Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe

Overview

General Information

Sample name:17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe
Analysis ID:1544508
MD5:32baa3c5cb4cd2452cd26846692bfafb
SHA1:defb08a85f8a4adf2bdd20ae4408597b0204a1f0
SHA256:dfd4ae7f9c8039cf58ca2a551b5765582a1d3f11cc572ece8493f8581999875f
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["dilemmadu.site", "servicedny.site", "seallysl.site", "contemteny.site", "faulteyotk.site", "authorisev.site", "goalyfeastz.site", "opposezmny.site"], "Build id": "Yyt5XI--"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["dilemmadu.site", "servicedny.site", "seallysl.site", "contemteny.site", "faulteyotk.site", "authorisev.site", "goalyfeastz.site", "opposezmny.site"], "Build id": "Yyt5XI--"}
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeReversingLabs: Detection: 23%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeJoe Sandbox ML: detected
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: servicedny.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: authorisev.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: faulteyotk.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: contemteny.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: goalyfeastz.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: opposezmny.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: seallysl.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: Workgroup: -
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeString decryptor: Yyt5XI--
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_00401000
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040111D
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040392F
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_00403933
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040393A
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h0_2_0040D33A

    Networking

    barindex
    Source: Malware configuration extractorURLs: dilemmadu.site
    Source: Malware configuration extractorURLs: servicedny.site
    Source: Malware configuration extractorURLs: seallysl.site
    Source: Malware configuration extractorURLs: contemteny.site
    Source: Malware configuration extractorURLs: faulteyotk.site
    Source: Malware configuration extractorURLs: authorisev.site
    Source: Malware configuration extractorURLs: goalyfeastz.site
    Source: Malware configuration extractorURLs: opposezmny.site
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 0_2_00441AE50_2_00441AE5
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 0_2_0040B17B0_2_0040B17B
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 0_2_0040B1810_2_0040B181
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 232
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3524
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7541b396-612a-415d-aa70-15c596fac54fJump to behavior
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeReversingLabs: Detection: 23%
    Source: unknownProcess created: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe "C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe"
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 232
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeCode function: 0_2_00401525 push dword ptr [edx+eax-77h]; ret 0_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: servicedny.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: authorisev.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: faulteyotk.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dilemmadu.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: contemteny.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: goalyfeastz.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: opposezmny.site
    Source: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, 00000000.00000000.2161476971.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: seallysl.site
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe24%ReversingLabs
    17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    servicedny.sitetrue
      unknown
      goalyfeastz.sitetrue
        unknown
        contemteny.sitetrue
          unknown
          faulteyotk.sitetrue
            unknown
            opposezmny.sitetrue
              unknown
              dilemmadu.sitetrue
                unknown
                seallysl.sitetrue
                  unknown
                  authorisev.sitetrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://upx.sf.netAmcache.hve.4.drfalse
                    • URL Reputation: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1544508
                    Start date and time:2024-10-29 14:21:09 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 11s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe
                    Detection:MAL
                    Classification:mal84.troj.evad.winEXE@2/5@0/0
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 11
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.168.117.173
                    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe, PID 3524 because there are no executed function
                    • VT rate limit hit for: 17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe
                    TimeTypeDescription
                    09:22:11API Interceptor1x Sleep call for process: WerFault.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.7139091715687981
                    Encrypted:false
                    SSDEEP:96:hgFhUW/phMssGhA1yDf0QXIDcQzc6CmcE1cw3C/44+HbHg6ZAX/d5FMT2SlPkpXP:iooMg0NXfnjEzuiFUZ24IO8L
                    MD5:491D5E816398458BA9FBDDBE86A08795
                    SHA1:73118C5A0513C5A81DCCC6B39644F56AF78493C5
                    SHA-256:ACA977069D51715C905D180E22198251CDFF845CA43F9492DDC9584FC464733E
                    SHA-512:0853C29F86E1826470ED146EB2527DB04D7C6EA27D0B982908726376A942E7FD0FD717BEC5264402C68522C24163A87A4324BF2D66C3C7FD787378E7EC2469C9
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.8.1.7.2.7.8.9.1.3.7.1.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.8.1.7.2.8.2.1.9.4.8.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.a.b.0.5.f.d.f.-.c.9.3.4.-.4.8.c.c.-.9.1.0.2.-.4.a.1.b.7.e.7.e.4.b.7.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.9.3.9.6.a.6.-.0.9.6.0.-.4.b.6.7.-.b.c.8.1.-.c.0.0.d.d.1.2.1.9.5.d.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.2.0.8.0.0.9.1.b.4.2.7.2.9.9.2.b.b.e.e.9.c.0.9.0.b.2.5.f.6.b.f.9.2.f.9.4.0.e.5.2.d.b.b.6.2.4.b.d.0.b.6.5.7.1.2.e.b.e.4.3.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.c.4.-.0.0.0.1.-.0.0.1.5.-.d.8.9.5.-.8.3.8.d.0.5.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.9.0.1.a.3.9.6.a.b.8.6.d.9.b.5.4.4.e.e.1.6.c.0.d.d.2.6.1.4.0.c.0.0.0.0.f.f.f.f.!.0.0.0.0.d.e.f.b.0.8.a.8.5.f.8.a.4.a.d.f.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 13:22:07 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):19618
                    Entropy (8bit):2.052634554166529
                    Encrypted:false
                    SSDEEP:96:528+VqBiZWFZoTi7niLnrrKVkjS68LWx4Wqqjl39WI/WItKPIZqv7KJ:LXOO65RFqjG
                    MD5:38FFD8615AA8FFF550666C71B2465024
                    SHA1:C3A9D2551D40F5DE118424E81485483B1D0FA8E0
                    SHA-256:E8C6A556F7DF182285931451A50003CB3A6694833C667E36FBD7B9692D4561C2
                    SHA-512:C12C908073F326D4BD5D5DBB393F9F669033178321B2C194A05B90F73B0A2C13EC40F9AC53660C77DB94178775B2FC2562B85E93C7333ABF28A1E70B74A61CD4
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... ......... g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T............. g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8546
                    Entropy (8bit):3.7023049729840474
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJBW6AtI6Y2DGSU9v90gmfrWJPWOepxj89bOwsf036m:R6lXJg6AC6YrSU9v90gmfyJPWOdODfO
                    MD5:E8ED42B282AB6738859165FB2BC52D44
                    SHA1:D025CE91A09B96DB0DC92F103029FA8BB4EA1615
                    SHA-256:D4B6CE7C2FAC0DCDD50918FDCF0E12CC8CBB7B100BCA66DCB7B3B9F62395101D
                    SHA-512:FF3436FDB427B2DB06A9AB91B8876BA5ACA3457AA6F566444A8FB2B46720AA8A0EB9061490921BE250C18881DF06C9DA32B88929C2C5360E286F32C5D11B09F3
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.5.2.4.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4893
                    Entropy (8bit):4.549848942372229
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsY/Jg77aI9vCNWpW8VYANV5Ym8M4JW/cKFX+q8NDLR+1rGMGEd:uIjfiI7hC87VtNuJoIRwCHEd
                    MD5:BF685BE0EC6B14E53145FC63A179043F
                    SHA1:7599CC5309A53B1A68271922BF2339CB9A888962
                    SHA-256:959CE7FB0AA81E0C702CFB70F86F095FEFF7EB45443DE94F1E97987440AD606B
                    SHA-512:E3C4109B02C81098494AF179800148FD4E4197B031DFC24DFC7040C2D7380CEFDC72430F42CFCA83F64737A0B3779BB47FBED92252AC223C47CF4EF1102B6F70
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="564744" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.469126041218423
                    Encrypted:false
                    SSDEEP:6144:xzZfpi6ceLPx9skLmb0fvZWSP3aJG8nAgeiJRMMhA2zX4WABluuNRjDH5S:pZHtvZWOKnMM6bFpLj4
                    MD5:BBD9661E92509E564920F5CD92BF3DBC
                    SHA1:31CCDCB3710EFFF297B8F079E3ECC4CD0D553D35
                    SHA-256:3DA2B35AB90083B862CD8BCCA454E7C9F30ADEABB4AFE9783CC662EC979D6A3F
                    SHA-512:E79D7B5A8F8698055420871469A06C4F15F0FD90D9C885B78C35F0C1B3E60AE3099127F40C1DE09B46501A8C9FAD98242FE59DEABD5B6B50DD7DCF9F49B93792
                    Malicious:false
                    Reputation:low
                    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....*...............................................................................................................................................................................................................................................................................................................................................H..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.7982609370717935
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe
                    File size:352'821 bytes
                    MD5:32baa3c5cb4cd2452cd26846692bfafb
                    SHA1:defb08a85f8a4adf2bdd20ae4408597b0204a1f0
                    SHA256:dfd4ae7f9c8039cf58ca2a551b5765582a1d3f11cc572ece8493f8581999875f
                    SHA512:7acb04e29069ec03bb5c13cd94e60e02eccd5bf5140236ab8e09875af90a4a39737895fc3706d4a6417fbb964a2399572335d415a61c6725d759d3e76ffaf1fe
                    SSDEEP:6144:7dGH3aV6ldgUHXAvgYi8w2HewuhLJcm7S3AXLyRmx6qA8gF/ydee:7yqV6ldgUHXRi4JcwKJRmx6H8yiH
                    TLSH:BA748D05EB7380A1CCC78C7561DEBB7F997A6A0447384ED7CB5CDEA428A36D13839906
                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......g.................D........................@.......................................@.................................R......
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x40d0b0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6715CDA7 [Mon Oct 21 03:42:31 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    nop
                    nop
                    nop
                    nop
                    nop
                    add eax, dword ptr [esp+edx*4+34h]
                    add eax, eax
                    mov dword ptr [esp+edx*4+0000093Ch], eax
                    add eax, dword ptr [esp+edx*4+38h]
                    add eax, eax
                    mov dword ptr [esp+edx*4+00000940h], eax
                    add edx, 02h
                    cmp ebx, edx
                    jne 00007FC7892B7FC2h
                    loopne 00007FC7892B8040h
                    mov bh, 83h
                    retn F602h
                    rol dword ptr [ecx], FFFFFF8Bh
                    mov word ptr [eax+ecx*8], fs
                    adc eax, 0D740000h
                    add eax, dword ptr [esp+edx*4+2Ch]
                    add eax, eax
                    mov dword ptr [esp+edx*4+00000934h], eax
                    test ecx, ecx
                    jng 00007FC7892B80C3h
                    xor eax, eax
                    mov edx, dword ptr [esp+20h]
                    lea edi, dword ptr [edx+edx*8]
                    mov dword ptr [esi], ecx
                    add al, EBh
                    jp 00007FC7892B7FB3h
                    loop 00007FC7892B7FF7h
                    mov esi, dword ptr [esp+10h]
                    add edx, esi
                    shl edi, 06h
                    add edi, esi
                    mov dword ptr [esp+04h], edi
                    jmp 00007FC7892B801Ah
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    mov ecx, dword ptr [esp+04h]
                    mov word ptr [ecx+eax*2+00008852h], di
                    mov ecx, dword ptr [esp+000015C8h]
                    inc eax
                    cmp eax, ecx
                    add al, ah
                    dec esi
                    mov bh, 84h
                    xchg byte ptr [eax], al
                    add byte ptr [eax], al
                    add al, ah
                    dec esi
                    mov bh, B6h
                    pushfd
                    adc byte ptr [edx], dl
                    pop dword ptr [eax]
                    add byte ptr [ebp-74148B25h], al
                    mov word ptr [esp+esi-72FFFFF7h], ds
                    jns 00007FC7892B7FF3h
                    mov dword ptr [esp+ebx*4+00000934h], edi
                    xor eax, esi
                    loopne 00007FC7892B8040h
                    mov bh, 80h
                    push cs
                    add al, EBh
                    jnp 00007FC7892B7FF6h
                    jc 00007FC7892B8031h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4b80.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x4819c0xbc.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x442b80x444002cd4ae25ebdaee6c85ce1315e56eabcfFalse0.5441170157967034data6.641637773832036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x460000x25270x26009175939b333ffddb8594b46408474ea6False0.6291118421052632data6.741066085511267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x490000xf5180x62006f15150468e1b8d3dd514b41971c3458False0.5069754464285714data6.799115565521258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x590000x4b800x4c00b7b2a990d5bc166254c4c3f27d4f72c9False0.5265727796052632data6.220468273783409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:09:22:07
                    Start date:29/10/2024
                    Path:C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6fac3b464.dat-decoded.exe"
                    Imagebase:0x400000
                    File size:352'821 bytes
                    MD5 hash:32BAA3C5CB4CD2452CD26846692BFAFB
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:4
                    Start time:09:22:07
                    Start date:29/10/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 232
                    Imagebase:0xd60000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: $ $ $ $ $ $
                      • API String ID: 0-935225467
                      • Opcode ID: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                      • Instruction ID: 50ea3f66718b9f0aec2dde1cafbd8e4c0de0bc4ea73b4abfd2f3b225e7e50961
                      • Opcode Fuzzy Hash: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                      • Instruction Fuzzy Hash: AC515CB16047418FD32A8F28C8947A67F96EF62305F1941AFD0825B3A1D7B89E4AC7C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: $ $ $ $ $ $
                      • API String ID: 0-935225467
                      • Opcode ID: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                      • Instruction ID: f7c5b6151606094664de1af60f9128b8343ad51cb9d90a512a25ca090a2e4e3f
                      • Opcode Fuzzy Hash: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                      • Instruction Fuzzy Hash: 333109B15047419FD32A8F24889862B7F57AB62305B1982BFC4511B3E2D3F8DA19C7C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: $ $ $ $ $ $
                      • API String ID: 0-935225467
                      • Opcode ID: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                      • Instruction ID: 8d1535539f6c5361cf9dca1fd3e7e74b7c3d02e9c21871ba0092eb5ffd02d52e
                      • Opcode Fuzzy Hash: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                      • Instruction Fuzzy Hash: 6131A3B1A047115ED32A8F14889862BBE97AB62315F1982BBC0516B3E1D3F8DA1DC7C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: $ $ $ $ $ $
                      • API String ID: 0-935225467
                      • Opcode ID: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                      • Instruction ID: 667a8602ed86c8e57a971cd8e4128e82d883590cc2420ca462f20316beda6c97
                      • Opcode Fuzzy Hash: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                      • Instruction Fuzzy Hash: 8A31B2B19047115ED32A8F14889872BBE57AB62315F1982BBC0516B3E1D3F89A1DC7C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: $ $ $ $ $ $
                      • API String ID: 0-935225467
                      • Opcode ID: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                      • Instruction ID: a3f89da26ddce334d935fd876fc161bfabed00f9a58923f1678de83345a9f44d
                      • Opcode Fuzzy Hash: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                      • Instruction Fuzzy Hash: 1E015EF25113008FC32E8F41D8D493BBF27A6B2314326A2AFC0402B261D3B5C62DCB88
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: ;:54
                      • API String ID: 0-2887251705
                      • Opcode ID: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                      • Instruction ID: c9837bf11cf4ad60dd6dd8dd9122ae42f90ca62632c53ad74a67825a83bc24ac
                      • Opcode Fuzzy Hash: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                      • Instruction Fuzzy Hash: F5A1BE72B153809FE715DA29DC807A6BF93EB96300F1D84AFD481DB322E6399C81C345
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                      • Instruction ID: b7764c4af62fa0c2d5b5ef5cd1ab6a06a14ec5ca4f1d67a2cca15874c182747d
                      • Opcode Fuzzy Hash: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                      • Instruction Fuzzy Hash: 64414D7110D3809FD3258B68884065FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                      • Instruction ID: 15271058e7cda56ff3f9a36a900eb8e385046b1bc0e6906e50e720d0b9c466b1
                      • Opcode Fuzzy Hash: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                      • Instruction Fuzzy Hash: 6F414C7110D3808FD3158B6C884165FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                      • Instruction ID: 4efda905ac7a41cadf9716579617f48ebd0f1d3c79b6496c68504865d56f4ba9
                      • Opcode Fuzzy Hash: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                      • Instruction Fuzzy Hash: 7F11023390635087EB144B7258912BEB7629BBE310F4D116FC851277C3D26A8C41C3C8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: I$K$L$N$V$V$X$Y$Y$]$_$q
                      • API String ID: 0-2073889574
                      • Opcode ID: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                      • Instruction ID: 43827593aa6497e58040c952b9477bc89a4bd2f44540a878b620f7f54beaff88
                      • Opcode Fuzzy Hash: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                      • Instruction Fuzzy Hash: A8613C7150C3C18FD3219F2888843AABFD19B57324F185AAFD4D54B382C67D894B9797
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3420325042.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3420307062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420357501.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420374830.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420392337.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3420411412.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17302080091b4272992bbee9c090b25f6bf92f940e52dbb624bd0b65712ebe434dde6f.jbxd
                      Similarity
                      • API ID:
                      • String ID: 9tWU$<194$JHz~$UW$^
                      • API String ID: 0-831947292
                      • Opcode ID: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                      • Instruction ID: 3abd27d06bb50cb3e07a1f710ed1dcbcc1a7b5c52bb8c7ac571728cc573a4b06
                      • Opcode Fuzzy Hash: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                      • Instruction Fuzzy Hash: CB4119311083919FD726CF25885076BBFE0AFA7304F084DAED4D65B392D739891AC766