Windows
Analysis Report
17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe
Overview
General Information
Sample name: | 17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe |
Analysis ID: | 1589559 |
MD5: | 3fed3a6ff0a80d3751531bdebaa9b2b4 |
SHA1: | e8a237f849876e8c393cb95bac7f624d79b36f7f |
SHA256: | 7d629e56510be6655db82910df89e19820e9095d947d6dd4ced7c6656cdf8a02 |
Tags: | base64-decodedexeuser-abuse_ch |
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe (PID: 7396 cmdline:
"C:\Users\ user\Deskt op\1736711 3452957edf c9b8ae3ec3 4b8a6a9089 df6f896f27 1bbf139920 3c8025fd6c b0731fa872 .dat-decod ed.exe" MD5: 3FED3A6FF0A80D3751531BDEBAA9B2B4)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Classification label: |
Source: | ReversingLabs: |
Source: | Code function: | 0_2_00408CAA |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Obfuscated Files or Information | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
18% | ReversingLabs | Win32.Trojan.GenCBL | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0017.t-0009.fb-t-msedge.net | 13.107.253.45 | true | false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589559 |
Start date and time: | 2025-01-12 20:50:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 10s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe |
Detection: | MAL |
Classification: | mal52.winEXE@1/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.109.210.53
- Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target 17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe, PID 7396 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.fb-t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 6.034782551060832 |
TrID: |
|
File name: | 17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe |
File size: | 31'025 bytes |
MD5: | 3fed3a6ff0a80d3751531bdebaa9b2b4 |
SHA1: | e8a237f849876e8c393cb95bac7f624d79b36f7f |
SHA256: | 7d629e56510be6655db82910df89e19820e9095d947d6dd4ced7c6656cdf8a02 |
SHA512: | b8c7c90dd9a6d4cd9f307ac2f676f6286d7313f6b859fca35fdd28be97633374155d9a59b41657efc9a04271774ffd322d07bd4ea3f7b1c287dec1623dd9ab7a |
SSDEEP: | 384:8vrMINhaGwl7lRo64XP5doXErJUB/hbFdGBWJQKYVzhbSB5ATy/o0el7xI:8jMINhjwl7lRo3/vEErmWjdy/o17 |
TLSH: | 60D24C4AF203D8F0EA5A82F69EFD873E5AF7651899216D36EF1DF6BCA8334407524140 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................J...p...............`....@........................................... ............................ |
Icon Hash: | 00928e8e8686b000 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 12, 2025 20:51:21.596693993 CET | 1.1.1.1 | 192.168.2.7 | 0x864c | No error (0) | azurefd-t-fb-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 12, 2025 20:51:21.596693993 CET | 1.1.1.1 | 192.168.2.7 | 0x864c | No error (0) | s-part-0017.t-0009.fb-t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 12, 2025 20:51:21.596693993 CET | 1.1.1.1 | 192.168.2.7 | 0x864c | No error (0) | 13.107.253.45 | A (IP address) | IN (0x0001) | false |
Target ID: | 0 |
Start time: | 14:51:23 |
Start date: | 12/01/2025 |
Path: | C:\Users\user\Desktop\17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 31'025 bytes |
MD5 hash: | 3FED3A6FF0A80D3751531BDEBAA9B2B4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Function 0040136D Relevance: 18.9, Strings: 15, Instructions: 171COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004018AA Relevance: 16.4, Strings: 13, Instructions: 169COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040268D Relevance: 16.3, Strings: 13, Instructions: 72COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401B45 Relevance: 13.9, Strings: 11, Instructions: 141COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402455 Relevance: 13.8, Strings: 11, Instructions: 78COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401CB1 Relevance: 13.8, Strings: 11, Instructions: 77COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401657 Relevance: 13.8, Strings: 11, Instructions: 74COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401784 Relevance: 13.8, Strings: 11, Instructions: 73COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F98 Relevance: 12.7, Strings: 10, Instructions: 199COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A17 Relevance: 12.6, Strings: 10, Instructions: 105COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A3C Relevance: 12.6, Strings: 10, Instructions: 68COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209E Relevance: 11.3, Strings: 9, Instructions: 74COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402581 Relevance: 11.3, Strings: 9, Instructions: 74COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401DDD Relevance: 11.3, Strings: 9, Instructions: 73COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022A0 Relevance: 11.3, Strings: 9, Instructions: 68COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|