Windows
Analysis Report
WirelessKeyView.exe
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
WirelessKeyView.exe (PID: 5740 cmdline:
C:\Users\u ser\Deskto p\Wireless KeyView.ex e MD5: F577DF72C3104DF7158C898B64CA53DB) WirelessKeyView.exe (PID: 3288 cmdline:
"C:\Users\ user\Deskt op\Wireles sKeyView.e xe" /GetKe ys Wireles sKeyView00 4AA08D MD5: F577DF72C3104DF7158C898B64CA53DB)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
ChromePass | Detects a tool used by APT groups - file ChromePass.exe | Florian Roth |
|
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
System Summary |
---|
Source: | Matched rule: |
Source: | Matched rule: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: |
Source: | Process token adjusted: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 1 System Information Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
35% | ReversingLabs | Win64.Hacktool.NirSoftPT |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1299655 |
Start date and time: | 2023-08-29 17:59:44 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip) |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample file name: | WirelessKeyView.exe |
Detection: | MAL |
Classification: | mal56.winEXE@2/0@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): svchost.exe - Excluded domains from analysis
(whitelisted): login.live.com - VT rate limit hit for: Wirele
ssKeyView.exe
File type: | |
Entropy (8bit): | 6.23529507034848 |
TrID: |
|
File name: | WirelessKeyView.exe |
File size: | 262'656 bytes |
MD5: | f577df72c3104df7158c898b64ca53db |
SHA1: | 108266bda26eaa3c1b7aa06ef9dde376dde88bb5 |
SHA256: | e8c208fb8f488971975c0023256c5a955578a1b5299a45d627a4e2d7f8fb850e |
SHA512: | 5a89ea4d6b7fe05e1ea2cc8b51a25e68fb4dbda48a805a77c01e049ebab70412664fce5d611e3f35e64587e269105dc15afdfe0eed4d7719205ac96d1ec52428 |
SSDEEP: | 6144:w1w0T70GyPvckzKUOrk/+YW6mhrZOYzYHajVJ:w1w0T71yPTMgGh/hrX3jL |
TLSH: | 19445B46A3A84CE5E8ABD279CC938626D6B17C450339D7DB1760CE574F333E0A93A712 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........HF.I)(RI)(RI)(Rn.URB)(R..VRH)(Rn.FRz)(Rn.ER:)(R?.SRX)(RI))R`((Rn.ZRn)(Rn.TRH)(Rn.PRH)(RRichI)(R................PE..d...X.``... |
Icon Hash: | 694d6d2c4ee4c538 |
Entrypoint: | 0x14001fba0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6060A658 [Sun Mar 28 15:52:56 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 001d0612d840fc62d527725b32aa5804 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F2B68E512ACh |
dec eax |
add esp, 28h |
jmp 00007F2B68E4A7D3h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov dword ptr [esp+20h], ebx |
mov dword ptr [esp+08h], ecx |
push edi |
dec eax |
sub esp, 20h |
dec eax |
mov ecx, edx |
dec eax |
mov ebx, edx |
call 00007F2B68E521DCh |
mov ecx, dword ptr [ebx+18h] |
test cl, FFFFFF82h |
dec eax |
arpl ax, di |
jne 00007F2B68E4AADFh |
call 00007F2B68E4BFCCh |
mov dword ptr [eax], 00000009h |
or dword ptr [ebx+18h], 20h |
or eax, FFFFFFFFh |
dec eax |
mov ebx, dword ptr [esp+48h] |
dec eax |
add esp, 20h |
pop edi |
ret |
test cl, 00000040h |
je 00007F2B68E4AADFh |
call 00007F2B68E4BFAAh |
mov dword ptr [eax], 00000022h |
or dword ptr [ebx+18h], 20h |
or eax, FFFFFFFFh |
dec eax |
mov ebx, dword ptr [esp+48h] |
dec eax |
add esp, 20h |
pop edi |
ret |
dec eax |
mov dword ptr [esp+40h], esi |
xor esi, esi |
test cl, 00000001h |
je 00007F2B68E4AADBh |
test cl, 00000010h |
mov dword ptr [ebx+08h], esi |
je 00007F2B68E4AB63h |
dec eax |
mov eax, dword ptr [ebx+10h] |
and ecx, FFFFFFFEh |
dec eax |
mov dword ptr [ebx], eax |
mov dword ptr [ebx+18h], ecx |
mov eax, dword ptr [ebx+18h] |
mov dword ptr [ebx+08h], esi |
and eax, FFFFFFEFh |
or eax, 02h |
test eax, 0000010Ch |
mov dword ptr [ebx+18h], eax |
jne 00007F2B68E4AAF1h |
call 00007F2B68E51EF2h |
dec eax |
add eax, 30h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x351fc | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x40000 | 0x5ed0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x3e000 | 0x1e90 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2f000 | 0x7e0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2db8a | 0x2dc00 | False | 0.5380432462431693 | zlib compressed data | 6.361926281929707 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2f000 | 0x7b9a | 0x7c00 | False | 0.42165448588709675 | data | 5.589028486157532 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x37000 | 0x6418 | 0x2600 | False | 0.29461348684210525 | data | 3.0769714251114997 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x3e000 | 0x1e90 | 0x2000 | False | 0.487548828125 | data | 5.331184093754899 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x40000 | 0x5ed0 | 0x6000 | False | 0.3230794270833333 | data | 4.769163358507502 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x40700 | 0x134 | data | English | United States | 0.40584415584415584 |
RT_CURSOR | 0x40834 | 0x134 | AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\360\037\377\377\370?\377\377\374\177\377\377\376\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd | English | United States | 0.3344155844155844 |
RT_BITMAP | 0x40968 | 0x1b28 | Device independent bitmap graphic, 144 x 16 x 24, image size 6912 | Hebrew | Israel | 0.37255466052934405 |
RT_BITMAP | 0x42490 | 0xd8 | Device independent bitmap graphic, 14 x 14 x 4, image size 112, resolution 3780 x 3780 px/m | English | United States | 0.4305555555555556 |
RT_BITMAP | 0x42568 | 0xd8 | Device independent bitmap graphic, 14 x 14 x 4, image size 112, resolution 3780 x 3780 px/m | English | United States | 0.42592592592592593 |
RT_ICON | 0x42640 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Hebrew | Israel | 0.42915162454873645 |
RT_ICON | 0x42ee8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Hebrew | Israel | 0.5166184971098265 |
RT_ICON | 0x43450 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | Hebrew | Israel | 0.49421965317919075 |
RT_MENU | 0x439b8 | 0x666 | data | English | United States | 0.36996336996337 |
RT_MENU | 0x44020 | 0x2e0 | data | English | United States | 0.4171195652173913 |
RT_DIALOG | 0x44300 | 0xa2 | data | Hebrew | Israel | 0.7592592592592593 |
RT_DIALOG | 0x443a4 | 0x296 | data | Hebrew | Israel | 0.48942598187311176 |
RT_DIALOG | 0x4463c | 0x874 | data | Hebrew | Israel | 0.3553604436229205 |
RT_DIALOG | 0x44eb0 | 0xfa | data | Hebrew | Israel | 0.62 |
RT_DIALOG | 0x44fac | 0x336 | data | English | United States | 0.49635036496350365 |
RT_STRING | 0x452e4 | 0x1ea | data | English | United States | 0.4387755102040816 |
RT_STRING | 0x454d0 | 0x118 | data | English | United States | 0.4714285714285714 |
RT_STRING | 0x455e8 | 0x64 | Matlab v4 mat-file (little endian) W, numeric, rows 0, columns 0 | English | United States | 0.61 |
RT_STRING | 0x4564c | 0xc8 | data | English | United States | 0.61 |
RT_STRING | 0x45714 | 0xca | Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0 | English | United States | 0.6089108910891089 |
RT_STRING | 0x457e0 | 0x7c | data | English | United States | 0.6774193548387096 |
RT_STRING | 0x4585c | 0x44 | data | English | United States | 0.5588235294117647 |
RT_STRING | 0x458a0 | 0x30 | data | English | United States | 0.5416666666666666 |
RT_ACCELERATOR | 0x458d0 | 0x90 | data | Hebrew | Israel | 0.7013888888888888 |
RT_GROUP_CURSOR | 0x45960 | 0x14 | data | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x45974 | 0x14 | data | English | United States | 1.3 |
RT_GROUP_ICON | 0x45988 | 0x22 | data | Hebrew | Israel | 0.9705882352941176 |
RT_GROUP_ICON | 0x459ac | 0x14 | data | Hebrew | Israel | 1.25 |
RT_VERSION | 0x459c0 | 0x2e8 | data | Hebrew | Israel | 0.4946236559139785 |
RT_MANIFEST | 0x45ca8 | 0x222 | ASCII text, with very long lines (406), with CRLF line terminators | English | United States | 0.5567765567765568 |
None | 0x45ecc | 0x4 | data | English | United States | 3.0 |
DLL | Import |
---|---|
COMCTL32.dll | ImageList_SetImageCount, ImageList_Create, ImageList_AddMasked, CreateToolbarEx, ImageList_ReplaceIcon |
KERNEL32.dll | FindResourceA, GlobalLock, LoadLibraryExA, GlobalAlloc, GetTimeFormatA, SetFilePointer, GlobalUnlock, SizeofResource, GetLocaleInfoA, FindFirstFileA, LockResource, GetFileAttributesA, GetVersionExA, LoadResource, FormatMessageA, SystemTimeToTzSpecificLocalTime, FileTimeToLocalFileTime, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileStringA, EnumResourceNamesA, GetStdHandle, SetErrorMode, CreateProcessA, ExitProcess, ReadProcessMemory, GetCurrentProcessId, CreateToolhelp32Snapshot, TerminateProcess, Process32First, Process32Next, LocalAlloc, EnumResourceTypesA, FlushFileBuffers, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, GetModuleHandleA, RtlLookupFunctionEntry, RtlVirtualUnwind, GetStringTypeW, GetStringTypeA, InitializeCriticalSection, HeapReAlloc, LeaveCriticalSection, EnterCriticalSection, GetConsoleMode, GetConsoleCP, GetSystemTimeAsFileTime, QueryPerformanceCounter, DeleteCriticalSection, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, LCMapStringW, LCMapStringA, HeapCreate, HeapSetInformation, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, RtlPcToFileHeader, RaiseException, RtlUnwindEx, HeapSize, FlsAlloc, GetCurrentThreadId, SetLastError, FlsFree, TlsFree, FlsSetValue, FlsGetValue, RtlCaptureContext, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetStartupInfoA, GetProcessHeap, HeapAlloc, HeapFree, GetFileSize, FindClose, GetCurrentProcess, CreateFileA, GetTempFileNameA, GetCommandLineA, ReadFile, WriteFile, FindNextFileA, GetDateFormatA, GetModuleFileNameA, GetWindowsDirectoryA, CloseHandle, GetLastError, UnmapViewOfFile, MapViewOfFile, WideCharToMultiByte, OpenProcess, MultiByteToWideChar, GetSystemDirectoryA, GetTickCount, CreateFileMappingA, DeleteFileA, LocalFree, OpenFileMappingA, GetTempPathA, CopyFileA, Sleep, FileTimeToSystemTime, SystemTimeToFileTime, LoadLibraryA, CompareFileTime, FreeLibrary, GetProcAddress, SetStdHandle |
USER32.dll | DispatchMessageA, GetFocus, DeferWindowPos, BeginDeferWindowPos, EndDeferWindowPos, GetMessageA, PostQuitMessage, RegisterWindowMessageA, TrackPopupMenu, DrawTextExA, IsDialogMessageA, GetSysColorBrush, ShowWindow, ReleaseCapture, SetCursor, LoadCursorA, TranslateMessage, GetKeyState, DestroyWindow, CreateDialogParamA, DestroyMenu, GetDlgCtrlID, DialogBoxParamA, ModifyMenuA, LoadStringA, LoadMenuA, SetCapture, ChildWindowFromPoint, SetDlgItemTextA, GetDlgItemTextA, SendDlgItemMessageA, GetWindowTextA, GetMenuItemInfoA, FillRect, EndPaint, BeginPaint, GetClientRect, GetCursorPos, GetClassNameA, GetSubMenu, MapWindowPoints, GetMenuStringA, EnableWindow, ScreenToClient, GetParent, GetMenuItemCount, EnableMenuItem, GetMenu, CheckMenuItem, GetSysColor, MoveWindow, EmptyClipboard, CloseClipboard, OpenClipboard, SetClipboardData, SetFocus, InvalidateRect, SetWindowLongA, GetWindowLongA, GetDC, LoadIconA, LoadImageA, ReleaseDC, SendMessageA, GetWindowPlacement, MessageBoxA, TranslateAcceleratorA, DefWindowProcA, SetWindowPos, LoadAcceleratorsA, SetMenu, PostMessageA, GetSystemMetrics, GetWindowRect, UpdateWindow, RegisterClassA, SetDlgItemInt, CreateWindowExA, GetDlgItem, EndDialog, GetDlgItemInt, SetWindowTextA, EnumChildWindows |
GDI32.dll | GetDeviceCaps, GetPixel, PatBlt, StretchBlt, SetPixel, GetStockObject, GetTextExtentPoint32A, SetBkColor, CreateSolidBrush, GetObjectA, SelectObject, DeleteObject, SetBkMode, CreateFontIndirectA, SetTextColor, SetDIBits, CreateCompatibleBitmap, DeleteDC, SetStretchBltMode, CreateCompatibleDC |
comdlg32.dll | GetSaveFileNameA, FindTextA, GetOpenFileNameA |
ADVAPI32.dll | RegDeleteValueA, RegEnumValueA, RegQueryValueExA, RegEnumKeyExA, RegOpenKeyExA, RegCloseKey |
SHELL32.dll | SHGetMalloc, SHBrowseForFolderA, ShellExecuteA, SHGetPathFromIDListA |
ole32.dll | CoInitialize, CoUninitialize |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Hebrew | Israel |