Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NetworkMiner.exe

Overview

General Information

Sample name:NetworkMiner.exe
Analysis ID:1561663
MD5:3aa776d3ae714443f7a8b226015f7b0c
SHA1:5c4c0fdf0418820b8d47b5d050427ca3cdac22d2
SHA256:7b108b27b80ded3ae980080788aff76efcc9846e42402f6f2ccb7bb1af1419c5
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64
  • NetworkMiner.exe (PID: 6380 cmdline: "C:\Users\user\Desktop\NetworkMiner.exe" MD5: 3AA776D3AE714443F7A8B226015F7B0C)
    • WerFault.exe (PID: 3452 cmdline: C:\Windows\system32\WerFault.exe -u -p 6380 -s 840 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: NetworkMiner.exeStatic PE information: certificate valid
Source: NetworkMiner.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Windows.Forms.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Windows.Forms.pdbH source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: mscorlib.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Drawing.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Drawing.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.pdbMZ source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: NetworkMiner.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: NetworkMiner.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: NetworkMiner.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: NetworkMiner.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: NetworkMiner.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: NetworkMiner.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: NetworkMiner.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: NetworkMiner.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: NetworkMiner.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: NetworkMiner.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: NetworkMiner.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: NetworkMiner.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: NetworkMiner.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: NetworkMiner.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: NetworkMiner.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: NetworkMiner.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: NetworkMiner.exeString found in binary or memory: http://www.netresec.com/?page=NetworkMiner-Writing
Source: NetworkMiner.exeString found in binary or memory: https://gchq.github.io/CyberChef/#input=
Source: NetworkMiner.exeString found in binary or memory: https://github.com/hdm/mac-ages
Source: NetworkMiner.exeString found in binary or memory: https://github.com/xnih/satori/
Source: NetworkMiner.exeString found in binary or memory: https://lcamtuf.coredump.cx/p0f3/
Source: NetworkMiner.exeString found in binary or memory: https://localhost=System.Net
Source: NetworkMiner.exeString found in binary or memory: https://netresec.com/?b=228fddfcUnable
Source: NetworkMiner.exeString found in binary or memory: https://sectigo.com/CPS0
Source: NetworkMiner.exeString found in binary or memory: https://sslbl.abuse.ch/blacklist/
Source: NetworkMiner.exeString found in binary or memory: https://team.vxstream-sandbox.com/
Source: NetworkMiner.exeString found in binary or memory: https://www.netresec.com/
Source: NetworkMiner.exeString found in binary or memory: https://www.netresec.com/?page=NetworkMiner
Source: C:\Users\user\Desktop\NetworkMiner.exeCode function: 0_2_00007FFD9B6404680_2_00007FFD9B640468
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6380 -s 840
Source: NetworkMiner.exe, ServerCert.csBase64 encoded string: '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'
Source: classification engineClassification label: clean3.winEXE@2/5@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6380
Source: C:\Users\user\Desktop\NetworkMiner.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\138a5d3f-01f4-4141-ae2a-c50e9cdf57d6Jump to behavior
Source: NetworkMiner.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: NetworkMiner.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\NetworkMiner.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeFile read: C:\Users\user\Desktop\NetworkMiner.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\NetworkMiner.exe "C:\Users\user\Desktop\NetworkMiner.exe"
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6380 -s 840
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: NetworkMiner.exeStatic PE information: certificate valid
Source: NetworkMiner.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: NetworkMiner.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Windows.Forms.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Windows.Forms.pdbH source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: mscorlib.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Drawing.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Drawing.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.pdbMZ source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.pdb source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERA0A2.tmp.dmp.3.dr
Source: Binary string: System.Core.ni.pdb source: WERA0A2.tmp.dmp.3.dr
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeMemory allocated: 21EE2B60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeMemory allocated: 21EFC450000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeQueries volume information: C:\Users\user\Desktop\NetworkMiner.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\NetworkMiner.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1561663 Sample: NetworkMiner.exe Startdate: 24/11/2024 Architecture: WINDOWS Score: 3 5 NetworkMiner.exe 2->5         started        process3 7 WerFault.exe 19 16 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
NetworkMiner.exe0%ReversingLabs
NetworkMiner.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://lcamtuf.coredump.cx/p0f3/0%Avira URL Cloudsafe
https://netresec.com/?b=228fddfcUnable0%Avira URL Cloudsafe
http://www.netresec.com/?page=NetworkMiner-Writing0%Avira URL Cloudsafe
https://team.vxstream-sandbox.com/0%Avira URL Cloudsafe
https://www.netresec.com/?page=NetworkMiner0%Avira URL Cloudsafe
https://www.netresec.com/0%Avira URL Cloudsafe
https://localhost=System.Net0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/xnih/satori/NetworkMiner.exefalse
    high
    https://team.vxstream-sandbox.com/NetworkMiner.exefalse
    • Avira URL Cloud: safe
    unknown
    https://sslbl.abuse.ch/blacklist/NetworkMiner.exefalse
      high
      https://lcamtuf.coredump.cx/p0f3/NetworkMiner.exefalse
      • Avira URL Cloud: safe
      unknown
      https://sectigo.com/CPS0NetworkMiner.exefalse
        high
        https://netresec.com/?b=228fddfcUnableNetworkMiner.exefalse
        • Avira URL Cloud: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yNetworkMiner.exefalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0NetworkMiner.exefalse
            high
            http://ocsp.sectigo.com0NetworkMiner.exefalse
              high
              https://www.netresec.com/?page=NetworkMinerNetworkMiner.exefalse
              • Avira URL Cloud: safe
              unknown
              https://github.com/hdm/mac-agesNetworkMiner.exefalse
                high
                http://www.netresec.com/?page=NetworkMiner-WritingNetworkMiner.exefalse
                • Avira URL Cloud: safe
                unknown
                https://www.netresec.com/NetworkMiner.exefalse
                • Avira URL Cloud: safe
                unknown
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#NetworkMiner.exefalse
                  high
                  https://gchq.github.io/CyberChef/#input=NetworkMiner.exefalse
                    high
                    http://upx.sf.netAmcache.hve.3.drfalse
                      high
                      https://localhost=System.NetNetworkMiner.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#NetworkMiner.exefalse
                        high
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1561663
                        Start date and time:2024-11-24 03:48:11 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 26s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:NetworkMiner.exe
                        Detection:CLEAN
                        Classification:clean3.winEXE@2/5@0/0
                        EGA Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 4
                        • Number of non-executed functions: 1
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.42.73.29
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target NetworkMiner.exe, PID 6380 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        TimeTypeDescription
                        21:49:40API Interceptor1x Sleep call for process: WerFault.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9568294407203376
                        Encrypted:false
                        SSDEEP:192:zcGfv2rB9A0/XoERa+z3kzuiF7Z24lO8p:znv2r7b/YERaAUzuiF7Y4lO8p
                        MD5:0097C370E15386B34A7F9D2A8FEA3D92
                        SHA1:9CD34DFF78AA38592C19357A3B1013052605918A
                        SHA-256:192B2845B44FCD19471B9D1299728A558D44108E8C59E6640E406DF85F62BCDF
                        SHA-512:A9F96823A4B50F5C28E53E83EB67D83253029F76B2AF261EE972E6D6D9EB4DA66F71A5FFBC16E848B0A3CCEA1EC0E454B39052065E7B5B5F0CA2BEAC2FF6B819
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.9.0.1.5.5.7.3.0.4.6.7.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.8.9.0.1.5.6.3.2.4.2.1.1.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.5.8.9.6.d.0.-.6.9.e.2.-.4.d.7.0.-.b.f.c.8.-.b.0.5.5.1.c.f.e.e.7.f.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.5.e.5.6.b.8.-.e.c.1.5.-.4.4.4.6.-.9.b.a.4.-.3.e.1.a.e.2.7.9.4.c.a.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.N.e.t.w.o.r.k.M.i.n.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.N.e.t.w.o.r.k.M.i.n.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.e.c.-.0.0.0.1.-.0.0.1.4.-.c.f.a.3.-.c.1.7.2.1.b.3.e.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.f.5.d.1.7.1.c.4.0.a.f.b.6.4.e.e.9.c.4.3.5.8.6.c.4.a.3.3.5.f.7.0.0.0.0.0.0.0.0.!.0.0.0.0.5.c.4.c.0.f.d.f.0.4.1.8.8.2.0.b.8.d.4.7.b.5.d.0.5.0.4.2.7.c.a.3.c.d.a.c.2.2.d.2.!.N.e.t.w.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Mini DuMP crash report, 16 streams, Sun Nov 24 02:49:15 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):331762
                        Entropy (8bit):3.293618333207347
                        Encrypted:false
                        SSDEEP:6144:kpBOo/eqXcZJa3Qgg0+cjEMkVYYbv8JQMTVg8+BFUt4AXDXq6:kjIqe6QV0xjUBJ
                        MD5:525E6697D76521D9CCAD1F817058FA52
                        SHA1:7D68CB805354FD12E0D87AD1792C434EE63ECEE6
                        SHA-256:B06DC3716857B2997C3CDA1C9B8E9578692CFD89812CF1B54C29E29B4219A75D
                        SHA-512:3D120CE3E2C51C5EBF88ADA4ACCFAE8E21DDD90B97BA0B9BD09678C1EED3FBC08D8DBFC1189ACD4822F1B21AFEF53AD1469CEB5E212EEC2C46B43061A7B7D039
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... .......+.Bg........................x...........$...L...........p............S..........l.......8...........T...........X!..............8...........$...............................................................................eJ..............Lw......................T...........*.Bg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8752
                        Entropy (8bit):3.704079242304077
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJPJt6Y9gTvpo0gmf9P4dbhprB89bAZEfaAm:R6lXJht6YKTvpo0gmft4dOA6fs
                        MD5:A4165DCE43A99F1D703A144AA3B0988A
                        SHA1:02EE4A9C8FED523D6E84F734DA1AA0ED421B768E
                        SHA-256:6296339A29C57F7C1CC71D12FEF992D4A4AB999658CA5D91416C2E92E8942B38
                        SHA-512:05CCFBF37D9E746B6CDF2635DD8D6FEF12671AEB05F6A1609F7597CC7B8396805801CB386D7834303E36BB5AA5ABA97E165E4EA90B366AFDE562ADC30262D197
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.8.0.<./.P.i.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4734
                        Entropy (8bit):4.48705881136961
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsEJg771I9UkaWpW8VYJYm8M4JcsF/myq85fNVsTdWod:uIjfCI7Zkb7VlJfm2sTdWod
                        MD5:42EF032DE286BD46005FDD171F592BC5
                        SHA1:377D608AC425893CD7D3A3DEF116E99D9092727F
                        SHA-256:6411E86C1C6A660EDBD49670B809E48A630EAEA575A6F306FB49D409C99BB2AD
                        SHA-512:968836D5CC076A1994B993A3D55B73BD2772DA924AF69CD5B1CD35AB02C7BABC719857185ECE2D173E05C96E1FD6E385D2D39FE9BCDBC1058292D7E3040010B7
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="601551" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.465624502381712
                        Encrypted:false
                        SSDEEP:6144:ZIXfpi67eLPU9skLmb0b4CWSPKaJG8nAgejZMMhA2gX4WABl0uNYdwBCswSbQF:qXD94CWlLZMM6YFHW+QF
                        MD5:AB8D28571B94FEF60B94250588814002
                        SHA1:6ACDA63B6704F8965941A287E3D550C0958922A3
                        SHA-256:9982B2F87316949CBA29ECAB68D97DF9E35F8E257F86AFA13433084F66908006
                        SHA-512:48241F7DB4CE3383105F9E57E45287867A7C259A48770C4CF5DE121FA087200390C693076BB6D981BE4DD73DCAB5326D5E15BFEA6DCDD5710A4A1087A42785DC
                        Malicious:false
                        Reputation:low
                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.As.>.............................................................................................................................................................................................................................................................................................................................................._9VG........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):5.865612115458026
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        • Win32 Executable (generic) a (10002005/4) 49.97%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:NetworkMiner.exe
                        File size:759'488 bytes
                        MD5:3aa776d3ae714443f7a8b226015f7b0c
                        SHA1:5c4c0fdf0418820b8d47b5d050427ca3cdac22d2
                        SHA256:7b108b27b80ded3ae980080788aff76efcc9846e42402f6f2ccb7bb1af1419c5
                        SHA512:0b08ea2241d65612496a74289964f23156b6390fe294a50909b3a9f0406e4c536600ed658fd64501517d72f753000e91500cb58e41381ffb4564820aafafea83
                        SSDEEP:6144:qzJ8KHRQXZYDm+dEEFxP5b7ErD0y4IWhhvd5PNXgM56d5PNXDHPF5YDhPNXjTUF:mNHRQapDFxP60x5PP65PhH96hPpUF
                        TLSH:7EF4F60533A41916E1FE4BBE646CB49447B6BE26A879D6DC28403CDE0FF2F889D51723
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....>Of.........."...0..j..........F.... ........@.. ....................................`................................
                        Icon Hash:0e233935664b170e
                        Entrypoint:0x498946
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x664F3E15 [Thu May 23 13:01:09 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Signature Valid:true
                        Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                        Signature Validation Error:The operation completed successfully
                        Error Number:0
                        Not Before, Not After
                        • 03/05/2023 20:00:00 03/08/2026 19:59:59
                        Subject Chain
                        • CN=Netresec AB, O=Netresec AB, S=Uppsala l\xe4n, C=SE
                        Version:3
                        Thumbprint MD5:4BA2EA4B6C3B04BA99C45BE50B3B692D
                        Thumbprint SHA-1:0A0B6FD5C2559380B67994A10780D4165848E896
                        Thumbprint SHA-256:380F6A3A06B2EF2A5FA572730E5C09E3C80190EC2C5F1F76022102A8E3A129B5
                        Serial:00B52F359BF7951F9A816711D3FEDB7469
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        movsb
                        add eax, dword ptr [eax]
                        add byte ptr [eax-4AFFFFFDh], ch
                        add eax, dword ptr [eax]
                        add bl, ah
                        add al, 00h
                        add al, ch
                        add al, 00h
                        add ah, ah
                        add al, 00h
                        add byte ptr [edi+0000006Fh], ch
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x988f40x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x1fac8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0xb6a000x2cc0.rsrc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x969700x96a00ccd245dedb723891f97e6fabcdbc61a0False0.3582290586099585data6.016226635663567IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0x9a0000x1fac80x1fc0075ec61ccd6a3c2c6996610c76beb974dFalse0.2806809793307087data4.493342769501592IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xba0000xc0x200a3c596f03ca9dbffee6f6bb0501a8042False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x9a1e00x368Device independent bitmap graphic, 16 x 32 x 24, image size 00.6869266055045872
                        RT_ICON0x9a5580xca8Device independent bitmap graphic, 32 x 64 x 24, image size 00.43364197530864196
                        RT_ICON0x9b2100x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 00.2749454743729553
                        RT_ICON0x9cec80x3228Device independent bitmap graphic, 64 x 128 x 24, image size 00.1292834890965732
                        RT_ICON0xa01000x70a8Device independent bitmap graphic, 96 x 192 x 24, image size 00.10915395284327323
                        RT_ICON0xa71b80xc828Device independent bitmap graphic, 128 x 256 x 24, image size 00.07078454332552693
                        RT_ICON0xb39f00x2701PNG image data, 192 x 192, 8-bit/color RGBA, non-interlaced0.9952929394091137
                        RT_ICON0xb61040x3376PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9860330954911188
                        RT_GROUP_ICON0xb948c0x76data0.7542372881355932
                        RT_VERSION0xb95140x3b4data0.43776371308016876
                        RT_MANIFEST0xb98d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:21:49:14
                        Start date:23/11/2024
                        Path:C:\Users\user\Desktop\NetworkMiner.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\NetworkMiner.exe"
                        Imagebase:0x21ee2770000
                        File size:759'488 bytes
                        MD5 hash:3AA776D3AE714443F7A8B226015F7B0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:3
                        Start time:21:49:15
                        Start date:23/11/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 6380 -s 840
                        Imagebase:0x7ff628d20000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2064798477.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd9b640000_NetworkMiner.jbxd
                          Similarity
                          • API ID:
                          • String ID: 6L_^
                          • API String ID: 0-1014247853
                          • Opcode ID: ed48d5ae5640622efdb1bb8f44f83ae2eef4fec929962cff2b6a0d0581205a33
                          • Instruction ID: df58f085dea9573de273faf04418f6b290f92ef8b3a6d2705215cdeec64cda8a
                          • Opcode Fuzzy Hash: ed48d5ae5640622efdb1bb8f44f83ae2eef4fec929962cff2b6a0d0581205a33
                          • Instruction Fuzzy Hash: 55412417B0E93A46E36973EDB8226FE7751DF817B2B494177D2ACCA0E78C08344542E2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2064798477.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd9b640000_NetworkMiner.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 066436b2fcf7c17a3e586b85f78959264a4fabb5bcd54cd7718997c8df8202d9
                          • Instruction ID: 5d01cfcb4650aab9514d27734a937800892771c5e2e44853a680e3b4782fc69d
                          • Opcode Fuzzy Hash: 066436b2fcf7c17a3e586b85f78959264a4fabb5bcd54cd7718997c8df8202d9
                          • Instruction Fuzzy Hash: D021D602F0F97B46F3A973E875316FD16529F41B64F5D81B6D06D8D1E78D0C395002A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2064798477.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd9b640000_NetworkMiner.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2c17ad9d4e20817c43bef8bfdc8d0c0d1f65b563b5aef605ec367f1fc23a209e
                          • Instruction ID: d6b887ae52a90cdbd6fbe9e9291eea7a3f73a622fb58e69953a6b6a2d729dd00
                          • Opcode Fuzzy Hash: 2c17ad9d4e20817c43bef8bfdc8d0c0d1f65b563b5aef605ec367f1fc23a209e
                          • Instruction Fuzzy Hash: 9221B301F0F97B4AF3A973E861316FD16625F44B64F4E81B6E06D8D1E78D0C355002A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2064798477.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd9b640000_NetworkMiner.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d90b708cf0be03387b525bc1af4286b0de8930d4b7b00ad392fd0ed21fd807b9
                          • Instruction ID: 40bed1acabf583e91073418de154683dbf293ccdf9b684f6234036a4f2642c55
                          • Opcode Fuzzy Hash: d90b708cf0be03387b525bc1af4286b0de8930d4b7b00ad392fd0ed21fd807b9
                          • Instruction Fuzzy Hash: 03E06DA041F7D00ED7165B3448256957FA0EF42200F8905EED4D9CF1A3C56C6149C752
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2064798477.00007FFD9B640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B640000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd9b640000_NetworkMiner.jbxd
                          Similarity
                          • API ID:
                          • String ID: ?L_^$>L
                          • API String ID: 0-3216487735
                          • Opcode ID: 86744f4cb826db7c9cd5ae899eebfbf6baa09c5457bcdf768a644b1b41f3e971
                          • Instruction ID: 9c6403ed93c397a171673a1a6faf3f7cb678577b76c18a3c42936a7053ead98c
                          • Opcode Fuzzy Hash: 86744f4cb826db7c9cd5ae899eebfbf6baa09c5457bcdf768a644b1b41f3e971
                          • Instruction Fuzzy Hash: 3402E217B0D57289E35633FD78625FE7B50DF823B5B4C86B7D2AD890D78D08208682E6