Windows
Analysis Report
imfsbSvc.exe
Overview
General Information
Sample name: | imfsbSvc.exe |
Analysis ID: | 1564516 |
MD5: | ca73da8345de507ac023d52b4b5c1814 |
SHA1: | ef32667de23715ef2903b185c08ed9b5dc7cfeed |
SHA256: | 5b88f7d36fe435cd6944bda05f1758f64c7d5136a5f529a58522ac3b0dc9743a |
Infos: |
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- cmd.exe (PID: 6588 cmdline:
cmd /c sc create rJx yS binpath = "C:\User s\user\Des ktop\imfsb Svc.exe" > > C:\servi cereg.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6824 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 6944 cmdline:
sc create rJxyS binp ath= "C:\U sers\user\ Desktop\im fsbSvc.exe " MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
- cmd.exe (PID: 732 cmdline:
cmd /c sc start rJxy S >> C:\se rvicestart .log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5252 cmdline:
sc start r JxyS MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
- imfsbSvc.exe (PID: 4960 cmdline:
C:\Users\u ser\Deskto p\imfsbSvc .exe MD5: CA73DA8345DE507AC023D52B4B5C1814)
- cleanup
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Click to jump to signature section
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Driver loaded: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process created: |
Malware Analysis System Evasion |
---|
Source: | Binary or memory string: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Service Execution | 1 Windows Service | 1 Windows Service | 12 Process Injection | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 2 LSASS Driver | 2 LSASS Driver | 1 DLL Side-Loading | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 DLL Side-Loading | 12 Process Injection | Obfuscated Files or Information | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1564516 |
Start date and time: | 2024-11-28 13:03:54 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run as Windows Service |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | imfsbSvc.exe |
Detection: | MAL |
Classification: | mal48.evad.winEXE@9/2@0/0 |
Cookbook Comments: |
|
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: imfsbSvc.exe
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 28 |
Entropy (8bit): | 3.678439190827718 |
Encrypted: | false |
SSDEEP: | 3:4A4AnXjzSv:4HAnXjg |
MD5: | A8F4D690C5BDE96AD275C7D4ABE0E3D3 |
SHA1: | 7C62C96EFD2CA4F3C3EBF0B24C9B5B4C04A4570A |
SHA-256: | 596CCC911C1772735AAC6A6B756A76D3D55BCECD006B980CF147090B2243FA7B |
SHA-512: | A875EBE3C5CDF222FF9D08576F4D996AF827A1C86B3E758CE23F6B33530D512A82CE8E39E519837512080C6212A0A19B3385809BE5F5001C4E488DD79550B852 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 421 |
Entropy (8bit): | 3.524264899601009 |
Encrypted: | false |
SSDEEP: | 6:lg3D/8F/dldgVKBRjGxVVLvH2s/u8qLLFmLaZnsHgm66//V+NmBNefq:lgAddrgV0qVbH2suZLQqOVKmBNcq |
MD5: | 29257B01CE5B8D1DF85BE23B08340F89 |
SHA1: | 25BAF3D0A63B65D088BF9E9856DB2BCF131B11FA |
SHA-256: | E064F0652AE5D3F1B8AE8F16ECA63CBED5ACBE0F71DA3E8229058199AEC7EF8C |
SHA-512: | DF5C4D51CBB0EB1E4AD6841C825C346599BB54C443D0DD17D51CE076026BF782EE8AD1CCE26A5308A0A944B3B7B78E72321FB0B01C62F1A1740005EF7E67255B |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.337397239640206 |
TrID: |
|
File name: | imfsbSvc.exe |
File size: | 347'344 bytes |
MD5: | ca73da8345de507ac023d52b4b5c1814 |
SHA1: | ef32667de23715ef2903b185c08ed9b5dc7cfeed |
SHA256: | 5b88f7d36fe435cd6944bda05f1758f64c7d5136a5f529a58522ac3b0dc9743a |
SHA512: | b5140ef135e8cafc7a6c3b7aaa514612e3ea6a25653c925385421c2bbba75cd51bd228ac5c671de383555658573293c1e20a93950ae1be52e86da6780aee4339 |
SSDEEP: | 6144:ZEtNasNqZsBotlNFVK12krBAixDbJeRG+2RzV5F0Xmbv9OiLLMyc5:ZEtNYZ3tlNFVo24AixPJqavLZc5 |
TLSH: | E6747D45F3E418E5EA6BC13989A3D51BE67278111760DBDF0370826A3F23BD16A3DB21 |
File Content Preview: | MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......f..."..."...".....1.'.....3.......2.,....8..#.......*.......6............g..+....g..:.......!..."...........#.......7.....?.#.. |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x14001f170 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6139C8DD [Thu Sep 9 08:42:05 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | e20cce52935dcbdf120d0fe332168d10 |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert EV Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 627EB5F58AA7BB5E49C3ED2D92DD61FD |
Thumbprint SHA-1: | C2D65E12D4FC8DB328577D74F4BD417FEC0F28B1 |
Thumbprint SHA-256: | 0686186695953609414F4D551738F90203E37E2E651CBB2E7CDB6F033E0EB155 |
Serial: | 0D98F5DF96C592C5B76BFDE1CB823096 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F0B911CB030h |
dec eax |
add esp, 28h |
jmp 00007F0B911CA9B7h |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
dec eax |
mov eax, edx |
dec eax |
lea ecx, dword ptr [0001C9C9h] |
dec eax |
mov dword ptr [ebx], ecx |
dec eax |
lea edx, dword ptr [ebx+08h] |
xor ecx, ecx |
dec eax |
mov dword ptr [edx], ecx |
dec eax |
mov dword ptr [edx+08h], ecx |
dec eax |
lea ecx, dword ptr [eax+08h] |
call 00007F0B911CD909h |
dec eax |
lea eax, dword ptr [0001CA59h] |
dec eax |
mov dword ptr [ebx], eax |
dec eax |
mov eax, ebx |
dec eax |
add esp, 20h |
pop ebx |
ret |
int3 |
xor eax, eax |
dec eax |
mov dword ptr [ecx+10h], eax |
dec eax |
lea eax, dword ptr [0001CA4Fh] |
dec eax |
mov dword ptr [ecx+08h], eax |
dec eax |
lea eax, dword ptr [0001CA34h] |
dec eax |
mov dword ptr [ecx], eax |
dec eax |
mov eax, ecx |
ret |
int3 |
dec eax |
lea eax, dword ptr [0001C975h] |
dec eax |
mov dword ptr [ecx], eax |
dec eax |
add ecx, 08h |
jmp 00007F0B911CD952h |
int3 |
dec eax |
mov dword ptr [esp+08h], ebx |
push edi |
dec eax |
sub esp, 20h |
dec eax |
lea eax, dword ptr [0001C957h] |
dec eax |
mov edi, ecx |
dec eax |
mov dword ptr [ecx], eax |
mov ebx, edx |
dec eax |
add ecx, 08h |
call 00007F0B911CD92Fh |
test bl, 00000001h |
je 00007F0B911CAB3Fh |
mov edx, 00000018h |
dec eax |
mov ecx, edi |
call 00007F0B911CA4F5h |
dec eax |
mov eax, edi |
dec eax |
mov ebx, dword ptr [esp+30h] |
dec eax |
add esp, 20h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4893c | 0x118 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x53000 | 0x1fd0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x4e000 | 0x37a4 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x50c00 | 0x40d0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x55000 | 0x6a8 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x43b00 | 0x54 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x43b60 | 0x94 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x38000 | 0xcb8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x363a3 | 0x36400 | adaed845aa76e95b19ef6d1b9451fad4 | False | 0.5539449524769585 | data | 6.392642559878584 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x38000 | 0x135a8 | 0x13600 | 5f82a5eab9777181ed6c7c5b5e0435ee | False | 0.4251260080645161 | data | 5.113273953227112 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x4c000 | 0x1fb4 | 0xc00 | b219f7da6d9e6f8fc66fb1911b8d4f13 | False | 0.19108072916666666 | data | 2.5572052693801814 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x4e000 | 0x37a4 | 0x3800 | 1e90241e3e01b5bbab8207d7289818f8 | False | 0.474609375 | data | 5.5830297706186185 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.gfids | 0x52000 | 0xe4 | 0x200 | 28b7de2b64e0f9465b393905f515b86f | False | 0.328125 | Linux/i386 core file of '\' (signal 55) | 2.0399083813350414 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x53000 | 0x1fd0 | 0x2000 | a4de5172aee8728eca667ce5837ba7e3 | False | 0.4366455078125 | data | 4.546132680078495 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x55000 | 0x6a8 | 0x800 | 1bb762a032ac4543e7d043213ed3acb2 | False | 0.57666015625 | data | 5.002880185935442 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_RCDATA | 0x53100 | 0x1a00 | PE32+ executable (DLL) (GUI) x86-64, for MS Windows | English | United States | 0.4307391826923077 |
RT_VERSION | 0x54b00 | 0x34c | data | English | United States | 0.47393364928909953 |
RT_MANIFEST | 0x54e50 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
imfsbDll.dll | SbieDll_IsOpenClsid, SbieApi_IsBoxEnabled, SbieDll_RunSandboxed, SbieApi_CallZero, SbieApi_CallOne, SbieApi_GetVersion, SbieApi_GetWork, SbieApi_GetHomePath, SbieApi_EnumProcessEx, SbieApi_SetUserName, SbieApi_GetUnmountHive, SbieDll_FormatMessage2, SbieDll_ComCreateStub, SbieDll_RunFromHome, SbieApi_QueryProcess, SbieDll_PortName, SbieApi_QueryProcessPath, SbieApi_QueryProcessEx2, SbieApi_QueryProcessInfo, SbieApi_QueryPathList, SbieDll_KillOne, SbieDll_FreeMem, SbieDll_QueueCreate, SbieDll_QueueGetReq, SbieDll_QueuePutRpl, SbieApi_QueryConf, SbieApi_CheckInternetAccess, SbieApi_QueryConfBool, SbieApi_CallTwo, SbieApi_SessionLeader, SbieApi_LogEx, SbieApi_Log, SbieApi_ReloadConf, SbieApi_OpenProcess, SbieDll_GetLanguage, SbieDll_FormatMessage0, SbieDll_GetServiceRegistryValue |
ntdll.dll | NtWriteFile, RtlLookupFunctionEntry, RtlVirtualUnwind, RtlUnwindEx, RtlPcToFileHeader, NtReadFile, NtSetInformationFile, NtQueryInformationFile, NtQueryDirectoryFile, NtCreateFile, RtlSetDaclSecurityDescriptor, RtlNtStatusToDosError, NtAllocateVirtualMemory, NtLoadDriver, RtlInitUnicodeString, NtReplyWaitReceivePort, NtRequestPort, NtCreatePort, NtUnloadKey, NtOpenKey, NtOpenFile, NtClose, NtQueryKey, NtQuerySystemInformation, NtLoadKey, RtlCreateSecurityDescriptor, NtQueryInformationProcess, NtSetInformationThread, NtOpenProcessToken, NtOpenThreadToken, NtQueryInformationToken, NtDuplicateToken, NtFilterToken, NtConnectPort, NtRequestWaitReplyPort, NtAcceptConnectPort, NtCompleteConnectPort, NtImpersonateClientOfPort, NtOpenDirectoryObject, NtSetInformationProcess, NtOpenProcess, NtDuplicateObject, RtlCaptureContext |
KERNEL32.dll | EncodePointer, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, IsDebuggerPresent, UnhandledExceptionFilter, CloseHandle, GetLastError, HeapCreate, HeapAlloc, HeapFree, GetProcessHeap, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, SetEvent, WaitForSingleObject, CreateMutexW, OpenMutexW, CreateEventW, OpenEventW, Sleep, ExitProcess, TerminateProcess, CreateThread, GetCurrentThread, OpenProcess, GetTickCount, CreateFileMappingW, OpenFileMappingW, MapViewOfFile, UnmapViewOfFile, GetProcAddress, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, LocalFree, WaitForMultipleObjects, GetEnvironmentVariableW, TlsFree, GetFullPathNameW, GetPrivateProfileStringW, CreateFileW, SetFilePointer, WriteFile, OutputDebugStringW, DuplicateHandle, SetLastError, GetProcessTimes, GetCurrentProcess, SetThreadPriority, TerminateThread, GetLocalTime, GetVersionExW, VirtualAlloc, VirtualFree, VirtualAllocEx, VirtualProtectEx, ReadProcessMemory, WriteProcessMemory, GetModuleHandleA, LoadResource, LockResource, SizeofResource, LocalAlloc, FindResourceW, GetSystemWindowsDirectoryW, ResetEvent, GetCurrentProcessId, GetCurrentThreadId, ProcessIdToSessionId, IsProcessInJob, GetModuleHandleW, GlobalSize, LoadLibraryW, RegisterWaitForSingleObject, UnregisterWait, CreateJobObjectW, AssignProcessToJobObject, QueryInformationJobObject, SetInformationJobObject, AllocConsole, GetConsoleWindow, GetConsoleProcessList, RaiseException, InitializeCriticalSectionAndSpinCount, GetCommandLineW, GetSystemInfo, CancelIo, DefineDosDeviceW, OpenThread, TlsAlloc, TlsGetValue, TlsSetValue, ResumeThread, QueueUserWorkItem, GetExitCodeProcess, DeleteFileW, GetFileAttributesW, SetEndOfFile, SetFileAttributesW, HeapReAlloc, GetWindowsDirectoryW, CopyFileW, SuspendThread, CreateProcessW, GetModuleFileNameW, MulDiv, FreeLibrary, LoadLibraryExW, GetStringTypeW, GetModuleHandleExW, GetModuleFileNameA, MultiByteToWideChar, WideCharToMultiByte, GetStdHandle, GetACP, GetFileType, LCMapStringW, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, HeapSize, GetConsoleCP, GetConsoleMode, SetFilePointerEx, FlushFileBuffers, SetCurrentDirectoryW, WriteConsoleW |
USER32.dll | GetClassLongPtrA, GetClassLongPtrW, GetDesktopWindow, GetParent, EnumChildWindows, FindWindowA, FindWindowW, FindWindowExA, FindWindowExW, GetShellWindow, EnumWindows, EnumThreadWindows, GetClassNameA, GetClassNameW, GetWindowThreadProcessId, GetWindow, GetIconInfo, ChangeDisplaySettingsExA, ChangeDisplaySettingsExW, MonitorFromWindow, GetWindowInfo, UserHandleGrantAccess, PackDDElParam, RegisterClassExW, ShowWindow, BeginPaint, EndPaint, GetMonitorInfoW, GetClientRect, GetPropW, GetPropA, SetPropW, ReleaseDC, GetDC, GetClassLongW, IsWindowEnabled, IsWindowUnicode, KillTimer, EnumClipboardFormats, GetClipboardData, GetClipboardSequenceNumber, IsZoomed, IsIconic, IsWindowVisible, SetWindowPos, DestroyWindow, IsWindow, CreateWindowExW, RegisterClassW, DefWindowProcW, PostMessageW, PostMessageA, SendNotifyMessageW, SendNotifyMessageA, SendMessageTimeoutW, SendMessageW, SendMessageA, GetProcessWindowStation, SetProcessWindowStation, CreateWindowStationW, GetThreadDesktop, SetThreadDesktop, CreateDesktopW, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, SetTimer, DispatchMessageW, GetMessageW, wsprintfW, GetClassLongA, GetWindowLongPtrW, GetWindowLongPtrA, GetWindowLongW, GetWindowLongA, MapWindowPoints, ScreenToClient, ClientToScreen, ClipCursor, SetCursorPos, SetForegroundWindow, GetWindowRect |
ADVAPI32.dll | CreateProcessAsUserW, OpenThreadToken, DuplicateTokenEx, OpenProcessToken, AdjustTokenPrivileges, LookupAccountSidW, LookupPrivilegeValueW, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, ConvertStringSidToSidW, ConvertStringSecurityDescriptorToSecurityDescriptorW, RegOpenUserClassesRoot, RegOpenCurrentUser, GetSecurityDescriptorSacl, GetTokenInformation, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetTokenInformation, SetSecurityInfo, CloseServiceHandle, ControlService, EnumServicesStatusExW, OpenSCManagerW, OpenServiceW, StartServiceW, OpenEventLogW, ReportEventW, RegisterServiceCtrlHandlerExW, SetServiceStatus, StartServiceCtrlDispatcherW, RevertToSelf, SetThreadToken, AddAccessAllowedAce, DuplicateToken, GetLengthSid, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, CryptAcquireContextW, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, QueryServiceStatusEx, QueryServiceConfig2W, CryptHashData, CryptDestroyHash, EnumServicesStatusW, QueryServiceConfigW |
PSAPI.DLL | GetModuleBaseNameW, EnumProcessModules |
ole32.dll | CreateStreamOnHGlobal, CoInitializeEx, CoInitialize, CoRevokeClassObject, CoRegisterClassObject, CoGetObject, CoTaskMemFree, StringFromGUID2, CoCopyProxy, CoSetProxyBlanket, CoQueryProxyBlanket, CoInitializeSecurity, CoUnmarshalInterface, CoMarshalInterface, CoGetClassObject |
CRYPT32.dll | CryptProtectData, CryptUnprotectData |
USERENV.dll | CreateEnvironmentBlock, DestroyEnvironmentBlock |
GDI32.dll | TextOutW, DeleteDC, GetDIBits, GetMetaFileBitsEx, GetEnhMetaFileBits, CreateFontW, CreateSolidBrush, GetDeviceCaps, SelectObject, SetBkColor, CreateCompatibleDC, SetTextColor |
NETAPI32.dll | NetUseAdd |
WTSAPI32.dll | WTSQueryUserToken |
RPCRT4.dll | RpcStringFreeW, RpcBindingToStringBindingW, RpcMgmtEpEltInqBegin, RpcMgmtEpEltInqDone, RpcMgmtEpEltInqNextW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 07:04:41 |
Start date: | 28/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 07:04:41 |
Start date: | 28/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 07:04:41 |
Start date: | 28/11/2024 |
Path: | C:\Windows\SysWOW64\sc.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 61'440 bytes |
MD5 hash: | D9D7684B8431A0D10D0E76FE9F5FFEC8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 3 |
Start time: | 07:04:42 |
Start date: | 28/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 07:04:42 |
Start date: | 28/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 07:04:42 |
Start date: | 28/11/2024 |
Path: | C:\Windows\SysWOW64\sc.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 61'440 bytes |
MD5 hash: | D9D7684B8431A0D10D0E76FE9F5FFEC8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 07:04:42 |
Start date: | 28/11/2024 |
Path: | C:\Users\user\Desktop\imfsbSvc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6e9c20000 |
File size: | 347'344 bytes |
MD5 hash: | CA73DA8345DE507AC023D52B4B5C1814 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |