Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AMFWReset.exe_

Overview

General Information

Sample name:AMFWReset.exe_
Analysis ID:1562584
MD5:bcbf521304a3f6513072c640a99d9f01
SHA1:1b542b20e95350735cdd8985dc3eca52eede751e
SHA256:65e932a660d5b123fb20131605beb94a1b77ed7d922c6c9fddcef8640e1e45ca

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Program does not show much activity (idle)
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • AMFWReset.exe (PID: 6488 cmdline: "C:\Users\user\Desktop\AMFWReset.exe" MD5: BCBF521304A3F6513072C640A99D9F01)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: AMFWReset.exe_Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: AMFWReset.exe_Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: AMFWReset.exe_Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean1.winEXE_@1/0@0/0
Source: AMFWReset.exe_Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\AMFWReset.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: amfwusers.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: mfcext.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: fwdbcore.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: mfc140.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: msvcp140.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: vcruntime140.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: vcruntime140.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\AMFWReset.exeSection loaded: vcruntime140.dll
Source: AMFWReset.exe_Static file information: File size 20915712 > 1048576
Source: AMFWReset.exe_Static PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x13e6800
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: AMFWReset.exe_Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: AMFWReset.exe_Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: AMFWReset.exe_Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: AMFWReset.exe_Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: AMFWReset.exe_Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: AMFWReset.exe_Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: AMFWReset.exe_Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562584
Start date and time:2024-11-25 18:26:55 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Sample name:AMFWReset.exe_
Detection:CLEAN
Classification:clean1.winEXE_@1/0@0/0
  • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: AMFWReset.exe_
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):0.309731044510036
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:AMFWReset.exe_
File size:20'915'712 bytes
MD5:bcbf521304a3f6513072c640a99d9f01
SHA1:1b542b20e95350735cdd8985dc3eca52eede751e
SHA256:65e932a660d5b123fb20131605beb94a1b77ed7d922c6c9fddcef8640e1e45ca
SHA512:da47d6e0a2eb554b8aec0ace505cf79cf35fdcf3e13ee9632302d119aacd0c23bbd2520d02a6727d38859a453d3b5a8185897f7f48a1357349ccd08c9d664d9c
SSDEEP:1536:E9N36Qr5RqlddWrPA5CeBs81necdQWO6Y20XmzmK1C7cmJjoL62ahDL:E9N335IPwev/Qn6+mi7DJsL6T5L
TLSH:9127C597F644C053EE669EB02F6CE1F08AABAF220F40548B36727BED4C742D7552856C
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............y...y...y.......y.')....y...}...y...z...y...|...y...x...y.;.x...y...x...y.;.|...y.;.y...y.;.....y.......y.;.{...y.Rich..y
Icon Hash:55ad95cbcdd69395
Entrypoint:0x403c06
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66F453B8 [Wed Sep 25 18:17:28 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:c50adb3dc1e05a8bc7e06f4e65a68b9b
Instruction
call 00007F83AD272BFCh
jmp 00007F83AD271DFAh
jmp 00007F83AD271FC5h
push 0000000Ch
push 0040A428h
call 00007F83AD272224h
mov byte ptr [ebp-19h], 00000000h
mov ebx, dword ptr [ebp+0Ch]
mov eax, ebx
mov edi, dword ptr [ebp+10h]
imul eax, edi
mov esi, dword ptr [ebp+08h]
add esi, eax
mov dword ptr [ebp+08h], esi
and dword ptr [ebp-04h], 00000000h
mov eax, edi
dec edi
mov dword ptr [ebp+10h], edi
test eax, eax
je 00007F83AD271FD7h
sub esi, ebx
mov dword ptr [ebp+08h], esi
mov ecx, dword ptr [ebp+14h]
call dword ptr [004064C4h]
mov ecx, esi
call dword ptr [ebp+14h]
jmp 00007F83AD271FA3h
mov al, 01h
mov byte ptr [ebp-19h], al
mov dword ptr [ebp-04h], FFFFFFFEh
call 00007F83AD271FE3h
mov ecx, dword ptr [ebp-10h]
mov dword ptr fs:[00000000h], ecx
pop ecx
pop edi
pop esi
pop ebx
leave
retn 0010h
mov edi, dword ptr [ebp+10h]
mov ebx, dword ptr [ebp+0Ch]
mov esi, dword ptr [ebp+08h]
mov al, byte ptr [ebp-19h]
test al, al
jne 00007F83AD271FCDh
push dword ptr [ebp+14h]
push edi
push ebx
push esi
call 00007F83AD271FF5h
ret
push ebp
mov ebp, esp
push esi
mov esi, dword ptr [ebp+08h]
push edi
mov edi, dword ptr [esi]
cmp dword ptr [edi], E06D7363h
je 00007F83AD271FC8h
pop edi
xor eax, eax
pop esi
pop ebp
ret
call 00007F83AD2732A9h
mov dword ptr [eax], edi
mov esi, dword ptr [esi+04h]
call 00007F83AD2732A5h
mov dword ptr [eax], esi
call 00007F83AD27335Bh
int3
push 00000018h
push 0000A448h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xa4a00x6f8.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0xab980x168.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x13e6650.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x13f40000xfe4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x95e80x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x96c00x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x95280x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x60000x4c4.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x46590x4800ce24f65ef22889cd14ad4000099616d1False0.4906141493055556data6.089025382181755IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x60000x5dd60x5e008f7d7d90ed738cd5aed4d81a6ba0c23aFalse0.3914561170212766data4.8686899613532955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xc0000xa180x400bdc3697bedf37e9f784d6d0ad21b54ccFalse0.2509765625data3.0050895690340647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xd0000x13e66500x13e6800c7e789080dc1cb33682d66c0b60a1992unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x13f40000xfe40x1000449ba34f358426bc0289c54ef39bca08False0.808837890625data6.487189663050039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xd3a00x9eb4a4Device independent bitmap graphic, 2573 x 2586 x 24, image size 10400892EnglishUnited States0.001010894775390625
RT_ICON0x9f88440x70a8Device independent bitmap graphic, 96 x 192 x 24, image size 28800EnglishUnited States0.18678918169209432
RT_ICON0x9ff8ec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.3261410788381743
RT_ICON0xa01e940xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200EnglishUnited States0.4719135802469136
RT_ICON0xa02b3c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.7845744680851063
RT_ICON0xa02fa40x9eb4a4Device independent bitmap graphic, 2573 x 2586 x 24, image size 10400892EnglishUnited States0.001010894775390625
RT_ICON0x13ee4480x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 10368EnglishUnited States0.27003149055283415
RT_ICON0x13f10f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.5071961620469083
RT_ICON0x13f1f980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.5866425992779783
RT_ICON0x13f28400x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4436416184971098
RT_DIALOG0x13f2da80x112dataEnglishUnited States0.6532846715328468
RT_DIALOG0x13f2ebc0x184dataEnglishUnited States0.5592783505154639
RT_STRING0x13f30400x46dataEnglishUnited States0.6714285714285714
RT_GROUP_ICON0x13f30880x92dataEnglishUnited States0.6575342465753424
RT_VERSION0x13f311c0x304dataEnglishUnited States0.4585492227979275
RT_MANIFEST0x13f34200x22fXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (499), with CRLF line terminatorsEnglishUnited States0.5295169946332737
DLLImport
AMFWUsers.dll??1CAMFWUsers@@UAE@XZ, ?LogAllOut@CAMFWUsers@@QAEHXZ, ?Read@CAMFWUsers@@QAEHPBDH@Z, ??0CAMFWUsers@@QAE@XZ
MFCExt.dllStrFormatPath
fwdbCore.dll??0XMLSerializer@@QAE@W4Mode@0@@Z, ?WriteValue@XMLSerializer@@QAEXABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z, ?WriteValue@XMLSerializer@@QAEXPBD@Z, ?WriteValue@XMLSerializer@@QAEXABH@Z, ?WriteValue@XMLSerializer@@QAEXAB_N@Z, ?WriteValue@XMLSerializer@@QAEXABM@Z, ?WriteValue@XMLSerializer@@QAEXABN@Z, ?WriteValue@XMLSerializer@@QAEXABJ@Z, ?ReadValue@XMLSerializer@@QAEXAAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z, ?ReadValue@XMLSerializer@@QAEXAAH@Z, ?ReadValue@XMLSerializer@@QAEXAA_N@Z, ?ReadValue@XMLSerializer@@QAEXAAM@Z, ?ReadValue@XMLSerializer@@QAEXAAN@Z, ?ReadValue@XMLSerializer@@QAEXAAJ@Z, ??1XMLSerializer@@QAE@XZ
mfc140.dll
KERNEL32.dllOutputDebugStringW, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, GetCurrentProcess, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, CreateEventW, WaitForSingleObjectEx, ResetEvent, SetEvent, LeaveCriticalSection, EnterCriticalSection, CloseHandle, LoadLibraryW, GetProcAddress, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameW, InitializeCriticalSectionAndSpinCount, SetLastError, OutputDebugStringA, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, GetLastError, DecodePointer, RaiseException
USER32.dllGetSystemMenu, UnregisterClassA, EnableWindow, IsIconic, GetSystemMetrics, LoadIconW, AppendMenuA, GetClientRect, SendMessageA, DrawIcon
SHELL32.dllSHGetSpecialFolderPathA
OLEAUT32.dllSysFreeString
MSVCP140.dll?_Xlength_error@std@@YAXPBD@Z
VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, _purecall, __CxxFrameHandler3, memcpy, __std_terminate, memset, __current_exception, __current_exception_context, _CxxThrowException, _except_handler4_common, __std_type_info_destroy_list, memmove
api-ms-win-crt-runtime-l1-1-0.dll_errno, _invalid_parameter_noinfo, _controlfp_s, terminate, _configure_narrow_argv, _register_thread_local_exe_atexit_callback, _seh_filter_dll, _initialize_narrow_environment, _exit, exit, _initterm_e, _initterm, _get_narrow_winmain_command_line, _c_exit, _set_app_type, _seh_filter_exe, _cexit, _crt_at_quick_exit, _crt_atexit, _execute_onexit_table, _register_onexit_function, _initialize_onexit_table, _invalid_parameter_noinfo_noreturn
api-ms-win-crt-string-l1-1-0.dll_strdup
api-ms-win-crt-heap-l1-1-0.dllfree, _set_new_mode, _recalloc
api-ms-win-crt-filesystem-l1-1-0.dll_access, _mkdir
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_setmbcp, _configthreadlocale
NameOrdinalAddress
??0CFWXMLSerializer@@QAE@W4Mode@XMLSerializer@@@Z10x401360
??1CFWCmdActionScript@@UAE@XZ20x401460
??1CFWXMLSerializer@@QAE@XZ30x4014e0
??4CFWXMLFile@@QAEAAV0@$$QAV0@@Z40x401550
??4CFWXMLFile@@QAEAAV0@ABV0@@Z50x401560
??4CFWXMLSerializer@@QAEAAV0@$$QAV0@@Z60x401570
??4CFWXMLSerializer@@QAEAAV0@ABV0@@Z70x401590
??4fwBaseUI@@QAEAAV0@ABV0@@Z80x4015b0
?ReadValue@CFWXMLSerializer@@QAEXAAH@Z90x401820
?ReadValue@CFWXMLSerializer@@QAEXAAJ@Z100x401830
?ReadValue@CFWXMLSerializer@@QAEXAAM@Z110x401840
?ReadValue@CFWXMLSerializer@@QAEXAAN@Z120x401850
?ReadValue@CFWXMLSerializer@@QAEXAAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z130x401860
?ReadValue@CFWXMLSerializer@@QAEXAA_N@Z140x401870
?SetEmptyBOOLValue@CFWXMLSerializer@@QAEXAAH@Z150x401b10
?SetEmptyValue@CFWXMLSerializer@@QAEXAAH@Z160x401b20
?SetEmptyValue@CFWXMLSerializer@@QAEXAAJ@Z170x401b30
?SetEmptyValue@CFWXMLSerializer@@QAEXAAK@Z180x401b40
?SetEmptyValue@CFWXMLSerializer@@QAEXAAM@Z190x401b50
?SetEmptyValue@CFWXMLSerializer@@QAEXAAN@Z200x401b60
?SetEmptyValue@CFWXMLSerializer@@QAEXAAV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@@Z210x401b80
?SetEmptyValue@CFWXMLSerializer@@QAEXAAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z220x401ba0
?SetEmptyValue@CFWXMLSerializer@@QAEXAA_N@Z230x401bd0
?WriteValue@CFWXMLSerializer@@QAEXABH@Z240x401c20
?WriteValue@CFWXMLSerializer@@QAEXABJ@Z250x401c30
?WriteValue@CFWXMLSerializer@@QAEXABM@Z260x401c40
?WriteValue@CFWXMLSerializer@@QAEXABN@Z270x401c50
?WriteValue@CFWXMLSerializer@@QAEXABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z280x401c60
?WriteValue@CFWXMLSerializer@@QAEXAB_N@Z290x401c70
?WriteValue@CFWXMLSerializer@@QAEXPBD@Z300x401c80
Language of compilation systemCountry where language is spokenMap
EnglishUnited States