Windows
Analysis Report
tl-4.18.0-client-windows.exe
Overview
General Information
Detection
Score: | 13 |
Range: | 0 - 100 |
Confidence: | 60% |
Compliance
Score: | 33 |
Range: | 0 - 100 |
Signatures
Uses regedit.exe to modify the Windows registry
Binary contains a suspicious time stamp
Drops PE files
EXE planting / hijacking vulnerabilities found
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious desktop.ini Action
Stores files to the Windows start menu directory
Uses 32bit PE files
Classification
- System is w10x64
tl-4.18.0-client-windows.exe (PID: 3744 cmdline:
"C:\Users\ user\Deskt op\tl-4.18 .0-client- windows.ex e" MD5: 168280AE119955B0E9EFF6716951E5DA) regedit.exe (PID: 4876 cmdline:
regedit.ex e /s "C:\P rogram Fil es\ThinLin c client\s ettings.re g" MD5: 999A30979F6195BF562068639FFC4426) tlclient.exe (PID: 3180 cmdline:
"C:\Progra m Files\Th inLinc cli ent\tlclie nt.exe" MD5: 96E3878B529F456C5C38E2F22EF6B53B)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Maxime Thiebaut (@0xThiebaut), Tim Shelton (HAWK.IO): |
⊘No Suricata rule has matched
- • Privilege Escalation
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Show All Signature Results
Source: | EXE: | Jump to behavior |
Compliance |
---|
Source: | EXE: | Jump to behavior |
Source: | Static PE information: |
Source: | Window detected: |