Edit tour
Windows
Analysis Report
https://github.com/greenshot/greenshot/releases/download/Greenshot-RELEASE-1.2.10.6/Greenshot-INSTALLER-1.2.10.6-RELEASE.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected hidden input values containing email addresses (often used in phishing pages)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTML page contains hidden javascript code
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: Use Short Name Path in Command Line
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- cmd.exe (PID: 7232 cmdline:
C:\Windows \system32\ cmd.exe /c wget -t 2 -v -T 60 -P "C:\Use rs\user\De sktop\down load" --no -check-cer tificate - -content-d isposition --user-ag ent="Mozil la/5.0 (Wi ndows NT 6 .1; WOW64; Trident/7 .0; AS; rv :11.0) lik e Gecko" " https://gi thub.com/g reenshot/g reenshot/r eleases/do wnload/Gre enshot-REL EASE-1.2.1 0.6/Greens hot-INSTAL LER-1.2.10 .6-RELEASE .exe" > cm dline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7244 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wget.exe (PID: 7312 cmdline:
wget -t 2 -v -T 60 - P "C:\User s\user\Des ktop\downl oad" --no- check-cert ificate -- content-di sposition --user-age nt="Mozill a/5.0 (Win dows NT 6. 1; WOW64; Trident/7. 0; AS; rv: 11.0) like Gecko" "h ttps://git hub.com/gr eenshot/gr eenshot/re leases/dow nload/Gree nshot-RELE ASE-1.2.10 .6/Greensh ot-INSTALL ER-1.2.10. 6-RELEASE. exe" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
- Greenshot-INSTALLER-1.2.10.6-RELEASE.exe (PID: 1424 cmdline:
"C:\Users\ user\Deskt op\downloa d\Greensho t-INSTALLE R-1.2.10.6 -RELEASE.e xe" MD5: C16F86882D5A102ED7A0FBBC0874D102) - Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 5960 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\is-S 77MD.tmp\G reenshot-I NSTALLER-1 .2.10.6-RE LEASE.tmp" /SL5="$20 446,129302 7,131584,C :\Users\us er\Desktop \download\ Greenshot- INSTALLER- 1.2.10.6-R ELEASE.exe " MD5: D1A078992E232919EA834226AEA627A8) - _setup64.tmp (PID: 8068 cmdline:
helper 105 0x4F4 MD5: E4211D6D009757C078A9FAC7FF4F03D4) - conhost.exe (PID: 8076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ngen.exe (PID: 8116 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\n gen.exe" i nstall "C: \Program F iles\Green shot\Green shot.exe" MD5: B6C3FE33B436E5006514403824F17C66) - conhost.exe (PID: 8124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mscorsvw.exe (PID: 8172 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 1d4 - InterruptE vent 0 -NG ENProcess 1c4 -Pipe 1d0 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 1412 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 2a4 - InterruptE vent 0 -NG ENProcess 298 -Pipe 2a0 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 5732 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 2b4 - InterruptE vent 0 -NG ENProcess 2a8 -Pipe 2b0 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 968 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 1cc - InterruptE vent 0 -NG ENProcess 268 -Pipe 264 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 7128 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 2c4 - InterruptE vent 0 -NG ENProcess 2b8 -Pipe 2c0 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 7172 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 2c4 - InterruptE vent 0 -NG ENProcess 2ec -Pipe 2ac -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 7248 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 2f4 - InterruptE vent 0 -NG ENProcess 298 -Pipe 2e0 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 7324 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 1cc - InterruptE vent 0 -NG ENProcess 2cc -Pipe 274 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 7388 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 298 - InterruptE vent 0 -NG ENProcess 2dc -Pipe 2f4 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - ngen.exe (PID: 1504 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\n gen.exe" i nstall "C: \Program F iles\Green shot\Green shotPlugin .dll" MD5: B6C3FE33B436E5006514403824F17C66) - conhost.exe (PID: 3020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mscorsvw.exe (PID: 1748 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 1d0 - InterruptE vent 0 -NG ENProcess 1bc -Pipe 1cc -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 2176 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 240 - InterruptE vent 0 -NG ENProcess 1d8 -Pipe 234 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 2840 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 238 - InterruptE vent 0 -NG ENProcess 264 -Pipe 258 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 2516 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 238 - InterruptE vent 0 -NG ENProcess 25c -Pipe 264 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 7888 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 254 - InterruptE vent 0 -NG ENProcess 280 -Pipe 268 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 6212 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 250 - InterruptE vent 0 -NG ENProcess 278 -Pipe 260 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 2648 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 264 - InterruptE vent 0 -NG ENProcess 278 -Pipe 238 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - mscorsvw.exe (PID: 5696 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\ms corsvw.exe -StartupE vent 264 - InterruptE vent 0 -NG ENProcess 250 -Pipe 278 -Comme nt "NGen W orker Proc ess" MD5: 412A3FB0C25743DA59375C1E298933EA) - chrome.exe (PID: 968 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://g etgreensho t.org/than k-you/?lan guage=en&v ersion=1.2 .10.6 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92) - chrome.exe (PID: 7388 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2028 --fi eld-trial- handle=196 0,i,976411 5327004208 509,236793 6537875850 385,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92) - Greenshot.exe (PID: 6512 cmdline:
"C:\Progra m Files\Gr eenshot\Gr eenshot.ex e" /langua ge en MD5: 346D22939E3079901F0DFAC7ADD71C94)
- Greenshot.exe (PID: 6996 cmdline:
"C:\Progra m Files\Gr eenshot\Gr eenshot.ex e" MD5: 346D22939E3079901F0DFAC7ADD71C94) - GreenshotOCRCommand.exe (PID: 7076 cmdline:
"C:\Progra m Files\Gr eenshot\Pl ugins\Gree nshotOCRPl ugin\green shotocrcom mand.exe" -c MD5: 7FA84430DF989E08A34EAFDBA8C9B86E)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: frack113, Nasreddine Bencherchali: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T13:39:03.540452+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.7 | 49732 | 172.67.164.214 | 80 | TCP |
2024-12-10T13:39:05.202487+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.7 | 49733 | 172.67.164.214 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | Window detected: |