Edit tour

Windows Analysis Report
smsniff.exe

Overview

General Information

Sample Name:smsniff.exe
Analysis ID:1289971
MD5:6cb40e6f199e62283df07f41b396b21a
SHA1:92b53f52722778baa577e24dae2f951b258f60cd
SHA256:d6831d36184ae91aae56a7fb7c91d7f75339429fbe5a1a0df8985d4884dcc217
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to modify clipboard data
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Extensive use of GetProcAddress (often used to hide API calls)
Tries to load missing DLLs
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to detect virtual machines (STR)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality to query network adapater information
Contains functionality for read data from the clipboard

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • smsniff.exe (PID: 6136 cmdline: C:\Users\user\Desktop\smsniff.exe MD5: 6CB40E6F199E62283DF07F41B396B21A)
  • MpSigStub.exe (PID: 6996 cmdline: C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exe /stub 1.1.23080.1001 /payload 1.395.169.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-25f62fea.exe /q WD MD5: 5598A4C4A5F166060BDE5F6983522F44)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: smsniff.exeReversingLabs: Detection: 32%
Source: smsniff.exeVirustotal: Detection: 38%Perma Link
Source: smsniff.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: smsniff.exeStatic PE information: certificate valid
Source: Binary string: MpSigStub.pdbGCTL source: MpSigStub.exe, 00000001.00000000.6300605200.00007FF60AE61000.00000002.00000001.01000000.00000005.sdmp, MpSigStub.exe, 00000001.00000003.6443423826.000001F50B761000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: MpClient.pdbGCTL source: MpSigStub.exe, 00000001.00000003.6317570327.000001F50B75C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdbo source: smsniff.exe
Source: Binary string: c:\Projects\VS2005\smsniff\Release\smsniff.pdb source: smsniff.exe, smsniff.exe, 00000000.00000002.7561806427.0000000000401000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: MpSigStub.pdb source: MpSigStub.exe, 00000001.00000000.6300605200.00007FF60AE61000.00000002.00000001.01000000.00000005.sdmp, MpSigStub.exe, 00000001.00000003.6443423826.000001F50B761000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: MpClient.pdb source: MpSigStub.exe, 00000001.00000003.6317570327.000001F50B75C000.00000004.00000020.00020000.00000000.sdmp
Source: smsniff.exeString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
Source: smsniff.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: smsniff.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: smsniff.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: smsniff.exe, 00000000.00000002.7561806427.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.nirsoft.net/

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00406774 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0040C806 OpenClipboard,GetLastError,DeleteFileA,
Source: smsniff.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: wpcap.dll
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: npptools.dll
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: nmapi.dll
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: npptools.dll
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: nmapi.dll
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: npptools.dll
Source: C:\Users\user\Desktop\smsniff.exeSection loaded: nmapi.dll
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0040D5E6
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0041583E
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00415CF5
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0041650C
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00417619
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00415708
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0041732F
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00417FCA
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00417BEE
Source: C:\Users\user\Desktop\smsniff.exeCode function: String function: 004197A2 appears 34 times
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_004015DF NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00401699 NtdllDefWindowProc_A,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00411EC3: CreateEventA,memset,memset,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,
Source: smsniff.exeStatic PE information: Section: UPX1 ZLIB complexity 0.990234375
Source: smsniff.exeReversingLabs: Detection: 32%
Source: smsniff.exeVirustotal: Detection: 38%
Source: C:\Users\user\Desktop\smsniff.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\smsniff.exe C:\Users\user\Desktop\smsniff.exe
Source: unknownProcess created: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exe C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exe /stub 1.1.23080.1001 /payload 1.395.169.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-25f62fea.exe /q WD
Source: C:\Users\user\Desktop\smsniff.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{304CE942-6E39-40D8-943A-B913C40C9CD4}\InprocServer32
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00404A54 FindResourceA,LoadResource,LockResource,_memicmp,memcpy,_mbscpy,
Source: C:\Users\user\Desktop\smsniff.exeFile created: C:\Users\user\AppData\Local\Temp\snfD2B0.tmpJump to behavior
Source: smsniff.exeString found in binary or memory: /LoadConfig
Source: smsniff.exeString found in binary or memory: 3http://crl.usertrust.com/AddTrustExternalCARoot.crl05
Source: classification engineClassification label: clean39.spyw.winEXE@2/2@0/0
Source: C:\Users\user\Desktop\smsniff.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\smsniff.exeFile opened: C:\Users\user\Desktop\smsniff.cfg
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: smsniff.exeStatic PE information: certificate valid
Source: smsniff.exeStatic PE information: section name: RT_CURSOR
Source: smsniff.exeStatic PE information: section name: RT_BITMAP
Source: smsniff.exeStatic PE information: section name: RT_ICON
Source: smsniff.exeStatic PE information: section name: RT_MENU
Source: smsniff.exeStatic PE information: section name: RT_DIALOG
Source: smsniff.exeStatic PE information: section name: RT_STRING
Source: smsniff.exeStatic PE information: section name: RT_ACCELERATOR
Source: smsniff.exeStatic PE information: section name: RT_GROUP_ICON
Source: Binary string: MpSigStub.pdbGCTL source: MpSigStub.exe, 00000001.00000000.6300605200.00007FF60AE61000.00000002.00000001.01000000.00000005.sdmp, MpSigStub.exe, 00000001.00000003.6443423826.000001F50B761000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: MpClient.pdbGCTL source: MpSigStub.exe, 00000001.00000003.6317570327.000001F50B75C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdbo source: smsniff.exe
Source: Binary string: c:\Projects\VS2005\smsniff\Release\smsniff.pdb source: smsniff.exe, smsniff.exe, 00000000.00000002.7561806427.0000000000401000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: MpSigStub.pdb source: MpSigStub.exe, 00000001.00000000.6300605200.00007FF60AE61000.00000002.00000001.01000000.00000005.sdmp, MpSigStub.exe, 00000001.00000003.6443423826.000001F50B761000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: MpClient.pdb source: MpSigStub.exe, 00000001.00000003.6317570327.000001F50B75C000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00419AD1 push ecx; ret
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00419B10 push eax; ret
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00419B10 push eax; ret
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0041106B LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00414E7B FreeLibrary,memset,memset,GetSystemDirectoryA,strlen,strlen,memset,strlen,strlen,GetCurrentDirectoryA,SetCurrentDirectoryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,SetCurrentDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\smsniff.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00411A84 str word ptr [ebp-04h]
Source: C:\Users\user\Desktop\smsniff.exeCode function: GetAdaptersInfo,GetAdaptersInfo,memset,memcmp,memset,memcmp,_mbscpy,sprintf,strcmp,GlobalFree,
Source: C:\Users\user\Desktop\smsniff.exeCode function: GetAdaptersInfo,GetAdaptersInfo,
Source: C:\Users\user\Desktop\smsniff.exeCode function: GetAdaptersInfo,memset,GetAdaptersInfo,??3@YAXPAX@Z,memset,GetIfTable,memset,memcmp,_snprintf,RegCloseKey,FreeLibrary,
Source: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exeProcess information queried: ProcessInformation
Source: smsniff.exe, 00000000.00000002.7562363530.000000000062D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0041106B LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_004123FD ??2@YAPAXI@Z,memcpy,??3@YAXPAX@Z,??2@YAPAXI@Z,memcpy,??3@YAXPAX@Z,??2@YAPAXI@Z,memcpy,memcpy,memcpy,??3@YAXPAX@Z,??2@YAPAXI@Z,memcpy,memcpy,??3@YAXPAX@Z,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,
Source: C:\Users\user\Desktop\smsniff.exeCode function: GetLocaleInfoA,GetLocaleInfoA,atoi,GetLocaleInfoA,atoi,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,atoi,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_00406BE1 GetVersionExA,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0040293B memcpy,memcpy,memcpy,GetLocalTime,SystemTimeToFileTime,PostMessageA,
Source: C:\Users\user\Desktop\smsniff.exeCode function: 0_2_0041408B socket,htons,bind,WSAAsyncSelect,setsockopt,WSAIoctl,PostMessageA,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol11
Clipboard Data
Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)21
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
Software Packing
LSA Secrets1
System Network Configuration Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1289971 Sample: smsniff.exe Startdate: 11/08/2023 Architecture: WINDOWS Score: 0 10 Multi AV Scanner detection for submitted file 2->10 5 smsniff.exe 1 2->5         started        8 MpSigStub.exe 2->8         started        process3 signatures4 12 Contains functionality to modify clipboard data 5->12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
smsniff.exe32%ReversingLabsWin32.PUA.Htool
smsniff.exe39%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.nirsoft.net/smsniff.exe, 00000000.00000002.7561806427.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
    high
    No contacted IP infos
    Joe Sandbox Version:38.0.0 Beryl
    Analysis ID:1289971
    Start date and time:2023-08-11 13:35:13 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 48s
    Hypervisor based Inspection enabled:false
    Report type:light
    Cookbook file name:defaultwindowsinteractivecookbook.jbs
    Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample file name:smsniff.exe
    Detection:CLEAN
    Classification:clean39.spyw.winEXE@2/2@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 99.7% (good quality ratio 95.8%)
    • Quality average: 82.2%
    • Quality standard deviation: 26.5%
    HCA Information:
    • Successful, ratio: 95%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, HxTsr.exe, RuntimeBroker.exe, ShellExperienceHost.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Skipping network analysis since amount of network traffic is too extensive
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\smsniff.exe
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.182005814760214
    Encrypted:false
    SSDEEP:3:MpB:U
    MD5:2C657ECCF4EA860109792FB8890ACA13
    SHA1:7EEA3EBCA5AE6E23DC8D99BA78E14A450DBB0D7A
    SHA-256:7DB79D596010F13D6B89646A4A9E13834B84957BD3A35BDBCC52A85A91E36CE3
    SHA-512:69BD90768BA0B092A035F992EECA2932362BF00E26AF123008267F713812DFD4FC65C851EFE08E87736E846F9872E9A2B07AF93663869D0527088DD7CA7ED157
    Malicious:false
    Reputation:low
    Preview:SMSNF200......
    Process:C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:modified
    Size (bytes):17166
    Entropy (8bit):3.4997481970329396
    Encrypted:false
    SSDEEP:192:H88GJBmCrrg8YWgcYXWoZxbiugsbBKxiGSDh6piGg2ZY5q:H88cACbHaWoZxbigNKxVSl6pVg2ZY5q
    MD5:701AAF7B1CC18CFA86BFB05CD9FB9B25
    SHA1:E66F12FAF666AD37348E326CAB2CDB7B0A766678
    SHA-256:6D9143DCD28E2B2037DCA65DDD44C5D76B4A6EC7069844829773E236F5BCAB6D
    SHA-512:B9EAA497590E460987B3BF96ED908EFAB7EF014DBE032AA261B4A34F4D0202D45600B99152F189DA5673AF973146F8434C999C205448A8D85F2FB571BFF02A6A
    Malicious:false
    Reputation:low
    Preview:..-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....S.t.a.r.t. .t.i.m.e.:. .2.0.2.1.-.0.6.-.0.7. .2.0.:.2.9.:.3.3.Z.....P.r.o.c.e.s.s.:. .2.0.8.4...1.d.7.5.b.d.b.d.3.6.1.e.c.a.b.....C.o.m.m.a.n.d.:. ./.s.t.u.b. .1...1...1.7.8.0.0...4. ./.p.a.y.l.o.a.d. .1...3.4.1...2.3.9...0. ./.p.r.o.g.r.a.m. .C.:.\.W.i.n.d.o.w.s.\.S.E.R.V.I.C.~.1.\.N.E.T.W.O.R.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.m.p.a.m.-.e.6.3.1.9.c.d.5...e.x.e. ./.q. .W.D.....A.d.m.i.n.i.s.t.r.a.t.o.r.:. .n.o.....V.e.r.s.i.o.n.:. .1...1...1.7.8.0.0...4.........=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=. .P.r.o.d.u.c.t.S.e.a.r.c.h. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=......... . . . . . . . . . . . . . . .M.i.c.r.o.s.o.f.t. .W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r. .(.R.S.1.+.).:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..... . . . . . . .S.t.a.t.u.s.:.
    File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
    Entropy (8bit):7.740098126153553
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.39%
    • UPX compressed Win32 Executable (30571/9) 0.30%
    • Win32 EXE Yoda's Crypter (26571/9) 0.26%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    File name:smsniff.exe
    File size:91'344 bytes
    MD5:6cb40e6f199e62283df07f41b396b21a
    SHA1:92b53f52722778baa577e24dae2f951b258f60cd
    SHA256:d6831d36184ae91aae56a7fb7c91d7f75339429fbe5a1a0df8985d4884dcc217
    SHA512:74de59344a66293272c5398f4bcfacb7fa36df87b6933127a92eef5f1ae38fe29e0de72afa1e7b3b9c8a441538d5252fbfed5615ba3f5a6443714d69c3090815
    SSDEEP:1536:FSBsNZOBTDeib6daQP6I6GBMb6ntShZhvPkQIxgrfRLOb33WfhnZ/dmTbi8:oBs+besA5A6tShZJMdNHWpZ/ED
    TLSH:5893F1CBDF14AF40C9918D3045ABDA399E31B5823938C66B3A99C5AE7CE13E07E4512D
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........x...+...+...+7..+...+...+...+...+...+...+...+...+...+7..+...+.C.+...+.C.+...+.C.+...+Rich...+........................PE..L..
    Icon Hash:65a39d7c3c199330
    Entrypoint:0x43a620
    Entrypoint Section:UPX1
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x5B7A7CEE [Mon Aug 20 08:33:50 2018 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:2905e1ef7316c93f009eceffa56624e1
    Signature Valid:true
    Signature Issuer:CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 9/12/2014 2:00:00 AM 9/13/2019 1:59:59 AM
    Subject Chain
    • CN=Nir Sofer, O=Nir Sofer, STREET=5 Hashoshanim st., L=Ramat Gan, S=Gush Dan, PostalCode=52583, C=IL
    Version:3
    Thumbprint MD5:20080320FBD46305C5578175AB0A9EAA
    Thumbprint SHA-1:A80BAEDA573DF2712F23A41857E648475EAC9BA5
    Thumbprint SHA-256:EAFCB355770E7E64E5559482605D7801F30FEE6B159BF91196D5C9DC6B2419AC
    Serial:1AF0660E837A35A2CD92EC613FC15DB8
    Instruction
    pushad
    mov esi, 00429000h
    lea edi, dword ptr [esi-00028000h]
    push edi
    jmp 00007F96A495F8BDh
    nop
    mov al, byte ptr [esi]
    inc esi
    mov byte ptr [edi], al
    inc edi
    add ebx, ebx
    jne 00007F96A495F8B9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jc 00007F96A495F89Fh
    mov eax, 00000001h
    add ebx, ebx
    jne 00007F96A495F8B9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc eax, eax
    add ebx, ebx
    jnc 00007F96A495F8A1h
    jne 00007F96A495F8BBh
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jnc 00007F96A495F896h
    xor ecx, ecx
    sub eax, 03h
    jc 00007F96A495F8BFh
    shl eax, 08h
    mov al, byte ptr [esi]
    inc esi
    xor eax, FFFFFFFFh
    je 00007F96A495F926h
    mov ebp, eax
    add ebx, ebx
    jne 00007F96A495F8B9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    add ebx, ebx
    jne 00007F96A495F8B9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    jne 00007F96A495F8D2h
    inc ecx
    add ebx, ebx
    jne 00007F96A495F8B9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    add ebx, ebx
    jnc 00007F96A495F8A1h
    jne 00007F96A495F8BBh
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jnc 00007F96A495F896h
    add ecx, 02h
    cmp ebp, FFFFF300h
    adc ecx, 01h
    lea edx, dword ptr [edi+ebp]
    cmp ebp, FFFFFFFCh
    jbe 00007F96A495F8C1h
    mov al, byte ptr [edx]
    inc edx
    mov byte ptr [edi], al
    inc edi
    dec ecx
    jne 00007F96A495F8A9h
    jmp 00007F96A495F818h
    nop
    mov eax, dword ptr [edx]
    add edx, 04h
    mov dword ptr [edi], eax
    add edi, 04h
    sub ecx, 04h
    jnbe 00007F96A495F8A3h
    add edi, ecx
    jmp 00007F96A496F801h
    Programming Language:
    • [RES] VS2005 build 50727
    • [LNK] VS2005 build 50727
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x3c6cc0x284.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000x16cc.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x136000x2ed0UPX0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000x280000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10x290000x120000x11800False0.990234375data7.914318302329637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x3b0000x20000x1a00False0.35366586538461536data3.81543129428558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    BIN0x319d80xdecdataHebrewIsrael1.0030864197530864
    BIN0x327c40x29ddataHebrewIsrael1.0164424514200299
    RT_CURSOR0x32a640x134dataEnglishUnited States1.0357142857142858
    RT_CURSOR0x32b980x134OpenPGP Public KeyEnglishUnited States1.0357142857142858
    RT_BITMAP0x32ccc0x628dataHebrewIsrael1.006979695431472
    RT_BITMAP0x332f40xd8dataEnglishUnited States1.0509259259259258
    RT_BITMAP0x333cc0xd8dataEnglishUnited States1.0509259259259258
    RT_ICON0x3b9dc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640HebrewIsrael0.4583333333333333
    RT_ICON0x3bcc80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192HebrewIsrael0.5878378378378378
    RT_ICON0x3bdf40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192HebrewIsrael0.39864864864864863
    RT_ICON0x3bf200x128Device independent bitmap graphic, 16 x 32 x 4, image size 192HebrewIsrael0.24662162162162163
    RT_ICON0x3c04c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192HebrewIsrael0.39864864864864863
    RT_MENU0x33c2c0xa5cdataEnglishUnited States1.0041478129713424
    RT_MENU0x346880x32edataEnglishUnited States1.0135135135135136
    RT_MENU0x349b80xa0dataHebrewIsrael1.06875
    RT_DIALOG0x34a580xa2dataHebrewIsrael1.0679012345679013
    RT_DIALOG0x34afc0x296dataHebrewIsrael1.0166163141993958
    RT_DIALOG0x34d940x4ccdataHebrewIsrael1.008957654723127
    RT_DIALOG0x352600xaadataHebrewIsrael1.0647058823529412
    RT_DIALOG0x3530c0xc4edataHebrewIsrael1.0034920634920634
    RT_DIALOG0x35f5c0x1cedataHebrewIsrael1.0238095238095237
    RT_DIALOG0x3612c0x118dataHebrewIsrael1.0392857142857144
    RT_DIALOG0x362440x33aOpenPGP Secret KeyEnglishUnited States1.013317191283293
    RT_STRING0x365800x390OpenPGP Secret KeyEnglishUnited States1.0120614035087718
    RT_STRING0x369100x64cOpenPGP Public KeyEnglishUnited States1.0068238213399503
    RT_STRING0x36f5c0x58dataEnglishUnited States1.125
    RT_STRING0x36fb40x2adataEnglishUnited States1.2619047619047619
    RT_STRING0x36fe00x11adataEnglishUnited States1.0390070921985815
    RT_STRING0x370fc0x34dataEnglishUnited States1.2115384615384615
    RT_STRING0x371300x64dataEnglishUnited States1.11
    RT_STRING0x371940x7adataEnglishUnited States1.0901639344262295
    RT_STRING0x372100xb2dataEnglishUnited States0.8707865168539326
    RT_STRING0x372c40x4cdataEnglishUnited States1.0
    RT_STRING0x373100xa8dataEnglishUnited States0.8869047619047619
    RT_STRING0x373b80x1b6dataEnglishUnited States1.004566210045662
    RT_STRING0x375700x96dataEnglishUnited States1.0733333333333333
    RT_STRING0x376080x3cdataEnglishUnited States1.0666666666666667
    RT_ACCELERATOR0x376440xd0dataHebrewIsrael0.8461538461538461
    RT_GROUP_CURSOR0x377140x14dataEnglishUnited States1.35
    RT_GROUP_CURSOR0x377280x14dataEnglishUnited States1.4
    RT_GROUP_ICON0x3c1780x22dataHebrewIsrael1.0294117647058822
    RT_GROUP_ICON0x3c1a00x14dataHebrewIsrael1.25
    RT_GROUP_ICON0x3c1b80x14dataHebrewIsrael1.25
    RT_GROUP_ICON0x3c1d00x14dataHebrewIsrael1.25
    RT_VERSION0x3c1e80x2c0dataHebrewIsrael0.48011363636363635
    RT_MANIFEST0x3c4ac0x220ASCII text, with very long lines (404), with CRLF line terminatorsEnglishUnited States0.5588235294117647
    DLLImport
    KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
    ADVAPI32.dllRegCloseKey
    COMCTL32.dll
    comdlg32.dllFindTextA
    GDI32.dllPatBlt
    msvcrt.dllatoi
    ole32.dllCoInitialize
    OLEAUT32.dllSysFreeString
    SHELL32.dllShellExecuteA
    USER32.dllGetDC
    WS2_32.dllgetservbyport
    Language of compilation systemCountry where language is spokenMap
    HebrewIsrael
    EnglishUnited States
    Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.
    Target ID:0
    Start time:13:35:50
    Start date:11/08/2023
    Path:C:\Users\user\Desktop\smsniff.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\smsniff.exe
    Imagebase:0x400000
    File size:91'344 bytes
    MD5 hash:6CB40E6F199E62283DF07F41B396B21A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:13:35:50
    Start date:11/08/2023
    Path:C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\AC410D8F-FBEA-4240-9C3C-945DD2722071\MpSigStub.exe /stub 1.1.23080.1001 /payload 1.395.169.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-25f62fea.exe /q WD
    Imagebase:0x7ff60adb0000
    File size:918'960 bytes
    MD5 hash:5598A4C4A5F166060BDE5F6983522F44
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    No disassembly