Windows
Analysis Report
root.cer
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
rundll32.exe (PID: 5892 cmdline:
"C:\Window s\system32 \rundll32. exe" crypt ext.dll,Cr yptExtOpen CER C:\Use rs\user\De sktop\root .cer MD5: EF3179D498793BF4234F708D3BE28633) rundll32.exe (PID: 7040 cmdline:
"C:\Window s\system32 \rundll32. exe" C:\Wi ndows\syst em32\crypt ext.dll,Cr yptExtAddC ERMachineO nlyAndHwnd MIIDrzCCA pegAwIBAgI UNEshgcQKR unD+9V56pI pwR/IAeowD QYJKoZIhvc NAQELBQAwZ zELMAkGA1U EBhMCQ04xE TAPBgNVBAg MCFpoZUppY W5nMREwDwY DVQQHDAhIY W5nWmhvdTE MMAoGA1UEC gwDQklDMQs wCQYDVQQLD AJHTjEXMBU GA1UEAwwOQ klDLUdOLVJ PT1QtVjEwH hcNMjIxMDM xMTA1MTA0W hcNMzIxMDI 4MTA1MTA0W jBnMQswCQY DVQQGEwJDT jERMA8GA1U ECAwIWmhlS mlhbmcxETA PBgNVBAcMC EhhbmdaaG9 1MQwwCgYDV QQKDANCSUM xCzAJBgNVB AsMAkdOMRc wFQYDVQQDD A5CSUMtR04 tUk9PVC1WM TCCASIwDQY JKoZIhvcNA QEBBQADggE PADCCAQoCg gEBAMwvp7Y htgg7YKJxB ArzEaA6Wbu DYxFxMxLd5 QwPohyLw9u cYr2tKBSpv Jek3w1FY3C j9BpzlVVHR 4JkCkS7svO CZBPMC0Avr ili3VefMeH eLIXqVUAuR fokxo6TEUr aQrZLogD7A O9rTNrk18v JP0Zwy7qsr hlub+a2Gvu 192H8WfCRY eolx+9yHVl KwYqyBo0FL Gs4blRFm5M NIu1v/jGvn cyblb+u8m9 n+4UhCUmSM g2YHzz8MOl bLMPvjl6H/ AfflJlsECG X+ZaJm9FX6 bCbvVBNTzI KIHKNsDkCD gNVrPecFff k6Sg7+OUvc cddYK+v7c3 LASeoAtGJ6 Rd/xUUCAwE AAaNTMFEwH QYDVR0OBBY EFCDMiRKvN CP1HeiFv0j bZdtV8zMJM B8GA1UdIwQ YMBaAFCDMi RKvNCP1Hei Fv0jbZdtV8 zMJMA8GA1U dEwEB/wQFM AMBAf8wDQY JKoZIhvcNA QELBQADggE BAIT1R20gf OgXMiXOJ0e 3lwE2NxbCJ IVdk4WHAIe 03T9QWi9GD e88CesAHtp M7Ua5pi4v+ 2W3y5ybCOL AH2fIfpFGK FMfFdkSc+U XlSuLBiBYw UUzIIenLl+ z3Ak/mc/VL Drg4gULRhp LHSM7at/EO tPKu5yOPQQ 2wp0sHpDTe kp1ULyy6bm 2OdEnko8vO bq2Q8G2Ae7 DQ8XnTus1D hSR3m2iON/ FkeDkeHzgX UTEOa4kwwH pWldFBBVyV 1iZy89SKbu 7PnJ1BNFJ+ MlkxnAFh3E /AWD1Go+4T cLieRyJ/Uj fZZlb3bFQG ohBExNfO4+ xg9JQ/7UOJ 3SQonhtaZM LWas= 1973 28 MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Classification label: |
Source: | File created: |
Source: | File read: |
Source: | Key opened: |
Source: | Process created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Window found: |
Source: | File opened: |
Source: | Window detected: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Thread sleep time: |
Source: | Process created: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Command and Scripting Interpreter | Path Interception | 11 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Rundll32 | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
93.184.221.240 | unknown | European Union | 15133 | EDGECASTUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1453562 |
Start date and time: | 2024-06-07 09:20:21 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | root.cer |
Detection: | CLEAN |
Classification: | clean1.winCER@3/2@0/12 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, Sg rmBroker.exe, MoUsoCoreWorker. exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 93.184.221.240 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, ctldl.windowsupdate.com.de livery.microsoft.com, wu.ec.az ureedge.net, bg.apr-52dd2-0503 .edgecastdns.net, cs11.wpc.v0c dn.net, hlb.apr-52dd2-0.edgeca stdns.net, ctldl.windowsupdate .com, wu-b-net.trafficmanager. net, wu.azureedge.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Process: | C:\Windows\System32\rundll32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Windows\System32\rundll32.exe |
File Type: | |
Category: | modified |
Size (bytes): | 328 |
Entropy (8bit): | 3.144086598890895 |
Encrypted: | false |
SSDEEP: | |
MD5: | DCC44B949FD12C52204A6E696DB71CEB |
SHA1: | E601E01116E11C9251C3C2A701097A274AECBDDA |
SHA-256: | 80BF40BCAB30FCC29D4F903A89E8919ACA74C54B7DD2B2D37CE74F89A5DED619 |
SHA-512: | E5BD346011AF223A54A6A59DC78604F6D45C82D52DA397E20327EB0351B6B702A6B0C8139337F1107EF57922A82CB74FE9BFFB190272EC440D35B9D90DE04EB6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
File type: | |
Entropy (8bit): | 5.884184096990009 |
TrID: |
|
File name: | root.cer |
File size: | 1'338 bytes |
MD5: | fad869056a02abc53b2630a36a15f2e5 |
SHA1: | 7c66b1ea25d5fc4a0dfb07ef71335fc82c86bc2f |
SHA256: | 5cba3ff0cc1ebd5c1e6a302840ba8f747172e98d53c56e59d74bb96ea8983904 |
SHA512: | acd85465b0ae1f9ba551a9319a5f100e82c355af207cdae26dd5ebeb66adc7caa715017c7eeb5eaeb6ecf95135fd6ce46b6d1f73e53bbd8efd43effec4ecf700 |
SSDEEP: | 24:Lrcw940ma85lz0knknTR0Mx3j2ZMSVjaAkZgEo0xhhIeQjGQJ:LrcwS0mjaknkTiMEZMSVGAP0xhM6E |
TLSH: | DA21B3FB9F123C48A0F7C189CF852A14ECF653A32CC9B8B2AD0B3C028F464AA3545145 |
File Content Preview: | -----BEGIN CERTIFICATE-----.MIIDrzCCApegAwIBAgIUNEshgcQKRunD+9V56pIpwR/IAeowDQYJKoZIhvcNAQEL.BQAwZzELMAkGA1UEBhMCQ04xETAPBgNVBAgMCFpoZUppYW5nMREwDwYDVQQHDAhI.YW5nWmhvdTEMMAoGA1UECgwDQklDMQswCQYDVQQLDAJHTjEXMBUGA1UEAwwOQklD.LUdOLVJPT1QtVjEwHhcNMjIxMDMxMTA1 |
Icon Hash: | 8292cc9eba9a1918 |