Windows
Analysis Report
Tools.chm
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
- hh.exe (PID: 2452 cmdline:
"C:\Window s\hh.exe" C:\Users\u ser\Deskto p\Tools.ch m MD5: 2C8FE78D53C8CA27523A71DFD2938241)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Masquerading | OS Credential Dumping | 1 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Virtualization/Sandbox Evasion | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1566858 |
Start date and time: | 2024-12-02 18:58:28 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Tools.chm |
Detection: | CLEAN |
Classification: | clean1.winCHM@1/7@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: Tools.chm
Time | Type | Description |
---|---|---|
12:59:21 | API Interceptor |
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 49120 |
Entropy (8bit): | 0.0017331682157558962 |
Encrypted: | false |
SSDEEP: | 3:Ztt:T |
MD5: | 0392ADA071EB68355BED625D8F9695F3 |
SHA1: | 777253141235B6C6AC92E17E297A1482E82252CC |
SHA-256: | B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7 |
SHA-512: | EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\blue_gradient_1024x24[1].jpg
Download File
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 856 |
Entropy (8bit): | 5.542372260188213 |
Encrypted: | false |
SSDEEP: | 24:tjnYjI/sU5fJTScvhemyEVccN+grRwfQ31FUcD:5YjI//hScBVccN+gr+/cD |
MD5: | F9FFA1A2A3F52679C7603077DEED4A68 |
SHA1: | 692744C333E3012C8063F20EB0F5BA721DB5485B |
SHA-256: | 301A6AF579625C056818FB2AA295C62DC76183EB9FFFC28BDF459564E4B12274 |
SHA-512: | 9ECD527957A8CF3FA7AFCC0EEB50F27B582E94CC4676365D8765FBF97603F6F9D170115C071B10D130B8279A0E8CEB847CD60ED846D13C778357950813E5C2F6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4128 |
Entropy (8bit): | 5.438941984264733 |
Encrypted: | false |
SSDEEP: | 96:s5SJCJBJHJ0JJ4JwJaGJWoI5JFbxW4Je+JdiJiQJiGqaNgF/BEV:g6K/p0HE8aeWoIXFbEEVdqici7aN8/Bi |
MD5: | CE9DF408BB2B70AB50C4093A5F5693D3 |
SHA1: | CC5742D649A97283294F3C3F945B3EFBDC444A0A |
SHA-256: | 0DC932B0F4ABF98FA4B2522A15995A47E03A4AAD5504141B7D69F968D39BF39F |
SHA-512: | 78C10A939A1371D67C143EAA05A94851C77D7C6CADBC78D01E53AEC3834CC04DE94E80D28214EC33E7224138F4BDA2CF4AA18CFC4F7F1738E5567ACA95EC4083 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8276 |
Entropy (8bit): | 0.6274991512679713 |
Encrypted: | false |
SSDEEP: | 12:m0l6eohI+KKe+KjK9zh+KlE/KlEvt+KlEvdX:SQ1V2FlEClEvt1lEvdX |
MD5: | 943D3CE711A5EBA4A01A9B4E8EDF1388 |
SHA1: | E8DFD5502B1413F4996CA43E2E76E45F2A32A1D7 |
SHA-256: | BBB45CCB31607F92D62EE94204B0E2E4CA802EA6AE6A7B8B6AEBFE99655FA920 |
SHA-512: | C969D0EF61FFAC73436EC7F094F9C737AD0F26D05EAA8AA506A919F31ACF22E237CBB088F7291C1883C8BF3ABE764F9895F921B4B37EE87A0353F8E4229E68E3 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.3613836054883338 |
Encrypted: | false |
SSDEEP: | 3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X |
MD5: | 679672A5004E0AF50529F33DB5469699 |
SHA1: | 427A4EC3281C9C4FAEB47A22FFBE7CA3E928AFB0 |
SHA-256: | 205D000AA762F3A96AC3AD4B25D791B5F7FC8EFB9056B78F299F671A02B9FD21 |
SHA-512: | F8615C5E5CF768A94E06961C7C8BEF99BEB43E004A882A4E384F5DD56E047CA59B963A59971F78DCF4C35D1BB92D3A9BC7055BFA3A0D597635DE1A9CE06A3476 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Windows\hh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8590 |
Entropy (8bit): | 0.7893000069151963 |
Encrypted: | false |
SSDEEP: | 12:om6ysNMqiNMvyc0Ke0l6eohI+KKe+KjK9zh+KlE/KlEvt+KlEvdX:2x5yc0JQ1V2FlEClEvt1lEvdX |
MD5: | 192472EC8B8BF628A64E607AB67B47D5 |
SHA1: | 798DB745C424ED1CE4904630C4D625EAAC47093A |
SHA-256: | 8D305C75DA32365C9CA9D95613E0E263FCB95AC25E7E5CFF0E79A7907BFB134D |
SHA-512: | 09205254B666035D2C89C10E99F8F76A8464D61406EC224D9D0B8EC3C51CE3CD7929983AAA33FC65B79D109E7D4D83C452B1C89B30D91B77C612F911F60B840E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.9937618044338645 |
TrID: |
|
File name: | Tools.chm |
File size: | 20'654 bytes |
MD5: | a2d8bd5d5663f55d04f0a7c707fd4519 |
SHA1: | cad4045a7db598c972741225cb2acf3da16dfb88 |
SHA256: | df3a27254716fcec426384f34ee4aec7ac5576e938f3dabc502c3a5fa18bfcef |
SHA512: | 346bc55ab1fa8c32670cef21d3ccfd89eba77630467413759b0f8ce0851dd75d0fe589e7ba1c10b8832c4e1a3aec996033fbb29c7c2b5d3269d83c924d9a3266 |
SSDEEP: | 384:RaliMj7MQe1CCsMHEySRY0Mzy3zAQ3xnvLnfDcLbAw0rXbMrxGK:RalPrtHySwqAQtznfQSrXsxL |
TLSH: | 1D92BF4123AA1202D1A68F3A3ED9FADDDE387D2EC7041215727FD53A9E48C0820D8EE5 |
File Content Preview: | ITSF....`.......G.'s.......|.{.......".....|.{......."..`...............x.......T........................P..............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...;.../#ITBITS.. |
Icon Hash: | 56b6ae4c1b2b1b08 |
Name | Type | Preview |
---|---|---|
html | directory | |
#TOPICS | Matlab v4 mat-file (little endian) , numeric, rows 4294967295, columns 36, imaginary | ....$.......................Q...0...........c...........(...k...<.......X...}...H.......l.............. |
#WINDOWS | data | ...................... %..................................................................................5...?........0.................................................................................. |
$WWAssociativeLinks | directory | |
#URLSTR | data | .........Table of Contents.hhc.........Index.hhk.........html/default.html.........html/license.html.........html/history.html.........html/PagefileConfig/default.html.........html/RemoteDelProf/default.html. |
$FIftiMain | data | ..(.....*..........*................................!......8... ...v......`........................................................................................................................................................................ |
Table of Contents.hhc | HTML document, ASCII text, with CRLF line terminators | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">..<HTML>..<HEAD>..<meta name="GENERATOR" content="Microsoft® HTML Help Workshop 4.1">..<!-- Sitemap 1.0 -->..</HEAD><BODY>..<OBJECT type="text/site properties">...<param name="Window Styles" value="0x |
Index.hhk | HTML document, ASCII text, with CRLF line terminators | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">..<HTML>..<HEAD>..<meta name="GENERATOR" content="Microsoft® HTML Help Workshop 4.1">..<!-- Sitemap 1.0 -->..</HEAD><BODY>..<UL>..</UL>..</BODY></HTML>.. |
$WWKeywordLinks | directory | |
#SYSTEM | data | ........5.J....HHA Version 4.74.8702...$......................'s.............html/default.html.....AutoIt Tools Help.....tools.....Help Window...................T#SMF.....................%.................... |
#URLTBL | data | ..........e!5....K...{.A........K........Qr....1...*.....e............ |
$OBJINST | X11 SNF font data, MSB first | ............_...w...$...bF.V.O.......................UU........................................................................................................................................................................................ |
#IDXHDR | data | T#SMF.....................%............................................................................................................................................................................................ |
#STRINGS | data | .Help Window.AutoIt Tools Help.Table of Contents.hhc.Index.hhk.html/default.html.AutoIt Tools Help.License.History.Utilities.PagefileConfig.RemoteDelProf. |
#ITBITS | empty |
Target ID: | 0 |
Start time: | 12:59:21 |
Start date: | 02/12/2024 |
Path: | C:\Windows\hh.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7ad460000 |
File size: | 18'432 bytes |
MD5 hash: | 2C8FE78D53C8CA27523A71DFD2938241 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |