Edit tour

Windows Analysis Report
km711n.exe

Overview

General Information

Sample name:km711n.exe
Analysis ID:1670111
MD5:85ca37c7f4ee5781b33eb2d80c17e923
SHA1:db2466d397331194fe939d08a33ff62681a0268d
SHA256:afd090984a3ece5530dbdb934197d452f327d0f06688c83e57a25c69635072cc
Infos:

Detection

Sliver
Score:56
Range:0 - 100
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Sliver Implants
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • km711n.exe (PID: 5252 cmdline: "C:\Users\user\Desktop\km711n.exe" MD5: 85CA37C7F4EE5781B33EB2D80C17E923)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SliverAccording to VK9 Seecurity, Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.sliver
SourceRuleDescriptionAuthorStrings
km711n.exeJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
    km711n.exeMulti_Trojan_Bishopsliver_42298c4aunknownunknown
    • 0xd0c0cb:$a1: ).RequestResend
    • 0xcfb24b:$a2: ).GetPrivInfo
    km711n.exeINDICATOR_TOOL_SliverDetects Sliver implant cross-platform adversary emulation/red teamditekSHen
    • 0xa44e87:$s3: .WGTCPForwarder
    • 0xa45c81:$s3: .WGTCPForwarder
    • 0xa47c03:$s3: .WGTCPForwarder
    • 0xa48546:$s3: .WGTCPForwarder
    • 0xa4ae01:$s3: .WGTCPForwarder
    • 0xa4bc14:$s3: .WGTCPForwarder
    • 0xa40b9b:$s6: .BackdoorReq
    • 0xa44de5:$s7: .ProcessDumpReq
    • 0xa47a5c:$s8: .InvokeSpawnDllReq
    • 0xa3bcc8:$s9: .SpawnDll
    • 0xa40cd3:$s9: .SpawnDll
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1109283367.000000C00016A000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
      00000000.00000002.1109283367.000000C000138000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
        00000000.00000002.1109283367.000000C000166000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
          00000000.00000000.1104984814.00000000012E3000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
            00000000.00000000.1104984814.000000000154D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SliverYara detected Sliver ImplantsJoe Security
              Click to see the 1 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results
              Source: km711n.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

              System Summary

              barindex
              Source: km711n.exe, type: SAMPLEMatched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown
              Source: km711n.exe, type: SAMPLEMatched rule: Detects Sliver implant cross-platform adversary emulation/red team Author: ditekSHen
              Source: 00000000.00000000.1104984814.000000000154D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Multi_Trojan_Bishopsliver_42298c4a Author: unknown
              Source: km711n.exe, type: SAMPLEMatched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14
              Source: km711n.exe, type: SAMPLEMatched rule: INDICATOR_TOOL_Sliver author = ditekSHen, description = Detects Sliver implant cross-platform adversary emulation/red team
              Source: 00000000.00000000.1104984814.000000000154D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Multi_Trojan_Bishopsliver_42298c4a reference_sample = 3b45aae401ac64c055982b5f3782a3c4c892bdb9f9a5531657d50c27497c8007, os = multi, severity = x86, creation_date = 2021-10-20, scan_context = file, memory, license = Elastic License v2, threat_name = Multi.Trojan.Bishopsliver, fingerprint = 0734b090ea10abedef4d9ed48d45c834dd5cf8e424886a5be98e484f69c5e12a, id = 42298c4a-fcea-4c5a-b213-32db00e4eb5a, last_modified = 2022-01-14
              Source: classification engineClassification label: mal56.troj.winEXE@1/0@0/0
              Source: C:\Users\user\Desktop\km711n.exeFile opened: C:\Windows\system32\00f26352cd11593d22a9c7dbec26d9a2ef9814ada29fa2f1a0d1e1d39af9843dAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
              Source: km711n.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\km711n.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\km711n.exeFile read: C:\Users\user\Desktop\km711n.exe
              Source: C:\Users\user\Desktop\km711n.exeSection loaded: apphelp.dll
              Source: C:\Users\user\Desktop\km711n.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\Desktop\km711n.exeSection loaded: winmm.dll
              Source: C:\Users\user\Desktop\km711n.exeSection loaded: powrprof.dll
              Source: C:\Users\user\Desktop\km711n.exeSection loaded: umpdc.dll
              Source: C:\Users\user\Desktop\km711n.exeSection loaded: winhttp.dll
              Source: km711n.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: km711n.exeStatic file information: File size 17377280 > 1048576
              Source: km711n.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xa21600
              Source: km711n.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x602e00
              Source: km711n.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: km711n.exeStatic PE information: section name: .symtab
              Source: C:\Users\user\Desktop\km711n.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\km711n.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\km711n.exeQueries volume information: C:\Users\user\Desktop\km711n.exe VolumeInformation

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: km711n.exe, type: SAMPLE
              Source: Yara matchFile source: 00000000.00000002.1109283367.000000C00016A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1109283367.000000C000138000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1109283367.000000C000166000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1104984814.00000000012E3000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1104984814.000000000154D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: km711n.exe, type: SAMPLE
              Source: Yara matchFile source: 00000000.00000002.1109283367.000000C00016A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1109283367.000000C000138000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1109283367.000000C000166000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1104984814.00000000012E3000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1104984814.000000000154D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              OS Credential Dumping12
              System Information Discovery
              Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              No contacted IP infos
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1670111
              Start date and time:2025-04-21 05:34:01 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:10
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Sample name:km711n.exe
              Detection:MAL
              Classification:mal56.troj.winEXE@1/0@0/0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 172.202.163.200
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              No created / dropped files found
              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
              Entropy (8bit):6.114383063680728
              TrID:
              • Win64 Executable (generic) (12005/4) 74.95%
              • Generic Win/DOS Executable (2004/3) 12.51%
              • DOS Executable Generic (2002/1) 12.50%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
              File name:km711n.exe
              File size:17'377'280 bytes
              MD5:85ca37c7f4ee5781b33eb2d80c17e923
              SHA1:db2466d397331194fe939d08a33ff62681a0268d
              SHA256:afd090984a3ece5530dbdb934197d452f327d0f06688c83e57a25c69635072cc
              SHA512:e1a38d2e52ff2732da90ff03cc03c72bff2f28077b81a3fbd17ba221c12ff926e3439b04099240c16033c0a1e2939db17613e623e736d487d20e771c45e370fb
              SSDEEP:98304:Z3fbx4y2SYVeZAXr0Zcqq5Gqe0JHeOz1saz/MJeqcIEox9EQhxh:pjx0rCq5Bei+Q1bLMJeqchoxH
              TLSH:70071903F4D611D4C4F9D1B489258272BA71785C0B7963DB2BA1F7A42B327F09E7AB90
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........&........".........."................@..............................P............`... ............................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x45d0e0
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:1
              File Version Major:6
              File Version Minor:1
              Subsystem Version Major:6
              Subsystem Version Minor:1
              Import Hash:f0ea7b7844bbc5bfa9bb32efdcea957c
              Instruction
              jmp 00007F4A844FA2A0h
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              pushfd
              cld
              dec eax
              sub esp, 000000E0h
              dec eax
              mov dword ptr [esp], edi
              dec eax
              mov dword ptr [esp+08h], esi
              dec eax
              mov dword ptr [esp+10h], ebp
              dec eax
              mov dword ptr [esp+18h], ebx
              dec esp
              mov dword ptr [esp+20h], esp
              dec esp
              mov dword ptr [esp+28h], ebp
              dec esp
              mov dword ptr [esp+30h], esi
              dec esp
              mov dword ptr [esp+38h], edi
              movups dqword ptr [esp+40h], xmm6
              movups dqword ptr [esp+50h], xmm7
              inc esp
              movups dqword ptr [esp+60h], xmm0
              inc esp
              movups dqword ptr [esp+70h], xmm1
              inc esp
              movups dqword ptr [esp+00000080h], xmm2
              inc esp
              movups dqword ptr [esp+00000090h], xmm3
              inc esp
              movups dqword ptr [esp+000000A0h], xmm4
              inc esp
              movups dqword ptr [esp+000000B0h], xmm5
              inc esp
              movups dqword ptr [esp+000000C0h], xmm6
              inc esp
              movups dqword ptr [esp+000000D0h], xmm7
              dec eax
              sub esp, 30h
              dec ecx
              mov ebp, ecx
              dec ecx
              mov edi, eax
              dec eax
              mov edx, dword ptr [01065D23h]
              dec eax
              mov edx, dword ptr [edx]
              dec eax
              cmp edx, 00000000h
              jne 00007F4A844FDF6Eh
              dec eax
              mov eax, 00000000h
              jmp 00007F4A844FE033h
              dec eax
              mov edx, dword ptr [edx]
              dec eax
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x10d70000x490.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x10d80000x2b39a.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10260400x148.data
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xa214fd0xa21600f691c17be49c459bab6ac1b1dced485dunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0xa230000x602c880x602e000eb27375e993c02f73f990a85f3db47bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x10260000xb05500x4220051d34de6b12c4f2129525db90c2f7836False0.3885758801984877data4.761555515996491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x10d70000x4900x60033eff7ffb87dac62176eb4faa579b545False0.3365885416666667data3.7228114832174795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x10d80000x2b39a0x2b400b0e8b137e2dc4cbd701d6b8d20bc9f71False0.13596233742774566data5.4426107756440585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .symtab0x11040000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler