Windows
Analysis Report
nc.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
nc.exe (PID: 6828 cmdline:
C:\Users\u ser\Deskto p\nc.exe MD5: C90459986070E38FD8260D4430E23DFD) conhost.exe (PID: 6836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Netcat | Yara detected Netcat | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Netcat | Yara detected Netcat | Joe Security | ||
JoeSecurity_Netcat | Yara detected Netcat | Joe Security | ||
JoeSecurity_Netcat | Yara detected Netcat | Joe Security |
- • AV Detection
- • Compliance
- • Spreading
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Spreading |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_0040446D |
Source: | Binary or memory string: | memstr_cafd4fb1-8 |
Source: | Static PE information: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: |
Source: | Last function: |
Source: | Decision node followed by non-executed suspicious API: | graph_0-2359 |
Source: | API coverage: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Binary or memory string: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00401150 |
Source: | Code function: | 0_2_00405B80 |
Source: | Code function: | 0_2_00403829 | |
Source: | Code function: | 0_2_00403BA8 |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Process Injection | 1 Input Capture | 1 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | 1 Ingress Tool Transfer | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 11 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Avira | BDS/Backdoor.Gen |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1307249 |
Start date and time: | 2023-09-11 13:11:48 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | nc.exe |
Detection: | MAL |
Classification: | mal60.spre.winEXE@2/1@0/0 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, BackgroundTransfer Host.exe, WMIADAP.exe, backgro undTaskHost.exe, conhost.exe, svchost.exe - Excluded domains from analysis
(whitelisted): www.bing.com, tse1.mm.bing.net, g.bing.com, arc.msn.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: nc.exe
Process: | C:\Users\user\Desktop\nc.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 3.121928094887362 |
Encrypted: | false |
SSDEEP: | 3:umFn:D |
MD5: | 552430716D5ECD7EB607728C6AA6D750 |
SHA1: | 343C92A87B4E6887E140DFA476AEBAD03C4ABFD5 |
SHA-256: | E58FE825DF1CD85145B06292195AA553F11577105BA848731FAF0C774EE56648 |
SHA-512: | 8DC6C13551BFDB196595B1368A5B72A5D85FE22736466C6DD5127A4F62C7D1E73A004C8F86072EAC245BF905A5336F5E8DE913D6B5F5010F98AE03F1DE503C01 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 5.156999044074612 |
TrID: |
|
File name: | nc.exe |
File size: | 58'888 bytes |
MD5: | c90459986070e38fd8260d4430e23dfd |
SHA1: | ce3e01c3fce1f4563335cda87df7406c8ad2b6b7 |
SHA256: | 109c04127c3168a386744027413d11a84c6b5c91738b05f5c5e40c45e07b72f9 |
SHA512: | 6da06ebcf86251d4617f74ac63b07d3c161937961874434774e85edb6f7da2f0166080860066832da790d9a87948bc460f714980819f42aa3f8f6b543fd50f11 |
SSDEEP: | 768:UU9M7HdpLfr1wD+lFn7uqXXlfHbE2mmuL6JZs0L7Yp8O6bpbec2V:UN7m4jlf7XmRsZv/9X2V |
TLSH: | C34332E5BACA9DE7EA1452BCCCAAD676203CF4E087134F5396744C325B62E927CD4213 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....y.L.x..#..........8.T...t...............p....@..................................!........ ............................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x401280 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x4CC77990 [Wed Oct 27 01:00:00 2010 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 9284347e8448a2e126e2a8d612a42f54 |
Instruction |
---|
push ebp |
mov ebp, esp |
sub esp, 08h |
mov dword ptr [esp], 00000001h |
call dword ptr [0040B2A8h] |
call 00007F37CCEA5C0Dh |
nop |
lea esi, dword ptr [esi+00000000h] |
push ebp |
mov ebp, esp |
sub esp, 08h |
mov dword ptr [esp], 00000002h |
call dword ptr [0040B2A8h] |
call 00007F37CCEA5BEDh |
nop |
lea esi, dword ptr [esi+00000000h] |
push ebp |
mov ecx, dword ptr [0040B2D4h] |
mov ebp, esp |
pop ebp |
jmp ecx |
lea esi, dword ptr [esi+00h] |
push ebp |
mov ecx, dword ptr [0040B2C0h] |
mov ebp, esp |
pop ebp |
jmp ecx |
nop |
nop |
nop |
nop |
push ebp |
mov ebp, esp |
pop ebp |
jmp 00007F37CCEAA7ACh |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
push ebp |
mov ebp, esp |
sub esp, 04h |
mov eax, dword ptr [ebp+08h] |
cmp byte ptr [eax], 00000000h |
je 00007F37CCEA5D6Ah |
mov eax, dword ptr [ebp+08h] |
movsx eax, byte ptr [eax] |
cmp eax, dword ptr [ebp+0Ch] |
jne 00007F37CCEA5D5Ah |
mov eax, dword ptr [ebp+08h] |
mov dword ptr [ebp-04h], eax |
jmp 00007F37CCEA5D5Eh |
inc dword ptr [ebp+08h] |
jmp 00007F37CCEA5D32h |
mov dword ptr [ebp-04h], 00000000h |
mov eax, dword ptr [ebp-04h] |
leave |
ret |
push ebp |
mov ebp, esp |
push ebx |
sub esp, 1Ch |
mov eax, dword ptr [0040A048h] |
mov dword ptr [ebp-08h], eax |
mov eax, dword ptr [0040A058h] |
mov dword ptr [ebp-0Ch], eax |
mov eax, dword ptr [0040A014h] |
mov dword ptr [ebp-10h], eax |
mov eax, dword ptr [ebp-10h] |
cmp eax, dword ptr [ebp-0Ch] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb000 | 0xa70 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5304 | 0x5400 | False | 0.44228980654761907 | data | 5.598404569723046 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x7000 | 0xb0 | 0x200 | False | 0.189453125 | Matlab v4 mat-file (little endian) (UNKNOWN), text, rows 63, columns 0 | 1.2831406116232933 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x8000 | 0x1010 | 0x1200 | False | 0.4249131944444444 | data | 4.971079818250585 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0xa000 | 0x280 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xb000 | 0xa70 | 0xc00 | False | 0.3505859375 | data | 4.073144532935977 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
DLL | Import |
---|---|
KERNEL32.dll | AddAtomA, CloseHandle, CreatePipe, CreateProcessA, CreateThread, DisconnectNamedPipe, DuplicateHandle, ExitProcess, ExitThread, FindAtomA, FreeConsole, GetAtomNameA, GetCurrentProcess, GetLastError, GetStdHandle, PeekNamedPipe, ReadFile, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TerminateThread, WaitForMultipleObjects, WriteFile |
msvcrt.dll | _close, _dup, _itoa, _kbhit, _open, _read, _strcmpi, _strnicmp, _write |
msvcrt.dll | __getmainargs, __p__environ, __p__fmode, __set_app_type, _assert, _cexit, _errno, _iob, _isatty, _onexit, _setjmp, _setmode, _sleep, abort, atexit, atoi, exit, fflush, fprintf, free, getenv, gets, longjmp, malloc, memcmp, memcpy, memset, rand, signal, sprintf, srand, strcat, strchr, strcmp, strcpy, strlen, strncmp, strncpy, time |
WSOCK32.DLL | WSACleanup, WSAGetLastError, WSASetLastError, WSAStartup, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, getservbyname, getservbyport, getsockname, htons, inet_addr, inet_ntoa, listen, ntohs, recv, recvfrom, select, send, setsockopt, shutdown, socket |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 13:12:47 |
Start date: | 11/09/2023 |
Path: | C:\Users\user\Desktop\nc.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 58'888 bytes |
MD5 hash: | C90459986070E38FD8260D4430E23DFD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 13:12:47 |
Start date: | 11/09/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff766460000 |
File size: | 625'664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 3.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 13.4% |
Total number of Nodes: | 644 |
Total number of Limit Nodes: | 1 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |