Edit tour

Windows Analysis Report
pdfskills.exe

Overview

General Information

Sample name:pdfskills.exe
Analysis ID:1556594
MD5:3fed63ba4527b108772f0b932d48a875
SHA1:66bce2303a39e2f676502e5c77d3d3746730f33b
SHA256:2dc119979db7af6999e4e003cdd827987f5d60035049a8f9998a66eda1864453
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • pdfskills.exe (PID: 8064 cmdline: "C:\Users\user\Desktop\pdfskills.exe" MD5: 3FED63BA4527B108772F0B932D48A875)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: pdfskills.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 198.71.59.132:443 -> 192.168.2.10:49721 version: TLS 1.2
Source: pdfskills.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: POST /v6 HTTP/1.1Content-Type: text/plain; charset=utf-8Host: val.skillcli.comContent-Length: 88Expect: 100-continueConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: val.skillcli.com
Source: unknownHTTP traffic detected: POST /v6 HTTP/1.1Content-Type: text/plain; charset=utf-8Host: val.skillcli.comContent-Length: 88Expect: 100-continueConnection: Keep-Alive
Source: pdfskills.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: pdfskills.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: pdfskills.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: pdfskills.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: pdfskills.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: pdfskills.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: pdfskills.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: pdfskills.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: pdfskills.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: pdfskills.exe, 00000000.00000002.3152168133.000001F800795000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F8005EE000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F800422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/Belongings/dmsans-bold.ttf
Source: pdfskills.exe, 00000000.00000002.3152168133.000001F800795000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F800422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/Belongings/dmsans-regular.ttf
Source: pdfskills.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: pdfskills.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: pdfskills.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: pdfskills.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: pdfskills.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: pdfskills.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: pdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: pdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scripts.sil.org/OFL
Source: pdfskills.exe, 00000000.00000002.3155175729.000001F86F305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://scripts.sil.org/OFLRegular
Source: pdfskills.exeString found in binary or memory: http://scripts.sil.org/OFLThis
Source: pdfskills.exeString found in binary or memory: http://scripts.sil.org/OFLhttps://rsms.me/Rasmus
Source: pdfskills.exeString found in binary or memory: http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophon
Source: pdfskills.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: pdfskills.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: pdfskills.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: pdfskills.exe, 00000000.00000002.3155175729.000001F86F305000.00000004.00000020.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.colophon-foundry.org
Source: pdfskills.exe, 00000000.00000002.3155175729.000001F86F305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.colophon-foundry.org3
Source: pdfskills.exeString found in binary or memory: https://cbn.skillcli.com/r
Source: pdfskills.exeString found in binary or memory: https://cbn.skillcli.com/rA52463134d0765d83ac49f98f9aib5c6e
Source: pdfskills.exeString found in binary or memory: https://cnvr.pdfskillspro.com/api/convert/
Source: pdfskills.exeString found in binary or memory: https://github.com/rsms/inter)
Source: pdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rsms.me/
Source: pdfskills.exeString found in binary or memory: https://val.skillcli.com/v6#
Source: pdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://val.skillcli.com/v6h
Source: pdfskills.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: pdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.indiantypefoundry.com
Source: pdfskills.exeString found in binary or memory: https://www.pdfskillsapp.com/farewell
Source: pdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.pdfskillsapp.com/privacy-policy
Source: pdfskills.exeString found in binary or memory: https://www.pdfskillsapp.com/privacy-policy?
Source: pdfskills.exe, 00000000.00000002.3152168133.000001F800422000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.pdfskillsapp.com/terms
Source: pdfskills.exeString found in binary or memory: https://www.pdfskillsapp.com/terms?
Source: pdfskills.exeString found in binary or memory: https://www.pdfskillsapp.com/thanks?userid=
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownHTTPS traffic detected: 198.71.59.132:443 -> 192.168.2.10:49721 version: TLS 1.2
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFEB1F950_2_00007FF7BFEB1F95
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFEB8E690_2_00007FF7BFEB8E69
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFEB912E0_2_00007FF7BFEB912E
Source: pdfskills.exeStatic PE information: No import functions for PE file found
Source: pdfskills.exe, 00000000.00000000.1305178010.000001F86CB22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUninstall.exe4 vs pdfskills.exe
Source: pdfskills.exe, 00000000.00000000.1305178010.000001F86CB22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePDFSkillsApp.exe: vs pdfskills.exe
Source: pdfskills.exeBinary or memory string: OriginalFilenameUninstall.exe4 vs pdfskills.exe
Source: pdfskills.exeBinary or memory string: OriginalFilenamePDFSkillsApp.exe: vs pdfskills.exe
Source: pdfskills.exe, ProcessPathFinder.csBase64 encoded string: 'QzpcUHJvZ3JhbSBGaWxlcyAoeDg2KVxHb29nbGVcQ2hyb21lXEFwcGxpY2F0aW9uXGNocm9tZS5leGU=', 'QzpcUHJvZ3JhbSBGaWxlc1xHb29nbGVcQ2hyb21lXEFwcGxpY2F0aW9uXGNocm9tZS5leGU='
Source: classification engineClassification label: clean4.winEXE@1/2@1/1
Source: C:\Users\user\Desktop\pdfskills.exeFile created: C:\Users\user\AppData\Local\PDFSkillsJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeMutant created: NULL
Source: pdfskills.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: pdfskills.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\pdfskills.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: pdfskills.exeString found in binary or memory: $settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -StartWhenAvailable -RestartCount 2 -RestartInterval (New-TimeSpan -Minutes 10) -RunOnlyIfNetworkAvailable
Source: pdfskills.exeString found in binary or memory: "rc/add_circle.png
Source: pdfskills.exeString found in binary or memory: rc/loader.png
Source: pdfskills.exeString found in binary or memory: /RC/loader.png
Source: pdfskills.exeString found in binary or memory: /RC/add_circle.png
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: msvcp140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: msctfui.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41945702-8302-44A6-9445-AC98E8AFA086}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\pdfskills.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: pdfskills.exeStatic PE information: certificate valid
Source: pdfskills.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: pdfskills.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: pdfskills.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: pdfskills.exeStatic file information: File size 2302744 > 1048576
Source: pdfskills.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x22ae00
Source: pdfskills.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: pdfskills.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: pdfskills.exeStatic PE information: 0x8DE70604 [Sat Jun 10 17:16:52 2045 UTC]
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFD9D2A5 pushad ; iretd 0_2_00007FF7BFD9D2A6
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFEB00BD pushad ; iretd 0_2_00007FF7BFEB00C1
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFEB57F0 pushad ; iretd 0_2_00007FF7BFEB57FD
Source: C:\Users\user\Desktop\pdfskills.exeCode function: 0_2_00007FF7BFEC5CB0 push FFFFFFE8h; retf 0_2_00007FF7BFEC5CF1
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeMemory allocated: 1F86D080000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeMemory allocated: 1F86EB20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeWindow / User API: threadDelayed 1294Jump to behavior
Source: C:\Users\user\Desktop\pdfskills.exe TID: 7444Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exe TID: 7444Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeThread delayed: delay time: 100000Jump to behavior
Source: pdfskills.exe, 00000000.00000002.3156854271.000001F86F72D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\pdfskills.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeQueries volume information: C:\Users\user\Desktop\pdfskills.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pdfskills.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory32
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1556594 Sample: pdfskills.exe Startdate: 15/11/2024 Architecture: WINDOWS Score: 4 8 val.skillcli.com 2->8 5 pdfskills.exe 14 6 2->5         started        process3 dnsIp4 10 val.skillcli.com 198.71.59.132, 443, 49721 ONEANDONE-ASBrauerstrasse48DE United States 5->10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
pdfskills.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.indiantypefoundry.com0%Avira URL Cloudsafe
http://www.colophon-foundry.org0%Avira URL Cloudsafe
http://www.colophon-foundry.org30%Avira URL Cloudsafe
http://scripts.sil.org/OFLRegular0%Avira URL Cloudsafe
https://val.skillcli.com/v60%Avira URL Cloudsafe
http://defaultcontainer/Belongings/dmsans-regular.ttf0%Avira URL Cloudsafe
http://defaultcontainer/Belongings/dmsans-bold.ttf0%Avira URL Cloudsafe
https://val.skillcli.com/v6#0%Avira URL Cloudsafe
https://cbn.skillcli.com/rA52463134d0765d83ac49f98f9aib5c6e0%Avira URL Cloudsafe
https://cbn.skillcli.com/r0%Avira URL Cloudsafe
https://val.skillcli.com/v6h0%Avira URL Cloudsafe
https://cnvr.pdfskillspro.com/api/convert/0%Avira URL Cloudsafe
http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophon0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
val.skillcli.com
198.71.59.132
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://val.skillcli.com/v6false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.pdfskillsapp.com/privacy-policy?pdfskills.exefalse
      high
      https://www.indiantypefoundry.compdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.pdfskillsapp.com/privacy-policypdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://www.pdfskillsapp.com/farewellpdfskills.exefalse
          high
          https://www.pdfskillsapp.com/thanks?userid=pdfskills.exefalse
            high
            http://www.colophon-foundry.orgpdfskills.exe, 00000000.00000002.3155175729.000001F86F305000.00000004.00000020.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://scripts.sil.org/OFLhttps://rsms.me/Rasmuspdfskills.exefalse
              high
              https://cbn.skillcli.com/rpdfskills.exefalse
              • Avira URL Cloud: safe
              unknown
              http://scripts.sil.org/OFLRegularpdfskills.exe, 00000000.00000002.3155175729.000001F86F305000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://rsms.me/pdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.colophon-foundry.org3pdfskills.exe, 00000000.00000002.3155175729.000001F86F305000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://defaultcontainer/Belongings/dmsans-regular.ttfpdfskills.exe, 00000000.00000002.3152168133.000001F800795000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F800422000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cbn.skillcli.com/rA52463134d0765d83ac49f98f9aib5c6epdfskills.exefalse
                • Avira URL Cloud: safe
                unknown
                http://defaultcontainer/Belongings/dmsans-bold.ttfpdfskills.exe, 00000000.00000002.3152168133.000001F800795000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F8005EE000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F800422000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://val.skillcli.com/v6#pdfskills.exefalse
                • Avira URL Cloud: safe
                unknown
                https://www.pdfskillsapp.com/termspdfskills.exe, 00000000.00000002.3152168133.000001F800422000.00000004.00000800.00020000.00000000.sdmp, pdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://github.com/rsms/inter)pdfskills.exefalse
                    high
                    https://val.skillcli.com/v6hpdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophonpdfskills.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://scripts.sil.org/OFLpdfskills.exe, 00000000.00000002.3158252184.000001F873212000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepdfskills.exe, 00000000.00000002.3152168133.000001F800001000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://scripts.sil.org/OFLThispdfskills.exefalse
                          high
                          https://cnvr.pdfskillspro.com/api/convert/pdfskills.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.pdfskillsapp.com/terms?pdfskills.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            198.71.59.132
                            val.skillcli.comUnited States
                            8560ONEANDONE-ASBrauerstrasse48DEfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1556594
                            Start date and time:2024-11-15 17:34:51 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 27s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Run name:Run with higher sleep bypass
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:pdfskills.exe
                            Detection:CLEAN
                            Classification:clean4.winEXE@1/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 67%
                            • Number of executed functions: 2
                            • Number of non-executed functions: 3
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: pdfskills.exe
                            No simulations
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ONEANDONE-ASBrauerstrasse48DEPROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                            • 217.76.156.252
                            xd.x86.elfGet hashmaliciousMiraiBrowse
                            • 104.192.6.97
                            wavjjT3sEq.exeGet hashmaliciousFormBookBrowse
                            • 217.160.0.231
                            Arrival Notice.exeGet hashmaliciousFormBookBrowse
                            • 217.160.0.60
                            mNtu4X8ZyE.exeGet hashmaliciousEmotetBrowse
                            • 87.106.46.107
                            75A0VTo3z9.exeGet hashmaliciousEmotetBrowse
                            • 87.106.46.107
                            New PO [FK4-7173].pdf.exeGet hashmaliciousFormBookBrowse
                            • 217.160.0.220
                            Digiturk.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 217.160.0.3
                            hiss.mpsl.elfGet hashmaliciousUnknownBrowse
                            • 217.160.158.130
                            AWB_NO_907853880911.exeGet hashmaliciousFormBookBrowse
                            • 217.160.0.60
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0eQUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                            • 198.71.59.132
                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 198.71.59.132
                            http://portableapps.comGet hashmaliciousUnknownBrowse
                            • 198.71.59.132
                            Order88983273293729387293828PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 198.71.59.132
                            file.exeGet hashmaliciousLummaCBrowse
                            • 198.71.59.132
                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 198.71.59.132
                            grd.ps1Get hashmaliciousLummaC StealerBrowse
                            • 198.71.59.132
                            SAMPLE_PHOTO.jsGet hashmaliciousAgentTeslaBrowse
                            • 198.71.59.132
                            Email_sending_restriction_[sebastien.morel!](#HOHSM).htmlGet hashmaliciousUnknownBrowse
                            • 198.71.59.132
                            BankInformation.vbeGet hashmaliciousAgentTeslaBrowse
                            • 198.71.59.132
                            No context
                            Process:C:\Users\user\Desktop\pdfskills.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):36
                            Entropy (8bit):3.409256168518586
                            Encrypted:false
                            SSDEEP:3:qTrHtPTBEkHXE:mHtdHXE
                            MD5:CF07F3538FC8BAC60AF9F4E442CEE0D2
                            SHA1:F54601A639E1184E97736C7B5ED3079FA261E052
                            SHA-256:6E436BA78F8947A963D0B984F0954C2738D42FF024A10476B6AEDFF7B9DBD79D
                            SHA-512:2B2CA40845C2A74617C1A94AA2F9B014A18095AD3A919960545FE7C7BEF479DBEF3ED3EA2B3EACCF429712856CB2C88651D767AF74D89650CEDE75FAAC137910
                            Malicious:false
                            Reputation:low
                            Preview:b1fd5cfa-faff-48be-adb8-6daab60bceba
                            Process:C:\Users\user\Desktop\pdfskills.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):36
                            Entropy (8bit):3.409256168518586
                            Encrypted:false
                            SSDEEP:3:qTrHtPTBEkHXE:mHtdHXE
                            MD5:CF07F3538FC8BAC60AF9F4E442CEE0D2
                            SHA1:F54601A639E1184E97736C7B5ED3079FA261E052
                            SHA-256:6E436BA78F8947A963D0B984F0954C2738D42FF024A10476B6AEDFF7B9DBD79D
                            SHA-512:2B2CA40845C2A74617C1A94AA2F9B014A18095AD3A919960545FE7C7BEF479DBEF3ED3EA2B3EACCF429712856CB2C88651D767AF74D89650CEDE75FAAC137910
                            Malicious:false
                            Reputation:low
                            Preview:b1fd5cfa-faff-48be-adb8-6daab60bceba
                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.405466142742989
                            TrID:
                            • Win64 Executable GUI Net Framework (217006/5) 49.88%
                            • Win64 Executable GUI (202006/5) 46.43%
                            • Win64 Executable (generic) (12005/4) 2.76%
                            • Generic Win/DOS Executable (2004/3) 0.46%
                            • DOS Executable Generic (2002/1) 0.46%
                            File name:pdfskills.exe
                            File size:2'302'744 bytes
                            MD5:3fed63ba4527b108772f0b932d48a875
                            SHA1:66bce2303a39e2f676502e5c77d3d3746730f33b
                            SHA256:2dc119979db7af6999e4e003cdd827987f5d60035049a8f9998a66eda1864453
                            SHA512:90243c85b16cb2b8914ef1ee8e81ea08a3e63dfbeb45d7d0c0e32074bc986516684c3d9971bb54f41922122cf9a37075be2bb8730e5a524191238c4d9cbc9b7a
                            SSDEEP:49152:md3Z/5f/udku1TST6yPcCeXb7sO90lwBdGTZt:Qx3cU2ykCeXnsQ0lwqT/
                            TLSH:78B57A82B212830AFD0F19F5E6D2B353E332AB41A613910A6674255CCB5FDA43FD619F
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..."..D........... .....@..... .......................@#......M#...`...@......@............... .....
                            Icon Hash:9a69692961696992
                            Entrypoint:0x140000000
                            Entrypoint Section:
                            Digitally signed:true
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x8DE70604 [Sat Jun 10 17:16:52 2045 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:
                            Signature Valid:true
                            Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                            Signature Validation Error:The operation completed successfully
                            Error Number:0
                            Not Before, Not After
                            • 26/02/2024 13:58:14 26/02/2025 13:58:14
                            Subject Chain
                            • E=info@redrootltd.com, CN=RED ROOT LTD, O=RED ROOT LTD, L=Ra'anana, S=Central District, C=IL, OID.1.3.6.1.4.1.311.60.2.1.3=IL, SERIALNUMBER=516201936, OID.2.5.4.15=Private Organization
                            Version:3
                            Thumbprint MD5:CCA8C7C0D7D068E3C661F22323A4D633
                            Thumbprint SHA-1:D9AFF96830351EB0B8B219729D110822448FE511
                            Thumbprint SHA-256:A42662C6527B001411F9DE4E72A48E7EA8E37E0339035F3248E97DC2F0F69C2D
                            Serial:6838E670EA30DFA3294EA278
                            Instruction
                            dec ebp
                            pop edx
                            nop
                            add byte ptr [ebx], al
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x22e0000x43e8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x22f4000x2f18.rsrc
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x22cda00x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x22adbc0x22ae00c7f92b99c70a59c88b27aff21d10da05unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x22e0000x43e80x4400a1c7a947b2952b139b3c395d234656dfFalse0.166015625data4.140947489466721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x22e1400x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.28812056737588654
                            RT_ICON0x22e5b80x1128Device independent bitmap graphic, 32 x 64 x 32, image size 00.13866120218579234
                            RT_ICON0x22f6f00x2668Device independent bitmap graphic, 48 x 96 x 32, image size 00.11706672091131001
                            RT_GROUP_ICON0x231d680x30data0.8541666666666666
                            RT_VERSION0x231da80x382data0.4309576837416481
                            RT_MANIFEST0x23213c0x2a7XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5213549337260678

                            Download Network PCAP: filteredfull

                            • Total Packets: 11
                            • 443 (HTTPS)
                            • 53 (DNS)
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 15, 2024 17:35:49.345591068 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:49.345649004 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:49.345710039 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:49.388816118 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:49.388834000 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.097004890 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.097239971 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:50.101021051 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:50.101033926 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.101344109 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.149038076 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:50.166068077 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:50.207340002 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.367703915 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.387240887 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:50.387250900 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.713149071 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.713629007 CET44349721198.71.59.132192.168.2.10
                            Nov 15, 2024 17:35:50.713692904 CET49721443192.168.2.10198.71.59.132
                            Nov 15, 2024 17:35:50.722104073 CET49721443192.168.2.10198.71.59.132
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 15, 2024 17:35:49.299200058 CET5046153192.168.2.101.1.1.1
                            Nov 15, 2024 17:35:49.333242893 CET53504611.1.1.1192.168.2.10
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Nov 15, 2024 17:35:49.299200058 CET192.168.2.101.1.1.10xd111Standard query (0)val.skillcli.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Nov 15, 2024 17:35:49.333242893 CET1.1.1.1192.168.2.100xd111No error (0)val.skillcli.com198.71.59.132A (IP address)IN (0x0001)false
                            • val.skillcli.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.1049721198.71.59.1324438064C:\Users\user\Desktop\pdfskills.exe
                            TimestampBytes transferredDirectionData
                            2024-11-15 16:35:50 UTC152OUTPOST /v6 HTTP/1.1
                            Content-Type: text/plain; charset=utf-8
                            Host: val.skillcli.com
                            Content-Length: 88
                            Expect: 100-continue
                            Connection: Keep-Alive
                            2024-11-15 16:35:50 UTC25INHTTP/1.1 100 Continue
                            2024-11-15 16:35:50 UTC88OUTData Raw: 47 31 4d 43 55 31 59 46 55 56 55 43 46 46 42 55 55 67 55 61 42 67 45 41 56 68 55 45 58 46 56 64 46 51 39 63 41 46 55 41 41 31 52 57 55 6c 5a 58 55 78 38 44 42 46 4d 4d 44 67 63 42 55 51 63 4c 44 56 73 44 43 31 49 4b 47 46 77 4d 44 67 70 5a 42 6c 6f 44 55 77 3d 3d
                            Data Ascii: G1MCU1YFUVUCFFBUUgUaBgEAVhUEXFVdFQ9cAFUAA1RWUlZXUx8DBFMMDgcBUQcLDVsDC1IKGFwMDgpZBloDUw==
                            2024-11-15 16:35:50 UTC192INHTTP/1.1 200 OK
                            Content-Type: application/json;charset=ISO-8859-1
                            Date: Fri, 15 Nov 2024 16:35:50 GMT
                            Server: Nginx
                            Vary: Accept-Encoding
                            Connection: close
                            Transfer-Encoding: chunked
                            2024-11-15 16:35:50 UTC522INData Raw: 32 30 33 0d 0a 22 48 41 4e 31 46 77 6f 41 57 31 6c 5a 58 31 31 51 52 30 70 54 54 46 39 59 56 78 45 46 41 42 30 42 65 52 4d 46 43 77 4a 56 56 41 35 51 43 51 59 46 46 41 51 44 41 6c 73 66 44 41 51 45 41 52 6c 57 55 46 77 43 46 51 41 41 43 41 55 45 42 56 30 43 57 51 52 52 44 78 45 46 41 42 30 41 65 78 4d 46 43 31 56 55 52 6c 46 64 56 6b 55 53 43 77 59 53 41 58 6b 58 44 58 51 53 44 6e 59 53 41 41 70 59 54 56 74 48 62 56 56 56 58 6c 30 58 43 67 51 53 43 6e 55 53 42 33 6f 58 44 58 49 53 43 33 63 53 41 41 70 52 54 55 56 44 56 6c 6c 39 52 31 56 43 48 51 51 46 48 41 64 32 56 46 6c 65 53 31 4d 53 43 33 63 53 41 41 70 66 55 56 74 53 62 55 31 48 56 78 30 41 43 68 4d 45 65 42 45 46 41 46 6c 43 53 46 70 65 57 6c 56 44 57 31 64 63 48 51 52 78 56 6c 64 44 56 30 77 66 53
                            Data Ascii: 203"HAN1FwoAW1lZX11QR0pTTF9YVxEFAB0BeRMFCwJVVA5QCQYFFAQDAlsfDAQEARlWUFwCFQAACAUEBV0CWQRRDxEFAB0AexMFC1VURlFdVkUSCwYSAXkXDXQSDnYSAApYTVtHbVVVXl0XCgQSCnUSB3oXDXISC3cSAApRTUVDVll9R1VCHQQFHAd2VFleS1MSC3cSAApfUVtSbU1HVx0AChMEeBEFAFlCSFpeWlVDW1dcHQRxVldDV0wfS
                            2024-11-15 16:35:50 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            050100150s020406080100

                            Click to jump to process

                            050100150s0.0020406080MB

                            Click to jump to process

                            • File
                            • Registry
                            • Network

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:11:35:46
                            Start date:15/11/2024
                            Path:C:\Users\user\Desktop\pdfskills.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\pdfskills.exe"
                            Imagebase:0x1f86cb20000
                            File size:2'302'744 bytes
                            MD5 hash:3FED63BA4527B108772F0B932D48A875
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                            Execution Graph

                            Execution Coverage

                            Dynamic/Packed Code Coverage

                            Signature Coverage

                            Execution Coverage:9.4%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:3
                            Total number of Limit Nodes:0
                            Show Legend
                            Hide Nodes/Edges
                            execution_graph 7426 7ff7bfec459c 7427 7ff7bfec45a5 LoadLibraryExW 7426->7427 7429 7ff7bfec464d 7427->7429

                            Executed Functions

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 106 7ff7bfec459c-7ff7bfec45a3 107 7ff7bfec45a5-7ff7bfec45ad 106->107 108 7ff7bfec45ae-7ff7bfec460f 106->108 107->108 110 7ff7bfec4611-7ff7bfec4616 108->110 111 7ff7bfec4619-7ff7bfec464b LoadLibraryExW 108->111 110->111 112 7ff7bfec4653-7ff7bfec467a 111->112 113 7ff7bfec464d 111->113 113->112
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3159751686.00007FF7BFEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7bfeb0000_pdfskills.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: a8ee120660fef809c4e8494fdba17463eb74290059847636625023a91bd293fa
                            • Instruction ID: ac1d7737bd1e242ce82b075bf175e291422abc42d2add209910724b7b1ac77d6
                            • Opcode Fuzzy Hash: a8ee120660fef809c4e8494fdba17463eb74290059847636625023a91bd293fa
                            • Instruction Fuzzy Hash: 4E31013190CA4C8FDB19DF9C9849BE9BBF0EF66320F04422BD049C3252DB74A805CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3159224741.00007FF7BFD9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFD9D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7bfd9d000_pdfskills.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fe6e20c4212a671822c630ae56298d81bdfa47cb49a2f62d0080a84425376bb
                            • Instruction ID: 716a8a81320b006e4e34b471751e45c9a7a761cb9f67977eefa70bf77831f7b0
                            • Opcode Fuzzy Hash: 2fe6e20c4212a671822c630ae56298d81bdfa47cb49a2f62d0080a84425376bb
                            • Instruction Fuzzy Hash: E141043080DBC44FD756AB2DD8559927FB0EF53320B1906EFD088CB1A7D625A84AC7E2

                            Non-executed Functions

                            Memory Dump Source
                            • Source File: 00000000.00000002.3159751686.00007FF7BFEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7bfeb0000_pdfskills.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 13436b48f7357938437aa6f4cff738b68054c4540c07e686cdd250172e397392
                            • Instruction ID: bf72b3ec107b79250f05f24caf6386cfbab6151091262f9f5926853f443cf54f
                            • Opcode Fuzzy Hash: 13436b48f7357938437aa6f4cff738b68054c4540c07e686cdd250172e397392
                            • Instruction Fuzzy Hash: 4B917E6050EAC5AFE343A7B854175E97BE1EF876203CA45FDD0898F0ABC62D5C8B8750
                            Memory Dump Source
                            • Source File: 00000000.00000002.3159751686.00007FF7BFEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7bfeb0000_pdfskills.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c031d08816b9b812f39e4907a7ff3312713186c4b11be61ff6ac8510b013a1fd
                            • Instruction ID: 3f9c1618a4d6f9deccd7f30f6a8de71c33ec864e2001467f72747e757b012240
                            • Opcode Fuzzy Hash: c031d08816b9b812f39e4907a7ff3312713186c4b11be61ff6ac8510b013a1fd
                            • Instruction Fuzzy Hash: 9591B36060EBC56FE342A7B8542B5E97BE1EF876203CA45FDC0898F0A7D61C5C8B8751
                            Memory Dump Source
                            • Source File: 00000000.00000002.3159751686.00007FF7BFEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7bfeb0000_pdfskills.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8af6f03ba5ad22eb3da46b853cacb519f3063f1671accde1c6bbb9314e967e5d
                            • Instruction ID: 0cc62074cb8722e265de8d8dc9cfc08c61cf18a043143539ae3859fce5b22f46
                            • Opcode Fuzzy Hash: 8af6f03ba5ad22eb3da46b853cacb519f3063f1671accde1c6bbb9314e967e5d
                            • Instruction Fuzzy Hash: 048181A7A0D6D25FE313A76C98E60E57B60EFA3A2474902F3D5C48B0A7E91C1807D771