Windows
Analysis Report
wce.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- wce.exe (PID: 5304 cmdline:
"C:\Users\ user\Deskt op\wce.exe " MD5: 4FB08AD6583C2D44A098E325699789CB) - conhost.exe (PID: 1720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - lsass.exe (PID: 640 cmdline:
C:\Windows \system32\ lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A) - svchost.exe (PID: 2440 cmdline:
C:\Windows \system32\ svchost.ex e -k Netwo rkService -p -s Cryp tSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
iam_alt_iam_alt | Auto-generated rule - file iam-alt.exe | Florian Roth |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
iam_alt_iam_alt | Auto-generated rule - file iam-alt.exe | Florian Roth |
| |
iam_alt_iam_alt | Auto-generated rule - file iam-alt.exe | Florian Roth |
|
System Summary |
---|
Source: | Author: Teymur Kheirkhabarov, oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Code function: | 0_2_00165610 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_001674B0 |
Source: | File deleted: | Jump to behavior |
Source: | Code function: | 0_2_0017AC81 | |
Source: | Code function: | 0_2_00178D25 | |
Source: | Code function: | 0_2_00179276 | |
Source: | Code function: | 0_2_0016C6BF | |
Source: | Code function: | 0_2_00179EA3 | |
Source: | Code function: | 0_2_0016C2D7 | |
Source: | Code function: | 0_2_0016B6D2 | |
Source: | Code function: | 0_2_0016BF05 | |
Source: | Code function: | 0_2_0016BB67 | |
Source: | Code function: | 0_2_001797C7 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_001647A0 |
Source: | Code function: | 0_2_00167410 |
Source: | Code function: | 0_2_00163E30 |
Source: | Code function: | 0_2_00164DC0 |
Source: | Code function: | 0_2_00167890 |
Source: | Code function: | 0_2_00167890 |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00163FA0 |
Source: | Code function: | 0_2_0016F6E8 |
Persistence and Installation Behavior |
---|
Source: | Registry value created: | Jump to behavior | ||
Source: | Registry value created: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | Code function: | 0_2_00167890 |
Source: | Key value created or modified: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Evaded block: | graph_0-12346 |
Source: | Evasive API call chain: | graph_0-12479 |
Source: | Check user administrative privileges: | graph_0-13599 |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_0016F478 |
Source: | Code function: | 0_2_00163FA0 |
Source: | Code function: | 0_2_0017878B |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 0_2_0016F478 | |
Source: | Code function: | 0_2_00174E08 | |
Source: | Code function: | 0_2_0016AB1A |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 0_2_00163FA0 |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Code function: | 0_2_001683F0 |
Source: | Code function: | 0_2_00175329 |
Source: | Code function: | 0_2_00173C69 |
Source: | Code function: | 0_2_001634D0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Service Execution | 14 Windows Service | 1 Access Token Manipulation | 1 Modify Registry | OS Credential Dumping | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 4 Native API | 1 DLL Side-Loading | 14 Windows Service | 11 Virtualization/Sandbox Evasion | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 32 Process Injection | 1 Access Token Manipulation | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 32 Process Injection | NTDS | 2 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 3 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Install Root Certificate | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 File Deletion | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
89% | ReversingLabs | Win32.Hacktool.WinCredEd | ||
86% | Virustotal | Browse | ||
100% | Avira | TR/Gendal.6210125.5 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1302736 | ||
58% | ReversingLabs | Win32.Hacktool.WinCred |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | 217.20.58.98 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.221.95 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581372 |
Start date and time: | 2024-12-27 14:13:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 2 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | wce.exe |
Detection: | MAL |
Classification: | mal100.evad.winEXE@2/16@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 217.20.58.98, 192.229.221.95, 20.109.210.53, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
08:14:24 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fp2e7a.wpc.phicdn.net | Get hash | malicious | Gozi, Ursnif | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Iris Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | PureCrypter, PureLog Stealer | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Gozi, Ursnif | Browse |
| ||
Get hash | malicious | Dynamer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 471 |
Entropy (8bit): | 7.156295391825961 |
Encrypted: | false |
SSDEEP: | 12:JuGnPXPG5qPGy+PXs9fZoQYvrlz1dB+rXs9378Tb:JZXPGINKXeoQARvAs94Tb |
MD5: | ACD61F639CCB415A09197FE086D2873C |
SHA1: | 49049A623FEC36623BA104F8787E2EBC2879FB8D |
SHA-256: | 549A945A63FA842CC86ABE6C5802705C583C58E53BA9D40B53885B6FEAAA9D9B |
SHA-512: | F5679C06958CAD73E60EBBF441F2729EF5B20BEB856312EE67FB4C3A560B9984AA5D98F203A343C61281A1E32796F55CEF11870FFD6210C1E887C042225F741B |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 471 |
Entropy (8bit): | 7.268468978894918 |
Encrypted: | false |
SSDEEP: | 12:JuGe25qPGu0M09f4xVbK1ACOrnq87T92VmK0sRO33Zb:J/IKcxVb0ACO7q8760JF |
MD5: | 5B893B223421743BCC9F6ECEF25EC015 |
SHA1: | 036F17B237CB2FDEA6B221FD5DE9E599AE8FEEE9 |
SHA-256: | CDD88E3893A7CBF989C868D097A234D987E9302F7DBE67EE0647154DD80705E1 |
SHA-512: | 0DA7B6BEEC2D8C4251FF1DE5662D5B66C043E9AF20CC06FA4EFD7F7464E50CEB7A9B982DA23648245B6790DEF833A190747FE9A904442BD0F06D20FB9B06BFD6 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 471 |
Entropy (8bit): | 7.243589743174413 |
Encrypted: | false |
SSDEEP: | 12:JuGnPY5qPGJpiPY67N0RVpqWN95Eqc8TylXbn:JZYIAuv7WjNjWlLn |
MD5: | A4B8E9C05A62131AAEA2E28B49AFEE69 |
SHA1: | 01D1B9B45300C75F644F80FA7D07B45A36C2C8C2 |
SHA-256: | AAABDEE16F3D16840257D1DBFFB70E4C28B0E78DE1CFD6EF7992E8383A901408 |
SHA-512: | 45ED79A6C603792412A7DC6EE444A61AA2659D6E387976E90EB96354CE0A714CE57D542CEFD5947AAE322D500B7A0F50661EB7B94FB3925F1735AE0510643E33 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7796 |
Entropy (8bit): | 7.971943145771426 |
Encrypted: | false |
SSDEEP: | 192:CPTIWKvNnUBBBL05O/b0evl2G6AXK+KMlYX82:CbevNUBDLlz0eN2dAXlKH |
MD5: | FB60E1AFE48764E6BF78719C07813D32 |
SHA1: | A1DC74EF8495C9A1489DD937659B5C2875027E16 |
SHA-256: | EBF3E7290B8FD1E5509CAA69335251F22B61BAF3F9FF87B4E8544F3C1FEA279D |
SHA-512: | 92BAA53445EC1A6EC049AF875783619D255AB4A46241B456BD87AE0043C117740BD117406E2CF5440840C68D0C573CBA7B40F58587CE7796D254D0B06E9B7973 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.2218938275801796 |
Encrypted: | false |
SSDEEP: | 6:kKWsK81F9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:U0sDnLNkPlE99SNxAhUe/3 |
MD5: | 292DA2B0E9743162BB6229FDC919A459 |
SHA1: | 4B5DD24FABC462A09B81E1D8BE6F88D5EBB766DC |
SHA-256: | 3A617DA4E6F2CD49B6F905F6EFB32691D72C5F59CA8912F8694E41BA1402F392 |
SHA-512: | 2B9B4670DA287760EA0C87F1D4506697D693C45AABA4D445805BCD7533FF58D211C0FC2083ADE194E993699B0B886EE25121F4BD8DF93D6D14E21D654DE37B13 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 412 |
Entropy (8bit): | 3.6711660697208983 |
Encrypted: | false |
SSDEEP: | 6:kK9tG4+EszyfXlRNfOAUMivhClroFFKIhipStaHAaloq09Slscqsn:ldIsmxMiv8sFFKbpgal7BlSs |
MD5: | 05D3BCEC9F9E8F6362E25CE470A2619F |
SHA1: | 9C7222CCFDEC895B6680F86A305A47C3FCC8916A |
SHA-256: | 488A97B1CAA0A193EEA0B41A53115D683C8EF54C20DD9CBC02ECD9CF36D6EEAC |
SHA-512: | BC858A98FC5E034948A30F18B20B849425C256B81DF8BB47CCECFC30F02C3CE01A8BB6BE06AD7A69F54E9C57EA8A0B5B4012817898FD6D9DA36047C7AE6EC70E |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 412 |
Entropy (8bit): | 3.6754677651963403 |
Encrypted: | false |
SSDEEP: | 6:kKk5U+agk3skHXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsQ30P7v+eWAkrn:phvmxMiv8sFFKbpgal7BlD30PLRWAkr |
MD5: | 223853D9FD05BC97744DC4312E42BC9B |
SHA1: | EAB15A0CD97FE2E970051D73CAD56D5C7007F112 |
SHA-256: | 5FE6C75520B93ED95E29F4537BD33144A26BF74C2BAB36E9822FEEE7FB1F6BCB |
SHA-512: | 89C0B5CC949838777A9D4F80E3DD80AEE1D20319266B1D10AA211A85DAA8A35F69266054D35358578EC9D0F22B92B6B2EFF81FA76CBC76E8920A1F6B11544E81 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 412 |
Entropy (8bit): | 3.672744077231722 |
Encrypted: | false |
SSDEEP: | 6:kKaV3sXvHXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsbhQ6Shlrn:83svhmxMiv8sFFKbpgal7BlwhZg |
MD5: | 584EC63471BF09709C5D364D1E08ED0E |
SHA1: | C5CB1B10DFF8A8140977FCD1D4027666E0C26FAD |
SHA-256: | 68F295B708E05176DF629122D3D334911B5EE0C9A30342918A717E9192807F08 |
SHA-512: | 0D9C85BB9621A0927EA2BEDD5D0A19D1124598F5F3C25CD0D16394CBD631F2CD3946889C32CF98482F740528B154CCAE8E86824EBD08E1EF7A554595A6395195 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 330 |
Entropy (8bit): | 3.2174781523358154 |
Encrypted: | false |
SSDEEP: | 6:kK0K81wNScN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:L0VkPlE99Si1QyIeek |
MD5: | AA3BEB54E9D4932BC592FBA6C29B979D |
SHA1: | 85BC56F8052AE16006864FF064246B76E76C8970 |
SHA-256: | 11B5AD4689AB8DC7EA48E2C34CCAAC6BBCBA5C3A7E216FEBA5F277944B30B72F |
SHA-512: | B1BFC98E571DACF867DB7388FC97DF0D30C2C93736AF200536166F7FF627635B86F5D6D304ED41A11CAFB6501586F091663C063E2820D8B1D82814AD42957090 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\wce.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53248 |
Entropy (8bit): | 6.155087357851567 |
Encrypted: | false |
SSDEEP: | 768:TJUftYR1gkq7cbwcLrqFtAjlHTbLnXSiJUJchhvPkfmnhEDyURR2K0:GftYhq7Ew2qM9Tv/hvPjrFF |
MD5: | 8B5D6BA099F8D2C44DB68B7FD47687C7 |
SHA1: | C18BCCEB050BDB4E634B2441876D1BC0BABC6176 |
SHA-256: | 64725AFDC6209DB9A5639AE4EC6004BA40FB6EC80F8F1CA5A4759FB414DA8BA6 |
SHA-512: | F08C14A216DE18FC203BECC7D260DE92A6DD6B9AD15352FA053C29B6C7B555E19A70FF76F264CC11B6D3233C3ACC6562124A66C4ED8016AD485EA7FAB379EE91 |
Malicious: | true |
Antivirus: |
|
Preview: |
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 338 |
Entropy (8bit): | 3.961493788271842 |
Encrypted: | false |
SSDEEP: | 6:kKi37S7e2cYJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:uS7yzkPlE99SCQl2DUevat |
MD5: | 8223DC28F1887BE62EC96D6ACC6FDD9A |
SHA1: | D2DA1391454E9B390D4E8E936098B0BE6D42CCC6 |
SHA-256: | C28BEAD58A3F615C97C852870F128B169BF113D48239786474CDD39420C53101 |
SHA-512: | 3BC7341A0386F85CB8ABD18D684FE5E092855CC8FB2809B875AB04CC46D7D05BB3624A33AA53D6B26835F64C6113074656CDBEC5972F78B88FDDA8942458CC68 |
Malicious: | false |
Preview: |
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 412 |
Entropy (8bit): | 3.9533807210408023 |
Encrypted: | false |
SSDEEP: | 6:kKftrO8sYe8kt2alXlRNfOAUMivhClroFFKIhipStaHAaloq09Sls8hW0XSW83n:Q1zmxMiv8sFFKbpgal7BlvTCN3 |
MD5: | 403FD57E5937F72267433567648E2A90 |
SHA1: | FBB1A62A4D119F0510165726A98CBFA34E1762F2 |
SHA-256: | A8F5ED766619476DA171E502C1460314F0B09084DAD854AA01113F89436A849A |
SHA-512: | A364021E0ABB42BF8C187284D8052910D446ADCC4BA2B2ABCF3B9FE0AA94708D68E0D35975F98DBAD852A55D6C21FF85B3F6629738F79760C2D84D03E0E036E3 |
Malicious: | false |
Preview: |
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 412 |
Entropy (8bit): | 3.9077266318075377 |
Encrypted: | false |
SSDEEP: | 6:kKftsElvXJty4/lXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsbhQ6Shlrn:WMjy4/zmxMiv8sFFKbpgal7BlwhZg |
MD5: | 44F0B87844CBE1A7A1C74E90B8B97B50 |
SHA1: | 3A7EFD734AC2CE88C931C6FA8CE959B36DB37236 |
SHA-256: | 325C6189DC349B0FEEC71078289CBEA0B3FF83BF68C3EF1CAEA45E61CA2BE1F4 |
SHA-512: | CDB7A547CB680F18D30A77641452120172434971BE8B15E509A0FFE2F257D7BCAADDA5540D704592FBEC24BC81D98E98313DFE753157E26884F8F0480B55952C |
Malicious: | false |
Preview: |
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Download File
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | modified |
Size (bytes): | 330 |
Entropy (8bit): | 3.427004540064023 |
Encrypted: | false |
SSDEEP: | 6:kKh7EtK8k38uScN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:VrukPlE99Si1QyIeek |
MD5: | 06F08EC86263D3065CE8672C2F428D89 |
SHA1: | 5C033FFDD5872C35E0D6DC48B04FECEB39EB56BB |
SHA-256: | 490C4FE9A4987662AC10123E82093DF526231334CAA97CAB0E72B7B57D940C6F |
SHA-512: | 5C83A62FEC04F6A1DC5CFC148397E8C00E1CF2C20CA79E8328A5CD999364D648DEC0812F9493CD7EA45796E012887E61859B986DEC1F95C5AC5AD990A930157B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\wce.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 195 |
Entropy (8bit): | 4.869421196460925 |
Encrypted: | false |
SSDEEP: | 6:suTkT53GPF8FiY1QX8FwFtoQf/NQErVHONXi:suT4GPF8bFwvoIR9D |
MD5: | 385377B4C9661E7BFE2517F3F6C8D4F4 |
SHA1: | 925B48A8F81A1E46089A847873E6CE8318806389 |
SHA-256: | 62FAEFE221084BC17AAFC4DE728C3907DBBB8C3C3734F2F4ED6D15933D58EE34 |
SHA-512: | B1AB11240C8E1E07019AAC8233B794DC7487AA5BF1C4D6AFD54D8680C59EE1A5B2444B7D45B5517216E9D2E2554A70040B455A313A703128A9022F26C3988657 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.463466926901483 |
TrID: |
|
File name: | wce.exe |
File size: | 199'680 bytes |
MD5: | 4fb08ad6583c2d44a098e325699789cb |
SHA1: | 76af4d288f66b71f7cd275d4e71d6010ac0feeea |
SHA256: | 5884f3fc15c710fb754f31c368acaf37582ab1d63125233fd3cb91d50a9098af |
SHA512: | 4175ca0866e8752afe71b3b3fd59c2dcfb5b1e6af288fbf17ce1b34b494e0b2426ef2f2b449e540c41f8b9b4d69e8047e09c49af244b22756f76e3a4ed16811c |
SSDEEP: | 3072:ECtjouR0BeV8nI7Xgn1wimOFLnmJLJPq9vcqIw2qkNJF0c:ECK60kV97XSwi3DRsqk |
TLSH: | C9147B21B280C032E196007495A5C772AE397D335BB154C7BFD25EBA8E692F5E63831F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...G~..G~..G~.N....G~..1...G~..1...G~..?...G~..G..FG~..1..IG~..1...G~..1...G~.Rich.G~.........PE..L......M................... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40e73c |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4DAC1CD4 [Mon Apr 18 11:13:24 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 6bfe09efcb4ffde061ebdbafc4db84cf |
Instruction |
---|
call 00007FCAD86D2D2Dh |
jmp 00007FCAD86CBFDAh |
mov edi, edi |
push ebp |
mov ebp, esp |
push esi |
mov esi, dword ptr [ebp+08h] |
push esi |
call 00007FCAD86CD703h |
push eax |
call 00007FCAD86D2DAEh |
pop ecx |
pop ecx |
test eax, eax |
je 00007FCAD86CC1BEh |
call 00007FCAD86CAD05h |
add eax, 20h |
cmp esi, eax |
jne 00007FCAD86CC146h |
xor eax, eax |
jmp 00007FCAD86CC151h |
call 00007FCAD86CACF5h |
add eax, 40h |
cmp esi, eax |
jne 00007FCAD86CC1A2h |
xor eax, eax |
inc eax |
inc dword ptr [0042390Ch] |
test dword ptr [esi+0Ch], 0000010Ch |
jne 00007FCAD86CC190h |
push ebx |
push edi |
lea edi, dword ptr [00423920h+eax*4] |
cmp dword ptr [edi], 00000000h |
mov ebx, 00001000h |
jne 00007FCAD86CC162h |
push ebx |
call 00007FCAD86CF88Dh |
pop ecx |
mov dword ptr [edi], eax |
test eax, eax |
jne 00007FCAD86CC155h |
lea eax, dword ptr [esi+14h] |
push 00000002h |
mov dword ptr [esi+08h], eax |
mov dword ptr [esi], eax |
pop eax |
mov dword ptr [esi+18h], eax |
mov dword ptr [esi+04h], eax |
jmp 00007FCAD86CC14Fh |
mov edi, dword ptr [edi] |
mov dword ptr [esi+08h], edi |
mov dword ptr [esi], edi |
mov dword ptr [esi+18h], ebx |
mov dword ptr [esi+04h], ebx |
or dword ptr [esi+0Ch], 00001102h |
xor eax, eax |
pop edi |
inc eax |
pop ebx |
jmp 00007FCAD86CC144h |
xor eax, eax |
pop esi |
pop ebp |
ret |
mov edi, edi |
push ebp |
mov ebp, esp |
cmp dword ptr [ebp+08h], 00000000h |
je 00007FCAD86CC169h |
push esi |
mov esi, dword ptr [ebp+0Ch] |
test dword ptr [esi+0Ch], 00001000h |
je 00007FCAD86CC15Bh |
push esi |
call 00007FCAD86CD6AFh |
and dword ptr [esi+0Ch], 000000FFh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1e07c | 0x64 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x27000 | 0xd070 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35000 | 0x15a0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x1db70 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1c000 | 0x25c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1a0f6 | 0x1a200 | 739513d765a82a727a8611e8c4308d55 | False | 0.5308107805023924 | data | 6.550717743060654 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x1c000 | 0x2e36 | 0x3000 | 120f1771b9cf8cbc6d219e6c2a503561 | False | 0.3384602864583333 | data | 4.977139552757257 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x1f000 | 0x7078 | 0x4800 | 74b2ac3e4a9c8948e083a10cf9565897 | False | 0.3193901909722222 | data | 5.29215301201221 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x27000 | 0xd070 | 0xd200 | 4b4950aeddca7e89d55402368be39ba4 | False | 0.49125744047619047 | data | 6.119202783400186 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x35000 | 0x1bca | 0x1c00 | 38484abc43b956eff993de5d5095e7e7 | False | 0.6501116071428571 | data | 5.851907466520541 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
BINARY | 0x27070 | 0xd000 | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows | English | United States | 0.4951171875 |
DLL | Import |
---|---|
ADVAPI32.dll | AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, GetTokenInformation, NotifyChangeEventLog, OpenEventLogA, GetNumberOfEventLogRecords, GetOldestEventLogRecord, ReadEventLogA, CryptGetHashParam, CryptDestroyHash, CryptHashData, CryptReleaseContext, CryptCreateHash, CryptAcquireContextA, CloseServiceHandle, CreateServiceA, OpenSCManagerA, DeleteService, QueryServiceStatus, OpenServiceA, StartServiceA, ControlService, SetServiceStatus, RegisterServiceCtrlHandlerA, StartServiceCtrlDispatcherA, RegCloseKey, RegSetValueExA, RegOpenKeyExA, RegDeleteValueA, RegQueryValueExA, OpenThreadToken |
Secur32.dll | LsaFreeReturnBuffer, LsaGetLogonSessionData, LsaEnumerateLogonSessions |
WS2_32.dll | ntohl, ntohs, htonl |
KERNEL32.dll | CreateFileW, GetProcessHeap, SetEndOfFile, WriteConsoleW, SetEnvironmentVariableA, CompareStringW, DeleteFileA, GetModuleHandleA, OpenProcess, Sleep, SetConsoleCtrlHandler, GetCurrentDirectoryA, GetTempPathA, GetVersionExA, ProcessIdToSessionId, GetCurrentProcessId, GetModuleFileNameA, Process32Next, CloseHandle, Process32First, CreateToolhelp32Snapshot, ReadProcessMemory, WaitForSingleObject, CreateRemoteThread, VirtualFreeEx, WriteProcessMemory, VirtualAllocEx, GetProcAddress, LoadLibraryA, GetCurrentProcess, TerminateProcess, MultiByteToWideChar, UnmapViewOfFile, MapViewOfFile, CreateFileMappingA, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, FreeResource, ResetEvent, GetLastError, CreateEventA, ReadFile, FreeLibrary, GetSystemWindowsDirectoryA, SetEvent, CreateThread, WriteFile, WaitNamedPipeA, DisconnectNamedPipe, FlushFileBuffers, ConnectNamedPipe, CreateNamedPipeA, WideCharToMultiByte, FileTimeToSystemTime, FileTimeToLocalFileTime, GetCurrentThread, GetModuleHandleW, ExitProcess, DecodePointer, HeapFree, HeapAlloc, EncodePointer, EnterCriticalSection, LeaveCriticalSection, HeapReAlloc, GetCommandLineA, HeapSetInformation, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, RtlUnwind, LoadLibraryW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, GetModuleFileNameW, HeapCreate, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetConsoleCP, GetConsoleMode, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, SetFilePointer, SetStdHandle, LCMapStringW, GetStringTypeW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 27, 2024 14:14:21.504282951 CET | 1.1.1.1 | 192.168.2.5 | 0x6ab7 | No error (0) | default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:21.504282951 CET | 1.1.1.1 | 192.168.2.5 | 0x6ab7 | No error (0) | 217.20.58.98 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:21.504282951 CET | 1.1.1.1 | 192.168.2.5 | 0x6ab7 | No error (0) | 217.20.58.101 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:21.504282951 CET | 1.1.1.1 | 192.168.2.5 | 0x6ab7 | No error (0) | 217.20.58.99 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:21.504282951 CET | 1.1.1.1 | 192.168.2.5 | 0x6ab7 | No error (0) | 217.20.58.100 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:23.638422966 CET | 1.1.1.1 | 192.168.2.5 | 0x2625 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:23.638422966 CET | 1.1.1.1 | 192.168.2.5 | 0x2625 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:36.600439072 CET | 1.1.1.1 | 192.168.2.5 | 0x89c0 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 27, 2024 14:14:36.600439072 CET | 1.1.1.1 | 192.168.2.5 | 0x89c0 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:14:01 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\wce.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x160000 |
File size: | 199'680 bytes |
MD5 hash: | 4FB08AD6583C2D44A098E325699789CB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 08:14:01 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 08:14:01 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\lsass.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff654c90000 |
File size: | 59'456 bytes |
MD5 hash: | A1CC00332BBF370654EE3DC8CDC8C95A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |
Target ID: | 5 |
Start time: | 08:14:22 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e52b0000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Execution Graph
Execution Coverage: | 6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 2.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 102 |
Graph
Function 00163FA0 Relevance: 103.7, APIs: 47, Strings: 12, Instructions: 463libraryinjectionloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00165610 Relevance: 45.7, APIs: 23, Strings: 3, Instructions: 192encryptionfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00165DD0 Relevance: 281.0, APIs: 94, Strings: 66, Instructions: 978libraryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00162A50 Relevance: 138.8, APIs: 49, Strings: 30, Instructions: 598filesleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00164840 Relevance: 21.1, APIs: 6, Strings: 6, Instructions: 73libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00161880 Relevance: 18.2, APIs: 12, Instructions: 246COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001683F0 Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 55pipeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167410 Relevance: 7.6, APIs: 5, Instructions: 58COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167890 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00174E08 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0016C6BF Relevance: .4, Instructions: 355COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0016C2D7 Relevance: .3, Instructions: 349COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0016BF05 Relevance: .3, Instructions: 332COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0016BB67 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0016A520 Relevance: 86.0, APIs: 31, Strings: 18, Instructions: 288libraryloaderthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001649C0 Relevance: 84.3, APIs: 41, Strings: 7, Instructions: 325libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001699F0 Relevance: 66.8, APIs: 24, Strings: 14, Instructions: 308timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00170DAC Relevance: 42.1, APIs: 19, Strings: 5, Instructions: 109libraryloadermemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001678D0 Relevance: 31.6, APIs: 14, Strings: 4, Instructions: 136filepipeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167AC0 Relevance: 31.6, APIs: 15, Strings: 3, Instructions: 134filepipeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00168550 Relevance: 29.8, APIs: 9, Strings: 8, Instructions: 52libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167E30 Relevance: 28.1, APIs: 13, Strings: 3, Instructions: 141fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001636E0 Relevance: 26.4, APIs: 11, Strings: 4, Instructions: 111sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167190 Relevance: 24.6, APIs: 7, Strings: 7, Instructions: 64libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167C90 Relevance: 22.8, APIs: 10, Strings: 3, Instructions: 98filepipeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001611E0 Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 101fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167730 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 66registrysynchronizationthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00168180 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 80fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00168050 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 83fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00166E70 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00163590 Relevance: 14.1, APIs: 5, Strings: 3, Instructions: 56sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0016A2A0 Relevance: 14.0, APIs: 4, Strings: 4, Instructions: 31fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00169550 Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 51registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001629C0 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 33fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00165B70 Relevance: 9.2, APIs: 6, Instructions: 181COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167F05 Relevance: 9.1, APIs: 6, Instructions: 83fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00169470 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 41registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001638E0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 38sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001694F0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 31registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00163870 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167610 Relevance: 7.5, APIs: 5, Instructions: 47serviceCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00167590 Relevance: 7.5, APIs: 5, Instructions: 41serviceCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00163670 Relevance: 6.0, APIs: 2, Strings: 2, Instructions: 20sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|