322E6399C81C345
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                        • Instruction ID: 4efda905ac7a41cadf9716579617f48ebd0f1d3c79b6496c68504865d56f4ba9
                        • Opcode Fuzzy Hash: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                        • Instruction Fuzzy Hash: 7F11023390635087EB144B7258912BEB7629BBE310F4D116FC851277C3D26A8C41C3C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: I$K$L$N$V$V$X$Y$Y$]$_$q
                        • API String ID: 0-2073889574
                        • Opcode ID: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                        • Instruction ID: 43827593aa6497e58040c952b9477bc89a4bd2f44540a878b620f7f54beaff88
                        • Opcode Fuzzy Hash: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                        • Instruction Fuzzy Hash: A8613C7150C3C18FD3219F2888843AABFD19B57324F185AAFD4D54B382C67D894B9797
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3007463967.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3007449556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007497445.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007510399.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007523129.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3007537165.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_173020801091b6d93ccb9140d87b71af62ee5395a2c40836f72d507ec12a068e010105.jbxd
                        Similarity
                        • API ID:
                        • String ID: 9tWU$<194$JHz~$UW$^
                        • API String ID: 0-831947292
                        • Opcode ID: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                        • Instruction ID: 3abd27d06bb50cb3e07a1f710ed1dcbcc1a7b5c52bb8c7ac571728cc573a4b06
                        • Opcode Fuzzy Hash: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                        • Instruction Fuzzy Hash: CB4119311083919FD726CF25885076BBFE0AFA7304F084DAED4D65B392D739891AC766