Edit tour

Windows Analysis Report
nircmd.exe

Overview

General Information

Sample Name:nircmd.exe
Analysis ID:1302837
MD5:84d499f558570c32f4cb100a9124890b
SHA1:9adfc7ab66348d84ebdd9c1e8093cad4cc8485ef
SHA256:31b3b228382dc359f22ae97b2602eee81dc743fb21196061eacc6619533881f5
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Uses the nircmd tool (NirSoft)
Uses 32bit PE files
Program does not show much activity (idle)
Yara detected NirCmd tool

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • nircmd.exe (PID: 4608 cmdline: C:\Users\user\Desktop\nircmd.exe MD5: 84D499F558570C32F4CB100A9124890B)
  • cleanup
SourceRuleDescriptionAuthorStrings
00000000.00000002.3799365911.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_NirCmdYara detected NirCmd toolJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: nircmd.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE

    System Summary

    barindex
    Source: unknownProcess created: C:\Users\user\Desktop\nircmd.exe C:\Users\user\Desktop\nircmd.exe
    Source: nircmd.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Yara matchFile source: 00000000.00000002.3799365911.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\nircmd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: classification engineClassification label: sus21.evad.winEXE@1/0@0/0
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    Software Packing
    OS Credential Dumping1
    System Information Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    nircmd.exe16%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox Version:38.0.0 Beryl
    Analysis ID:1302837
    Start date and time:2023-09-04 12:52:10 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsinteractivecookbook.jbs
    Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    Analysis Mode:stream
    Analysis stop reason:Timeout
    Sample file name:nircmd.exe
    Detection:SUS
    Classification:sus21.evad.winEXE@1/0@0/0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): WMIADAP.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com
    • VT rate limit hit for: nircmd.exe
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
    Entropy (8bit):7.777549565737079
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.39%
    • UPX compressed Win32 Executable (30571/9) 0.30%
    • Win32 EXE Yoda's Crypter (26571/9) 0.26%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    File name:nircmd.exe
    File size:44'544 bytes
    MD5:84d499f558570c32f4cb100a9124890b
    SHA1:9adfc7ab66348d84ebdd9c1e8093cad4cc8485ef
    SHA256:31b3b228382dc359f22ae97b2602eee81dc743fb21196061eacc6619533881f5
    SHA512:560aaadebcbd425d35fc3a567c987a5f15a5f091962328f0479c1ec2378c732cca892eb3252179c8895413b0f3d08f44fbcf8c9d2375877c81622f42e6549c86
    SSDEEP:768:e4OBw5XDtS0d0xr6xczY6jU19q2T5D8EZdZzaJqn:+wtDtS0yV6B6A19FTiEZXaJqn
    TLSH:3313F115B370A129F9D391F5209A216543DCB12C587E87F73CF070D3ACF65A2BA9B212
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W...W...W..=X...W...t...W..$t...W...t...W..=X...W...W...V.......W.......W.......W..Rich.W..........................PE..L..
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x419d40
    Entrypoint Section:UPX1
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x5742A6D5 [Mon May 23 06:44:37 2016 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:2f9a0154d6a293d856bfb68d9a5042ea
    Instruction
    pushad
    mov esi, 00410000h
    lea edi, dword ptr [esi-0000F000h]
    push edi
    jmp 00007FDD713BFCEDh
    nop
    mov al, byte ptr [esi]
    inc esi
    mov byte ptr [edi], al
    inc edi
    add ebx, ebx
    jne 00007FDD713BFCE9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jc 00007FDD713BFCCFh
    mov eax, 00000001h
    add ebx, ebx
    jne 00007FDD713BFCE9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc eax, eax
    add ebx, ebx
    jnc 00007FDD713BFCD1h
    jne 00007FDD713BFCEBh
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jnc 00007FDD713BFCC6h
    xor ecx, ecx
    sub eax, 03h
    jc 00007FDD713BFCEFh
    shl eax, 08h
    mov al, byte ptr [esi]
    inc esi
    xor eax, FFFFFFFFh
    je 00007FDD713BFD56h
    mov ebp, eax
    add ebx, ebx
    jne 00007FDD713BFCE9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    add ebx, ebx
    jne 00007FDD713BFCE9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    jne 00007FDD713BFD02h
    inc ecx
    add ebx, ebx
    jne 00007FDD713BFCE9h
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    adc ecx, ecx
    add ebx, ebx
    jnc 00007FDD713BFCD1h
    jne 00007FDD713BFCEBh
    mov ebx, dword ptr [esi]
    sub esi, FFFFFFFCh
    adc ebx, ebx
    jnc 00007FDD713BFCC6h
    add ecx, 02h
    cmp ebp, FFFFF300h
    adc ecx, 01h
    lea edx, dword ptr [edi+ebp]
    cmp ebp, FFFFFFFCh
    jbe 00007FDD713BFCF1h
    mov al, byte ptr [edx]
    inc edx
    mov byte ptr [edi], al
    inc edi
    dec ecx
    jne 00007FDD713BFCD9h
    jmp 00007FDD713BFC48h
    nop
    mov eax, dword ptr [edx]
    add edx, 04h
    mov dword ptr [edi], eax
    add edi, 04h
    sub ecx, 04h
    jnbe 00007FDD713BFCD3h
    add edi, ecx
    jmp 00007FDD713CFC31h
    Programming Language:
    • [RES] VS2005 build 50727
    • [LNK] VS2005 build 50727
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1a7ac0x208.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x7ac.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000xf0000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10x100000xa0000xa000False0.983544921875data7.90064511820452IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x1a0000x10000xa00False0.45625data4.647879017935455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_CURSOR0x171a80x134dataEnglishUnited States1.0357142857142858
    RT_DIALOG0x172dc0x140dataHebrewIsrael1.034375
    RT_DIALOG0x1741c0x114dataHebrewIsrael1.039855072463768
    RT_GROUP_CURSOR0x175300x14dataEnglishUnited States1.4
    RT_VERSION0x1a1ac0x2a8dataHebrewIsrael0.47941176470588237
    RT_MANIFEST0x1a4580x351ASCII text, with very long lines (388), with CRLF line terminatorsEnglishUnited States0.5111896348645465
    DLLImport
    KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
    ADVAPI32.dllRegCloseKey
    GDI32.dllBitBlt
    msvcrt.dllexit
    ole32.dllCoInitialize
    SHELL32.dllShellExecuteA
    USER32.dllGetDC
    WINMM.dllmixerOpen
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    HebrewIsrael