Windows
Analysis Report
svchost.exe
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64native
svchost.exe (PID: 5240 cmdline:
C:\Users\u ser\Deskto p\svchost. exe MD5: A5437B874A27EF2DE31A29972F99F813) svchost.exe (PID: 7252 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \svchost.e xe" MD5: A5437B874A27EF2DE31A29972F99F813)
svchost.exe (PID: 6380 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s SmsRouter MD5: F586835082F632DC8D9404D83BC16316)
svchost.exe (PID: 5064 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \svchost.e xe" MD5: A5437B874A27EF2DE31A29972F99F813)
svchost.exe (PID: 7780 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \svchost.e xe" MD5: A5437B874A27EF2DE31A29972F99F813)
- cleanup
- • AV Detection
- • Compliance
- • Spreading
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Binary or memory string: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Registry key created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 2 Replication Through Removable Media | Windows Management Instrumentation | 1 Windows Service | 1 Windows Service | 11 Masquerading | OS Credential Dumping | 111 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 11 Process Injection | 2 Virtualization/Sandbox Evasion | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 DLL Side-Loading | 1 Registry Run Keys / Startup Folder | 11 Process Injection | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 1 DLL Side-Loading | NTDS | 11 Peripheral Device Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 21 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML | |||
96% | ReversingLabs | Win32.Backdoor.DarkDDoSer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML | |||
96% | ReversingLabs | Win32.Backdoor.DarkDDoSer |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
qzx.no-ip.info | 0.0.0.0 | true | false | unknown |
Joe Sandbox version: | 39.0.0 Ruby |
Analysis ID: | 1380578 |
Start date and time: | 2024-01-24 19:00:24 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 12m 58s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Suspected Instruction Hammering |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | svchost.exe |
Detection: | MAL |
Classification: | mal84.winEXE@6/6@2/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe - Execution Graph export aborted
for target svchost.exe, PID 5 064 because there are no execu ted function - Execution Graph export aborted
for target svchost.exe, PID 5 240 because there are no execu ted function - Execution Graph export aborted
for target svchost.exe, PID 7 252 because there are no execu ted function - Execution Graph export aborted
for target svchost.exe, PID 7 780 because there are no execu ted function - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - VT rate limit hit for: svchos
t.exe
Time | Type | Description |
---|---|---|
18:02:29 | Autostart | |
18:02:37 | Autostart | |
19:03:04 | API Interceptor |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 0.9432202797293127 |
Encrypted: | false |
SSDEEP: | 384:12USNM+c0R4biVDbuYK2HRMakinEOhzYp7pV4Pd16ErY2USNM+WDbuYK2HRMEkim:BShH9KAXk/86ShmKAhkzyDFqfg |
MD5: | B3D6D3C64C4BA53A19BA1D278513A12F |
SHA1: | DB39609F6D12660C88B9A1D6BD59341A070F1BFF |
SHA-256: | DB816CF0CF25B34E2E7A7B586C7CEC89CAD244D093CDA6D11427E12BD267A18A |
SHA-512: | 1CB13DDBF882BD711B583F26A9CB7E638FCE57DB8EB077752517713A8DCE49FB7F6037651F6008731553380947DB86F296E7D13CFF77248927859649E1D97941 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.07502846159387302 |
Encrypted: | false |
SSDEEP: | 3:z9ZrF3ThZtDGZWbk4V6yXXULiwtAllv5asllF/ww/ll:3rF3ByZWbkty0LiQAXas1Hll |
MD5: | 2110E7C460426247CAD6A3958D6B49F2 |
SHA1: | 4417B17D1A672B0C6FC30D2D134BA3E5672788F6 |
SHA-256: | CED71B239F1A8A0EB4CB9ABD2FEBAFB60BEDE431CE2EC1037D65A15A72440863 |
SHA-512: | 028A4E7597C25EB9E4E6EF27F060CED85AC2191D2E88AA1F3F9B2ACDA1B77E5F3A7B9C0C149CDE0AAF03201289FC52FB180EFC600942891F17ABDC604A30765C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8192 |
Entropy (8bit): | 0.37856674400608364 |
Encrypted: | false |
SSDEEP: | 6:qg/0sOaaXOXaaXO3QmDsil62g/0sOaaXOXaaXO3QmDsil6:msOaakaaIQQrlfsOaakaaIQQrl |
MD5: | F820B3D5B0A87B5751B1B753D543ACA0 |
SHA1: | B22DD4D923AF89B2206BB79FAEA6C85E6227F9EE |
SHA-256: | 8F02DCF9D6134BCA95CE44E2242ACE0D42CF711796065EEE31BAA792336B9B77 |
SHA-512: | 4D6EA2935BFADB371F17B32A41DAACB831AC0B86FF5B47922630126425146A0AC2961F564BC16A3478D80F8F61EC4093DA1E6B67B4D65DC0B85FA1B7F3CFFC5E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.2990481924996545 |
Encrypted: | false |
SSDEEP: | 96:3Rtktoo1WktlL1YktZL1ktkt6L1l/ktUL1:3R2H5C2q8 |
MD5: | 144139DD8055DDFA0AF626A309BD806F |
SHA1: | 4EA4F6039E22357F3878140E6170E2F54191B071 |
SHA-256: | 160BA84A516BF031A97C1FBDCE59436B82280EA1A778BD8D38E3BADB9381DCC0 |
SHA-512: | 17EB603590EE5BE80003B972A0C1615517933F8AB590BADE7F78C93086607D5797D8D5949EFB2286434D6A752EC91F7739E910EB201AFFA5A2426F7BC42D5E48 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 130048 |
Entropy (8bit): | 6.470869913601849 |
Encrypted: | false |
SSDEEP: | 3072:YXqmPu+E0KnKbv53Dyyl10cbDBxDgCHDV/9Sn2R31LBD4Ou1mT/+p:YXqmFEznKj5GkdH+n0tBxs |
MD5: | A5437B874A27EF2DE31A29972F99F813 |
SHA1: | 020CACB297B6722E41CE339B47066256A63C6627 |
SHA-256: | A5B910DC7E865A9139F612DC2ECAE522F4CC1E642BE12275C4F6DF1032C6AABD |
SHA-512: | DF9A2E453B2F99AD83477BAD99BC6C9CD8372FA5B2B4FF56EDDDE5381419CAC0EF711A4B7290DAFC0D4F737965A85819225A15CA871FF525BC9001C428E21B6D |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\svchost.exe |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.470869913601849 |
TrID: |
|
File name: | svchost.exe |
File size: | 130'048 bytes |
MD5: | a5437b874a27ef2de31a29972f99f813 |
SHA1: | 020cacb297b6722e41ce339b47066256a63c6627 |
SHA256: | a5b910dc7e865a9139f612dc2ecae522f4cc1e642be12275c4f6df1032c6aabd |
SHA512: | df9a2e453b2f99ad83477bad99bc6c9cd8372fa5b2b4ff56eddde5381419cac0ef711a4b7290dafc0d4f737965a85819225a15ca871ff525bc9001c428e21b6d |
SSDEEP: | 3072:YXqmPu+E0KnKbv53Dyyl10cbDBxDgCHDV/9Sn2R31LBD4Ou1mT/+p:YXqmFEznKj5GkdH+n0tBxs |
TLSH: | 21D35B23F2D1C872D1790A7C9C05A2D4693EBE203D39158BB7E95F0D69BC292992D3C7 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x41b21c |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | dbefe8b82d8d15bd0f8daeaf2520d5fc |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFECh |
push ebx |
xor eax, eax |
mov dword ptr [ebp-14h], eax |
mov eax, 0041B134h |
call 00007F265CBC733Bh |
xor eax, eax |
push ebp |
push 0041B322h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
mov dl, 01h |
mov eax, dword ptr [0041782Ch] |
call 00007F265CBC4959h |
mov ebx, eax |
mov eax, ebx |
call 00007F265CBD8AC8h |
mov eax, 0041D974h |
mov edx, 0041B338h |
call 00007F265CBC5531h |
mov cl, 01h |
mov dl, 01h |
mov eax, dword ptr [00417BB8h] |
call 00007F265CBD48B3h |
mov dword ptr [0041D96Ch], eax |
lea ecx, dword ptr [ebp-14h] |
mov eax, dword ptr [ebx+04h] |
mov eax, dword ptr [eax] |
mov edx, 0041B34Ch |
call 00007F265CBDAE30h |
mov edx, dword ptr [ebp-14h] |
mov eax, dword ptr [0041D96Ch] |
add eax, 000001F0h |
call 00007F265CBC54FAh |
mov eax, dword ptr [0041D96Ch] |
mov dword ptr [eax+000001ECh], 00000C0Dh |
mov eax, dword ptr [0041D974h] |
call 00007F265CBDB8C1h |
push 00000BB8h |
call 00007F265CBCD15Bh |
push 0041B354h |
push 00000000h |
push 00000000h |
call 00007F265CBC73C5h |
call 00007F265CBC74C0h |
cmp eax, 000000B7h |
jne 00007F265CBDC299h |
push 00000000h |
call 00007F265CBC73FAh |
mov eax, dword ptr [0041D96Ch] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1e000 | 0x100a | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x25000 | 0x15f0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x22000 | 0x20bc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x21000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x1a370 | 0x1a400 | 1c279d40365f65f8dfe095c2d186b7ab | False | 0.532524181547619 | data | 6.464573109044044 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0x1c000 | 0x67c | 0x800 | 7ee9f9d6eddb558af2178718b3ccf711 | False | 0.4130859375 | data | 3.7422528778462483 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0x1d000 | 0x995 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x1e000 | 0x100a | 0x1200 | bca9e9c17af329013dfcbc3ddb694a2c | False | 0.3528645833333333 | data | 4.5373089904389765 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x20000 | 0xc | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x21000 | 0x18 | 0x200 | 416c35f1fadc540ed3e6d4c80444ff2a | False | 0.05078125 | data | 0.17014565200323517 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0x22000 | 0x20bc | 0x2200 | 81365dff62c2e939156080bf74bdcb3a | False | 0.7294347426470589 | data | 6.599968615323305 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0x25000 | 0x15f0 | 0x1600 | c1394bda7ec719e00a9a88ba1803bcd2 | False | 0.33647017045454547 | data | 3.65273590990615 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_STRING | 0x25250 | 0x360 | data | 0.3611111111111111 | ||
RT_STRING | 0x255b0 | 0x200 | data | 0.484375 | ||
RT_STRING | 0x257b0 | 0xec | data | 0.5508474576271186 | ||
RT_STRING | 0x2589c | 0x1e4 | data | 0.5082644628099173 | ||
RT_STRING | 0x25a80 | 0x3f4 | data | 0.308300395256917 | ||
RT_STRING | 0x25e74 | 0x340 | data | 0.40625 | ||
RT_STRING | 0x261b4 | 0x2d4 | data | 0.393646408839779 | ||
RT_RCDATA | 0x26488 | 0x1c | data | 1.2142857142857142 | ||
RT_RCDATA | 0x264a4 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x264b4 | 0x13c | data | 0.8544303797468354 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
advapi32.dll | RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegDeleteValueA, RegCreateKeyExA, RegCloseKey, OpenProcessToken |
kernel32.dll | WriteFile, WaitForSingleObject, VirtualQuery, TerminateThread, SuspendThread, SizeofResource, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalAlloc, GetVersionExA, GetTickCount, GetThreadLocale, GetStringTypeExA, GetStdHandle, GetProcAddress, GetPrivateProfileStringA, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetExitCodeThread, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcess, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitThread, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileA, CreateEventA, CopyFileA, CompareStringA, CloseHandle |
user32.dll | PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, GetSystemMetrics, CharNextA, CharUpperBuffA, CharToOemA |
wsock32.dll | WSAStartup, WSAGetLastError, gethostbyname, socket, sendto, send, recv, ioctlsocket, inet_ntoa, inet_addr, htons, connect, closesocket |
kernel32.dll | Sleep |
shell32.dll | ShellExecuteA |
shell32.dll | SHGetSpecialFolderPathA |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 24, 2024 19:02:29.547776937 CET | 54466 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 24, 2024 19:02:29.662612915 CET | 53 | 54466 | 1.1.1.1 | 192.168.11.20 |
Jan 24, 2024 19:08:33.607227087 CET | 62979 | 53 | 192.168.11.20 | 1.1.1.1 |
Jan 24, 2024 19:08:33.720422029 CET | 53 | 62979 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 24, 2024 19:02:29.547776937 CET | 192.168.11.20 | 1.1.1.1 | 0xc2a3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 24, 2024 19:08:33.607227087 CET | 192.168.11.20 | 1.1.1.1 | 0xa919 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 24, 2024 19:02:29.662612915 CET | 1.1.1.1 | 192.168.11.20 | 0xc2a3 | No error (0) | 0.0.0.0 | A (IP address) | IN (0x0001) | false | ||
Jan 24, 2024 19:08:33.720422029 CET | 1.1.1.1 | 192.168.11.20 | 0xa919 | No error (0) | 0.0.0.0 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 19:02:28 |
Start date: | 24/01/2024 |
Path: | C:\Users\user\Desktop\svchost.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 130'048 bytes |
MD5 hash: | A5437B874A27EF2DE31A29972F99F813 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 19:02:29 |
Start date: | 24/01/2024 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\svchost.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 130'048 bytes |
MD5 hash: | A5437B874A27EF2DE31A29972F99F813 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 19:02:32 |
Start date: | 24/01/2024 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76e630000 |
File size: | 57'360 bytes |
MD5 hash: | F586835082F632DC8D9404D83BC16316 |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 4 |
Start time: | 19:02:37 |
Start date: | 24/01/2024 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\svchost.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 130'048 bytes |
MD5 hash: | A5437B874A27EF2DE31A29972F99F813 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 19:02:46 |
Start date: | 24/01/2024 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\svchost.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 130'048 bytes |
MD5 hash: | A5437B874A27EF2DE31A29972F99F813 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |