Edit tour

Windows Analysis Report
jhi_service.exe

Overview

General Information

Sample name:jhi_service.exe
Analysis ID:1514209
MD5:4708f291e40c2f7678e6367e97a04a58
SHA1:1d5b92dec51330265912a15090442ce662b30fcd
SHA256:811a5d5f28bed664d744d7a289aaefd965f4b90bb6d46f61eee8d6cadfd6e180
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Sigma detected: Suspicious New Service Creation
Creates a process in suspended mode (likely to inject code)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 6544 cmdline: cmd /c sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" >> C:\servicereg.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 6708 cmdline: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • cmd.exe (PID: 6944 cmdline: cmd /c sc start EEPwq >> C:\servicestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 6976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 7056 cmdline: sc start EEPwq MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • jhi_service.exe (PID: 7152 cmdline: C:\Users\user\Desktop\jhi_service.exe MD5: 4708F291E40C2F7678E6367E97A04A58)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" , CommandLine: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: cmd /c sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" >> C:\servicereg.log 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6544, ParentProcessName: cmd.exe, ProcessCommandLine: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" , ProcessId: 6708, ProcessName: sc.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" , CommandLine: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: cmd /c sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" >> C:\servicereg.log 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6544, ParentProcessName: cmd.exe, ProcessCommandLine: sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" , ProcessId: 6708, ProcessName: sc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: jhi_service.exeStatic PE information: certificate valid
Source: jhi_service.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\buildagent-cd_8811\workspace\11934\VisualStudio\bin\x64\Universal_Release\jhi_service.pdbm source: jhi_service.exe
Source: Binary string: D:\buildagent-cd_8811\workspace\11934\VisualStudio\bin\x64\Universal_Release\jhi_service.pdb source: jhi_service.exe
Source: jhi_service.exeString found in binary or memory: http://OCSP.intel.com/0
Source: jhi_service.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: jhi_service.exeString found in binary or memory: http://crl.quovadisglobal.com/qvicag4.crl0
Source: jhi_service.exeString found in binary or memory: http://crl.quovadisglobal.com/qvrca.crl0
Source: jhi_service.exeString found in binary or memory: http://ocsp.comodoca.com05
Source: jhi_service.exeString found in binary or memory: http://ocsp.quovadisglobal.com05
Source: jhi_service.exeString found in binary or memory: http://ocsp.quovadisglobal.com07
Source: jhi_service.exeString found in binary or memory: http://pki.intel.com/crl/IntelCA7B.crl0f
Source: jhi_service.exeString found in binary or memory: http://pki.intel.com/crt/IntelCA7B.crt0
Source: jhi_service.exeString found in binary or memory: http://trust.quovadisglobal.com/qvicag4.crt0O
Source: jhi_service.exeString found in binary or memory: http://trust.quovadisglobal.com/qvrca.crt0
Source: jhi_service.exeString found in binary or memory: http://www.quovadisglobal.com/repository0
Source: classification engineClassification label: sus21.winEXE@9/2@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6976:120:WilError_03
Source: C:\Users\user\Desktop\jhi_service.exeMutant created: NULL
Source: jhi_service.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\sc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: jhi_service.exeString found in binary or memory: Install error: Couldn't set the service to delayed auto-start.
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" >> C:\servicereg.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe"
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc start EEPwq >> C:\servicestart.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start EEPwq
Source: unknownProcess created: C:\Users\user\Desktop\jhi_service.exe C:\Users\user\Desktop\jhi_service.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start EEPwqJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\jhi_service.exeSection loaded: kernel.appcore.dllJump to behavior
Source: jhi_service.exeStatic PE information: certificate valid
Source: jhi_service.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: jhi_service.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: jhi_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\buildagent-cd_8811\workspace\11934\VisualStudio\bin\x64\Universal_Release\jhi_service.pdbm source: jhi_service.exe
Source: Binary string: D:\buildagent-cd_8811\workspace\11934\VisualStudio\bin\x64\Universal_Release\jhi_service.pdb source: jhi_service.exe
Source: jhi_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: jhi_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: jhi_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: jhi_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: jhi_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: jhi_service.exeStatic PE information: section name: _RDATA
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe"
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: jhi_service.exe, 00000006.00000002.1697766688.000001FABA499000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start EEPwqJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
11
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Service Execution
1
DLL Side-Loading
11
Process Injection
1
DLL Side-Loading
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1514209 Sample: jhi_service.exe Startdate: 20/09/2024 Architecture: WINDOWS Score: 21 23 Sigma detected: Suspicious New Service Creation 2->23 6 cmd.exe 2 2->6         started        9 cmd.exe 2 2->9         started        11 jhi_service.exe 2->11         started        process3 file4 21 C:\servicereg.log, ASCII 6->21 dropped 13 conhost.exe 6->13         started        15 sc.exe 1 6->15         started        17 conhost.exe 9->17         started        19 sc.exe 1 9->19         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
jhi_service.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.quovadisglobal.com/qvicag4.crl00%Avira URL Cloudsafe
http://trust.quovadisglobal.com/qvrca.crt00%Avira URL Cloudsafe
http://pki.intel.com/crt/IntelCA7B.crt00%Avira URL Cloudsafe
http://pki.intel.com/crl/IntelCA7B.crl0f0%Avira URL Cloudsafe
http://www.quovadisglobal.com/repository00%Avira URL Cloudsafe
http://ocsp.quovadisglobal.com070%Avira URL Cloudsafe
http://crl.quovadisglobal.com/qvrca.crl00%Avira URL Cloudsafe
http://ocsp.quovadisglobal.com050%Avira URL Cloudsafe
http://OCSP.intel.com/00%Avira URL Cloudsafe
http://trust.quovadisglobal.com/qvicag4.crt0O0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://ocsp.quovadisglobal.com05jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://crl.quovadisglobal.com/qvrca.crl0jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://trust.quovadisglobal.com/qvrca.crt0jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://pki.intel.com/crt/IntelCA7B.crt0jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://crl.quovadisglobal.com/qvicag4.crl0jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://ocsp.quovadisglobal.com07jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://www.quovadisglobal.com/repository0jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://OCSP.intel.com/0jhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://pki.intel.com/crl/IntelCA7B.crl0fjhi_service.exefalse
  • Avira URL Cloud: safe
unknown
http://trust.quovadisglobal.com/qvicag4.crt0Ojhi_service.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1514209
Start date and time:2024-09-20 00:06:50 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run as Windows Service
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:jhi_service.exe
Detection:SUS
Classification:sus21.winEXE@9/2@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: jhi_service.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):28
Entropy (8bit):3.678439190827718
Encrypted:false
SSDEEP:3:4A4AnXjzSv:4HAnXjg
MD5:A8F4D690C5BDE96AD275C7D4ABE0E3D3
SHA1:7C62C96EFD2CA4F3C3EBF0B24C9B5B4C04A4570A
SHA-256:596CCC911C1772735AAC6A6B756A76D3D55BCECD006B980CF147090B2243FA7B
SHA-512:A875EBE3C5CDF222FF9D08576F4D996AF827A1C86B3E758CE23F6B33530D512A82CE8E39E519837512080C6212A0A19B3385809BE5F5001C4E488DD79550B852
Malicious:true
Reputation:moderate, very likely benign file
Preview:[SC] CreateService SUCCESS..
Process:C:\Windows\SysWOW64\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):421
Entropy (8bit):3.501801842396102
Encrypted:false
SSDEEP:6:lg3D/8FDgVKBRjGxVVLvH2s/u8qLLFmLaZnsHgm66//V+NmdXefq:lgAdgV0qVbH2suZLQqOVKmdXcq
MD5:D79FA524150EF03E2968D0F6D740082C
SHA1:082F6CDCFE4DA55C2D2EA9C995C7EFF0C4DB61F0
SHA-256:F55A285B3662097AA32A88C257FD6DC33A8913159226B88B7AC82858FC68C9F7
SHA-512:0809EE80F856BCD8CDE67A3FE8B3FD8870AD9E2F57E70F1E46FD98DF4DD463580E60565902D691F7E7491ABA00C8329AE6E0F06F5F18E617C40550A3ED777597
Malicious:false
Reputation:low
Preview:..SERVICE_NAME: EEPwq .. TYPE : 10 WIN32_OWN_PROCESS .. STATE : 2 START_PENDING .. (NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN).. WIN32_EXIT_CODE : 0 (0x0).. SERVICE_EXIT_CODE : 0 (0x0).. CHECKPOINT : 0x0.. WAIT_HINT : 0x7d0.. PID : 7152.. FLAGS : ..
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.435377270234307
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:jhi_service.exe
File size:628'608 bytes
MD5:4708f291e40c2f7678e6367e97a04a58
SHA1:1d5b92dec51330265912a15090442ce662b30fcd
SHA256:811a5d5f28bed664d744d7a289aaefd965f4b90bb6d46f61eee8d6cadfd6e180
SHA512:278c22e0b52e802afa19cb8dc52900f72b66616ecc868386b91dd32952dd29b795a93626a9ce2c509ce32bc238a119e8c9d2e86a560d9ed9073ae87406ab892a
SSDEEP:12288:lo/JNHBS76YiRGj69qj72WoGS9voWlNW3J1mOpD:lohBs76bRGj69y72WjS9voWlU3J1Vl
TLSH:44D47C9AA3E840F9E077D13CC9975612F672784607608AEF13E0467A1F37AE15F3A721
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3...R...R...R...9...R...9...R...9...R...?...R...?...R...?...R...*z..R...R..tR..j?...R..j?...R..j?...R...R~..R..j?...R..Rich.R.
Icon Hash:90cececece8e8eb0
Entrypoint:0x140039620
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x60093A31 [Thu Jan 21 08:24:17 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:e633540196c51ee96c98a3f268b25cf0
Signature Valid:true
Signature Issuer:CN=Intel External Issuing CA 7B, O=Intel Corporation, L=Santa Clara, S=CA, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 30/09/2020 02:57:03 17/06/2021 19:59:59
Subject Chain
  • CN=Intel(R) Embedded Subsystems and IP Blocks Group, O=Intel Corporation, L=Santa Clara, S=CA, C=US
Version:3
Thumbprint MD5:EFDD8C32A5CC970CD5CCDE6881F707E7
Thumbprint SHA-1:ED89FB8699321131D508531E6489D164A21886EB
Thumbprint SHA-256:4C6C0B896954FB85BC85B1C1370DD41E316C08A53D23FAC9EF2A50B707559175
Serial:5600000C970A207F2C4F00043D000000000C97
Instruction
dec eax
sub esp, 28h
call 00007F5C307FAC2Ch
dec eax
add esp, 28h
jmp 00007F5C307FA53Fh
int3
int3
dec eax
mov eax, esp
dec esp
mov dword ptr [eax+20h], ecx
dec esp
mov dword ptr [eax+18h], eax
dec eax
mov dword ptr [eax+10h], edx
push ebx
push esi
push edi
inc ecx
push esi
dec eax
sub esp, 38h
dec ebp
mov esi, ecx
dec ecx
mov ebx, eax
dec eax
mov esi, edx
mov byte ptr [eax-38h], 00000000h
dec eax
mov edi, edx
dec ecx
imul edi, eax
dec eax
add edi, ecx
dec eax
mov dword ptr [eax+08h], edi
dec eax
mov eax, ebx
dec eax
dec ebx
dec eax
mov dword ptr [esp+70h], ebx
dec eax
test eax, eax
je 00007F5C307FA6EBh
dec eax
sub edi, esi
dec eax
mov dword ptr [esp+60h], edi
dec eax
mov ecx, edi
dec ecx
mov eax, esi
dec eax
mov edx, dword ptr [0002FF84h]
call edx
jmp 00007F5C307FA6A9h
mov byte ptr [esp+20h], 00000001h
dec eax
add esp, 38h
inc ecx
pop esi
pop edi
pop esi
pop ebx
ret
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], esi
dec eax
mov dword ptr [esp+08h], ecx
push edi
inc ecx
push esi
inc ecx
push edi
dec eax
sub esp, 50h
dec ebp
mov esi, ecx
dec ecx
mov esi, eax
dec esp
mov edi, edx
dec eax
mov edi, ecx
xor ebx, ebx
dec eax
mov dword ptr [esp+38h], ebx
dec eax
cmp ebx, esi
je 00007F5C307FA6EBh
dec ecx
sub edi, edi
dec eax
mov dword ptr [esp+70h], edi
dec eax
mov ecx, edi
dec ecx
mov eax, esi
call dword ptr [0002FF2Ch]
dec eax
inc ebx
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x8bf400x58.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x8bf980xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x9b0000x1048.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x940000x51d8.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x950000x4780
IMAGE_DIRECTORY_ENTRY_BASERELOC0x9d0000xfc4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x825600x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x826d80x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x825d00x108.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x690000x608.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x673de0x6740060b29fff76cda035b43547292cc9de38False0.5073774213075061data6.443238840006497IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x690000x2436a0x244001c88cf120bd253da17788e7334605e89False0.41587419181034485PGP symmetric key encrypted data - Plaintext or unencrypted data5.395276545279143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x8e0000x5e8c0x1e007c6bfd2ae83df3e6f10b1c402b34a600False0.14466145833333333data3.063107378868907IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x940000x51d80x520013396e91fefd4810ca5b433a62a5be9cFalse0.4787061737804878data5.774865478784579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
_RDATA0x9a0000x940x200e08ffc30530e38d31d6eb3de7d4adfeeFalse0.208984375data1.4508727303968079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x9b0000x10480x1200f4072f2aa4125ebb473ae458e14b33acFalse0.22721354166666666data3.4261012695210447IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x9d0000xfc40x1000b3801a6e198af157ff44701750ad7f31False0.405029296875data5.416433269359753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MESSAGETABLE0x9b0f00xa30data0.16756134969325154
RT_VERSION0x9bb200x3a8data0.4252136752136752
RT_MANIFEST0x9bec80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.DLLHeapReAlloc, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, CreateThread, IsValidCodePage, ReadConsoleW, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, WriteConsoleW, CopyFileExW, SetFileAttributesW, ReadFile, WriteFile, DeviceIoControl, Sleep, GetConsoleMode, CreateEventW, FindNextFileW, lstrlenA, CreateFileA, GetMailslotInfo, CreateMailslotA, ResetEvent, GetConsoleOutputCP, OpenProcess, GetFileType, GetProcessTimes, GetExitCodeProcess, FindFirstFileW, LoadLibraryExW, FreeLibrary, GetModuleFileNameW, GetProcAddress, ExpandEnvironmentStringsW, FlushFileBuffers, VerifyVersionInfoW, VerSetConditionMask, GetLastError, CreateFileW, ReleaseMutex, CreateMutexW, CreateSemaphoreW, GetFileSizeEx, ReleaseSemaphore, CreateEventA, CloseHandle, SetEvent, GetCommandLineW, LocalFree, WaitForSingleObject, OpenEventA, lstrcmpiW, HeapSize, GetCommandLineA, GetStdHandle, GetModuleHandleExW, ExitProcess, RaiseException, RtlPcToFileHeader, RtlUnwindEx, GetCPInfo, GetStringTypeW, OutputDebugStringA, GetLocaleInfoW, LCMapStringW, CompareStringW, DecodePointer, RtlUnwind, EncodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, CancelIo, HeapFree, TlsFree, TlsSetValue, HeapAlloc, GetOverlappedResult, GetProcessHeap, SignalObjectAndWait, CreateMutexA, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, QueryPerformanceFrequency, FormatMessageW, WideCharToMultiByte, CreateDirectoryW, DeleteFileW, FindClose, FindFirstFileExW, GetFileAttributesExW, GetFileInformationByHandle, SetEndOfFile, SetFilePointerEx, SetLastError, MoveFileExW, MultiByteToWideChar, SwitchToThread, TlsAlloc, TlsGetValue
ADVAPI32.DLLReportEventW, SetSecurityDescriptorDacl, GetSecurityDescriptorDacl, CreateServiceW, CloseServiceHandle, OpenSCManagerW, BuildExplicitAccessWithNameW, AllocateAndInitializeSid, SetServiceStatus, ChangeServiceConfig2W, SetEntriesInAclW, DeleteService, SetServiceObjectSecurity, ControlService, FreeSid, StartServiceW, RegQueryValueExW, InitializeSecurityDescriptor, RegOpenKeyExW, RegSetValueExW, StartServiceCtrlDispatcherW, OpenServiceW, RegCloseKey, LookupAccountSidW, QueryServiceObjectSecurity, SetSecurityInfo, DeregisterEventSource, RegisterEventSourceW, RegisterServiceCtrlHandlerExW
WS2_32.dllconnect, WSAGetLastError, WSACleanup, accept, bind, closesocket, shutdown, listen, freeaddrinfo, getaddrinfo, WSAStartup, getsockname, send, socket, ntohs, recv
OLE32.DLLCoUninitialize, CoInitializeEx, CoCreateInstance
SETUPAPI.DLLCM_Get_Device_Interface_ListA, CM_Get_Device_Interface_ListW, CM_Get_Device_Interface_List_SizeW, CM_Get_Device_Interface_List_SizeA
RPCRT4.dllUuidToStringA, UuidCreate, RpcStringFreeA
api-ms-win-devices-config-l1-1-1.dllCM_Unregister_Notification, CM_Register_Notification
OLEAUT32.dllSysAllocString, VariantClear, VariantInit, GetErrorInfo, SafeArrayGetUBound, SysFreeString
NameOrdinalAddress
TEE_Transport_Create10x14002a2d0
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

  • File
  • Registry
  • Network

Click to dive into process behavior distribution

Target ID:0
Start time:18:07:43
Start date:19/09/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd /c sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe" >> C:\servicereg.log 2>&1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:18:07:43
Start date:19/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:18:07:43
Start date:19/09/2024
Path:C:\Windows\SysWOW64\sc.exe
Wow64 process (32bit):true
Commandline:sc create EEPwq binpath= "C:\Users\user\Desktop\jhi_service.exe"
Imagebase:0xfc0000
File size:61'440 bytes
MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:3
Start time:18:07:43
Start date:19/09/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd /c sc start EEPwq >> C:\servicestart.log 2>&1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:18:07:43
Start date:19/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:18:07:43
Start date:19/09/2024
Path:C:\Windows\SysWOW64\sc.exe
Wow64 process (32bit):true
Commandline:sc start EEPwq
Imagebase:0xfc0000
File size:61'440 bytes
MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:6
Start time:18:07:43
Start date:19/09/2024
Path:C:\Users\user\Desktop\jhi_service.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\jhi_service.exe
Imagebase:0x7ff612eb0000
File size:628'608 bytes
MD5 hash:4708F291E40C2F7678E6367E97A04A58
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

No disassembly