Windows
Analysis Report
crash.bat
Overview
General Information
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
cmd.exe (PID: 6408 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\crash .bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) findstr.exe (PID: 4128 cmdline:
findstr /V ambitious ""C:\User s\user\Des ktop\crash .bat"" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) certutil.exe (PID: 5272 cmdline:
certutil - f -decode hellish th erapeutic. dll MD5: F17616EC0522FC5633151F7CAA278CAA) rundll32.exe (PID: 6332 cmdline:
rundll32 t herapeutic .dll,x MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
{
"C2 url": "91.215.85.209/server.php"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_EXEembeddedinBATfile | Yara detected EXE embedded in BAT file | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security |
- • AV Detection
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Networking |
---|
Source: | URLs: |
Source: | Code function: | 5_2_6D7C2C77 | |
Source: | Code function: | 5_2_6D7C144B | |
Source: | Code function: | 5_2_6D7C270C | |
Source: | Code function: | 5_2_000001A500BA1B10 | |
Source: | Code function: | 5_2_000001A500BAE9E8 | |
Source: | Code function: | 5_2_000001A500BA1240 | |
Source: | Code function: | 5_2_000001A500BA67BC | |
Source: | Code function: | 5_2_000001A500BA1740 |
Source: | Static PE information: |
Source: | ReversingLabs: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | File source: |
Source: | Code function: | 5_2_6D7C1F7D | |
Source: | Code function: | 5_2_6D7C3D79 | |
Source: | Code function: | 5_2_6D7C3E72 | |
Source: | Code function: | 5_2_6D7C3674 | |
Source: | Code function: | 5_2_6D7C2D6E | |
Source: | Code function: | 5_2_6D7C3357 | |
Source: | Code function: | 5_2_6D7C473C | |
Source: | Code function: | 5_2_6D7C1A31 | |
Source: | Code function: | 5_2_6D7C232F | |
Source: | Code function: | 5_2_6D7C3F2C | |
Source: | Code function: | 5_2_6D7C301C | |
Source: | Code function: | 5_2_6D7C3912 | |
Source: | Code function: | 5_2_6D7C1B08 | |
Source: | Code function: | 5_2_6D7C39FA | |
Source: | Code function: | 5_2_6D7C40E7 | |
Source: | Code function: | 5_2_6D7C2BDC | |
Source: | Code function: | 5_2_6D7C499C | |
Source: | Code function: | 5_2_000001A500BB65AE |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 5_2_6D81DC10 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Scripting | Path Interception | 11 Process Injection | 1 Rundll32 | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 11 Process Injection | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Application Layer Protocol | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Scripting | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | Protocol Impersonation | Data Destruction | Virtual Private Server | Employee Names |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
14% | ReversingLabs | Script-JS.Packed.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
40% | ReversingLabs | Win64.Trojan.StrelaStealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| low |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1347525 |
Start date and time: | 2023-11-24 18:06:36 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 8s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Without Instrumentation |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | crash.bat |
Detection: | MAL |
Classification: | mal88.troj.evad.winBAT@8/2@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found. - VT rate limit hit for: crash.
bat
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 723778 |
Entropy (8bit): | 5.596221550727205 |
Encrypted: | false |
SSDEEP: | 12288:Y7oh5QoNGWGZyTPnjAmM9aZKTz1RpxFg+cO6lKc9NTu7i8AO7QXM3us4PXK:Y7oh5QKGWG0rboasThRpxr56si854PK |
MD5: | C9C89A47C7D937EC0F26092DD8427B70 |
SHA1: | 69B578F01B7386BE72D7CAFCB45BDA823FE29A97 |
SHA-256: | 338DCBD0F75ABD063E351BF27C13255EC0F776964CCB7C148EC46806C158EC2E |
SHA-512: | 3300A7822EA99D5CE8D2B28108EAEA4AF1D2ECACAA5FCEAE9FB691531A1F8AD803010C10D2DC2BEE36EA922D284A18B3C169D350241A5106E2E814FB9A58B4E5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\certutil.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 539883 |
Entropy (8bit): | 6.701081088318034 |
Encrypted: | false |
SSDEEP: | 6144:ERSCSg+gfUYRjOuVZFGNRwND7Pypwwf/43wWPpoApvmJraTKzv:ExN21wwCwTA8rSKD |
MD5: | 19808287DD44452A6DA3596468487675 |
SHA1: | D485F9EAAFE0BF0CF7EB77173E6050B54BA05611 |
SHA-256: | EFD7A52121867B0D7A60B0FD609FC47726002033662736D309A1B94AA857FB98 |
SHA-512: | 2863BB7687A08AD36E8642FC6FDD4A4A9822D24A1D91DA4A0AC19389C1E6ACBEDAD23A803A497DC1C91BAEF6E19A4DBB4B4108007A5E2A88FFDC81047DFE2751 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.618323533842012 |
TrID: | |
File name: | crash.bat |
File size: | 730'262 bytes |
MD5: | bc9ae5fde063670508888399f65b2fee |
SHA1: | 8f86773a0da30ccb9e8ba9090a6a405d9a73c510 |
SHA256: | ac47215a8231818e4c424012c1527a3e70087739865b035be9b47fb75d34c030 |
SHA512: | 922732a178c5c61e00d50702c9d2df52a946f113878947220ae26db2954475acdd475791b58b0f0b79a50c14ed539d0f3e0d447f9c041b6802a6a1f821fcba47 |
SSDEEP: | 12288:O7oh5QoNGWGZyTPnjAmM9aZKTz1RpxFg+cO6lKc9NTu7i8AO7QXM3us4PXc:O7oh5QKGWG0rboasThRpxr56si854Pc |
TLSH: | 7BF44BF472D077D70F75694DB3CE40B23D54B457F0EEEE86228D0D1E928429899ABEA0 |
File Content Preview: | /* ambitious..set ambitiouskillprovide=y..set ambitiousraspylanguage=e..set ambitiousfranticsense=h..set ambitioustangibledamaged=z..set ambitioushuntoatmeal=r..set ambitiouspointlessopposite=a..set ambitiouspreparearithmetic=b..set ambitioussplendidirrit |
Icon Hash: | 9686878b929a9886 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 18:07:22 |
Start date: | 24/11/2023 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff667f60000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 18:07:22 |
Start date: | 24/11/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 18:07:22 |
Start date: | 24/11/2023 |
Path: | C:\Windows\System32\findstr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff77a030000 |
File size: | 36'352 bytes |
MD5 hash: | 804A6AE28E88689E0CF1946A6CB3FEE5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 4 |
Start time: | 18:07:30 |
Start date: | 24/11/2023 |
Path: | C:\Windows\System32\certutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7290a0000 |
File size: | 1'651'712 bytes |
MD5 hash: | F17616EC0522FC5633151F7CAA278CAA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 18:07:30 |
Start date: | 24/11/2023 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff761c90000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 1.5% |
Dynamic/Decrypted Code Coverage: | 58.1% |
Signature Coverage: | 3.5% |
Total number of Nodes: | 258 |
Total number of Limit Nodes: | 13 |
Graph
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |