Windows
Analysis Report
setup-lightshot.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 40% |
Signatures
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Drops PE files
Tries to load missing DLLs
Creates files inside the system directory
Queries keyboard layouts
Stores files to the Windows start menu directory
Uses taskkill to terminate processes
Creates job files (autostart)
Found dropped PE file which has not been started or loaded
Creates a process in suspended mode (likely to inject code)
Searches for user specific document files
Enables debug privileges
Classification
Analysis Advice
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior |
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis |
- System is w10x64_ra
setup-lightshot.exe (PID: 6568 cmdline:
C:\Users\u ser\Deskto p\setup-li ghtshot.ex e MD5: A1F6923E771B4FF0DF9FEC9555F97C65) setup-lightshot.tmp (PID: 748 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-0KH Q7.tmp\set up-lightsh ot.tmp" /S L5="$70054 ,2148280,4 86912,C:\U sers\user\ Desktop\se tup-lights hot.exe" MD5: C6BFFD4DA620B07CB214F1BD8E7F21D2) taskkill.exe (PID: 6064 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m lightsho t.exe MD5: 07D18817187E87CFC6AB2A4670061AE0) conhost.exe (PID: 2480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F) taskkill.exe (PID: 3544 cmdline:
"taskkill. exe" /F /I M lightsho t.exe MD5: 07D18817187E87CFC6AB2A4670061AE0) conhost.exe (PID: 3688 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F) Lightshot.exe (PID: 6708 cmdline:
C:\Program Files (x8 6)\Skillbr ains\light shot\Light shot.exe MD5: 62EB961457DF016FA3949E9601A1A845) Lightshot.exe (PID: 6764 cmdline:
"C:\Progra m Files (x 86)\Skillb rains\ligh tshot\5.5. 0.7\Lights hot.exe" MD5: 1E1C83B9680029AD4A9F8D3B3AC93197) splwow64.exe (PID: 8160 cmdline:
C:\Windows \splwow64. exe 12288 MD5: 7FE20527607797A8DADE19838B8B1573) setupupdater.exe (PID: 3644 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-5U1 EQ.tmp\set upupdater. exe" /very silent MD5: 843D23F6AAB075A3C032B06D30CE9C5D) setupupdater.tmp (PID: 3424 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-K12 B0.tmp\set upupdater. tmp" /SL5= "$7035C,49 0430,12083 2,C:\Users \user\AppD ata\Local\ Temp\is-5U 1EQ.tmp\se tupupdater .exe" /ver ysilent MD5: 3613E29D2A7B90C1012EC676819CC1CD) net.exe (PID: 6368 cmdline:
"C:\Window s\system32 \net.exe" START SCHE DULE MD5: 2D09708A2B7FD7391E50A1A8E4915BD7) conhost.exe (PID: 6392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F) net1.exe (PID: 6284 cmdline:
C:\Windows \system32\ net1 START SCHEDULE MD5: DACD2D80B3942C3064B29BC0D0382EF3) Updater.exe (PID: 6744 cmdline:
"C:\Progra m Files (x 86)\Skillb rains\Upda ter\1.8.0. 0\Updater. exe" -runm ode=addsys task MD5: FBE0664E1C333E36E3CE73D8BD5CC8A1) Updater.exe (PID: 3496 cmdline:
C:\Program Files (x8 6)\Skillbr ains\Updat er\Updater .exe" -run mode=addpr oduct -inf o="C:\Prog ram Files (x86)\Skil lbrains\Up dater\info .xml MD5: 3EC8F4BD54EF439A8FAB6467122DA0C4) Updater.exe (PID: 3520 cmdline:
C:\Program Files (x8 6)\Skillbr ains\Updat er\1.8.0.0 \Updater.e xe" -runmo de=addprod uct -info= "C:\Progra m Files (x 86)\Skillb rains\Upda ter\info.x ml MD5: FBE0664E1C333E36E3CE73D8BD5CC8A1) Updater.exe (PID: 3684 cmdline:
C:\Program Files (x8 6)\Skillbr ains\Updat er\Updater .exe" -run mode=ping -url="http ://updater .prntscr.c om/getver/ updater?pi ng=true MD5: 3EC8F4BD54EF439A8FAB6467122DA0C4) Updater.exe (PID: 5184 cmdline:
C:\Program Files (x8 6)\Skillbr ains\Updat er\1.8.0.0 \Updater.e xe" -runmo de=ping -u rl="http:/ /updater.p rntscr.com /getver/up dater?ping =true MD5: FBE0664E1C333E36E3CE73D8BD5CC8A1) Updater.exe (PID: 3120 cmdline:
"C:\Progra m Files (x 86)\Skillb rains\Upda ter\update r.exe" -ru nmode=addt ask MD5: 3EC8F4BD54EF439A8FAB6467122DA0C4) Updater.exe (PID: 6336 cmdline:
"C:\Progra m Files (x 86)\Skillb rains\Upda ter\1.8.0. 0\updater. exe" -runm ode=addtas k MD5: FBE0664E1C333E36E3CE73D8BD5CC8A1) Updater.exe (PID: 1280 cmdline:
C:\Program Files (x8 6)\Skillbr ains\Updat er\updater .exe" -run mode=addpr oduct -inf o="C:\Prog ram Files (x86)\Skil lbrains\li ghtshot\in fo.xml MD5: 3EC8F4BD54EF439A8FAB6467122DA0C4) Updater.exe (PID: 6160 cmdline:
C:\Program Files (x8 6)\Skillbr ains\Updat er\1.8.0.0 \updater.e xe" -runmo de=addprod uct -info= "C:\Progra m Files (x 86)\Skillb rains\ligh tshot\info .xml MD5: FBE0664E1C333E36E3CE73D8BD5CC8A1) chrome.exe (PID: 3352 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://a pp.prntscr .com/thank you_deskto p.html#ins tall_sourc e=default MD5: 7BC7B4AEDC055BB02BCB52710132E9E1) chrome.exe (PID: 236 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2036 --fi eld-trial- handle=177 6,i,836891 3202449086 638,213717 0749968665 542,131072 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionTarget Prediction /prefetch :8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
- cleanup
⊘No yara matches
⊘No Sigma rule has matched
⊘No Snort rule has matched
- • Compliance
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
Click to jump to signature section
Show All Signature Results
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Window detected: |