Loading ...

Play interactive tourEdit tour

Analysis Report IPsec Helper.exe

Overview

General Information

Sample Name:IPsec Helper.exe
Analysis ID:325179
MD5:9d7d20a21cf00f43e1b1701df368e172
SHA1:5ab8582a892c603b00c0989eedca668e55abbba5
SHA256:96cc69242a7900810c4d2e9f3f55aad8edb89137959f4c370f80a6e574ddc201

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains long sleeps (>= 3 min)
Creates or modifies windows services
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

Startup

  • System is w10x64
  • IPsec Helper.exe (PID: 3008 cmdline: 'C:\Users\user\Desktop\IPsec Helper.exe' MD5: 9D7D20A21CF00F43E1B1701DF368E172)
    • conhost.exe (PID: 5352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: IPsec Helper.exeVirustotal: Detection: 10%Perma Link
Machine Learning detection for sampleShow sources
Source: IPsec Helper.exeJoe Sandbox ML: detected
Source: IPsec Helper.exeString found in binary or memory: http://download.windowsupdate.com
Source: IPsec Helper.exeString found in binary or memory: http://windowsupdate.microsoft.nsatc.net
Source: IPsec Helper.exeString found in binary or memory: http://www.google.com/
Source: IPsec Helper.exeString found in binary or memory: https://www.google.com/
Source: IPsec Helper.exeString found in binary or memory: https://www.google.com/Capplication/x-www-form-urlencoded
Source: IPsec Helper.exeBinary or memory string: OriginalFilename vs IPsec Helper.exe
Source: IPsec Helper.exe, 00000000.00000002.216670385.0000000002290000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs IPsec Helper.exe
Source: IPsec Helper.exe, 00000000.00000002.216483296.00000000005AC000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs IPsec Helper.exe
Source: IPsec Helper.exe, 00000000.00000002.216979678.000000001AC20000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs IPsec Helper.exe
Source: 0.0.IPsec Helper.exe.170000.0.unpack, new4k/libs/Message.csSuspicious method names: System.String new4k.libs.Message::GetPayload()
Source: 0.0.IPsec Helper.exe.170000.0.unpack, new4k/libs/Message.csSuspicious method names: System.Void new4k.libs.Message::set_Payload(System.String)
Source: 0.0.IPsec Helper.exe.170000.0.unpack, new4k/libs/Message.csSuspicious method names: System.String new4k.libs.Message::get_Payload()
Source: IPsec Helper.exe, new4k/libs/Message.csSuspicious method names: System.String new4k.libs.Message::GetPayload()
Source: IPsec Helper.exe, new4k/libs/Message.csSuspicious method names: System.Void new4k.libs.Message::set_Payload(System.String)
Source: IPsec Helper.exe, new4k/libs/Message.csSuspicious method names: System.String new4k.libs.Message::get_Payload()
Source: 0.2.IPsec Helper.exe.170000.0.unpack, new4k/libs/Message.csSuspicious method names: System.String new4k.libs.Message::GetPayload()
Source: 0.2.IPsec Helper.exe.170000.0.unpack, new4k/libs/Message.csSuspicious method names: System.Void new4k.libs.Message::set_Payload(System.String)
Source: 0.2.IPsec Helper.exe.170000.0.unpack, new4k/libs/Message.csSuspicious method names: System.String new4k.libs.Message::get_Payload()
Source: classification engineClassification label: mal52.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\IPsec Helper.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IPsec Helper.exe.logJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeMutant created: \Sessions\1\BaseNamedObjects\Global\netfxeventlog.1.0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_01
Source: IPsec Helper.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\IPsec Helper.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: IPsec Helper.exeVirustotal: Detection: 10%
Source: unknownProcess created: C:\Users\user\Desktop\IPsec Helper.exe 'C:\Users\user\Desktop\IPsec Helper.exe'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: IPsec Helper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: IPsec Helper.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\IPsec Helper.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exe TID: 1376Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: IPsec Helper.exe, 00000000.00000002.216979678.000000001AC20000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: IPsec Helper.exe, 00000000.00000002.216979678.000000001AC20000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: IPsec Helper.exe, 00000000.00000002.216979678.000000001AC20000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: IPsec Helper.exe, 00000000.00000002.216979678.000000001AC20000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\IPsec Helper.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\IPsec Helper.exeQueries volume information: C:\Users\user\Desktop\IPsec Helper.exe VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationWindows Service1Windows Service1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection1Virtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerSystem Information Discovery11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
IPsec Helper.exe10%VirustotalBrowse
IPsec Helper.exe3%ReversingLabs
IPsec Helper.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:325179
Start date:01.12.2020
Start time:12:25:35
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 48s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:IPsec Helper.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal52.winEXE@2/1@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 1
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Execution Graph export aborted for target IPsec Helper.exe, PID 3008 because it is empty

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IPsec Helper.exe.log
Process:C:\Users\user\Desktop\IPsec Helper.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):888
Entropy (8bit):5.376389666939846
Encrypted:false
SSDEEP:12:Q3La/KDLI4MWuPTxAIe8WDLI4MNe08LB51KDLI4MN5P6D1BakvoDLI4MWuPak2k/:ML9E4Krw8mE4D08z1qE4GiD0E4KeGj
MD5:43C834A8EBFF545FE239669E17492278
SHA1:94E5659E3B55185D41D5E262D1CCD6A2FB0D6A36
SHA-256:6F1D13D0947B7B9471356BB5B6F412A9453ABF3E91503F740EEC8262562587E5
SHA-512:C2A7284B5D35E0558B56C991AD046334F39D789DF6334C1CB394AAE7CE34B2EB9E153C7FC712B38F5A6DD7919E5E6F27C0807F3D3AC6883677B8E78C45B3E171
Malicious:true
Reputation:low
Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.ServiceProcess, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Serv759bfb78#\5c7518ffedb9bd37c8630ebeecde284a\System.ServiceProcess.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..

Static File Info

General

File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.645835026678954
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
  • Win32 Executable (generic) a (10002005/4) 49.75%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Windows Screen Saver (13104/52) 0.07%
  • Generic Win/DOS Executable (2004/3) 0.01%
File name:IPsec Helper.exe
File size:50688
MD5:9d7d20a21cf00f43e1b1701df368e172
SHA1:5ab8582a892c603b00c0989eedca668e55abbba5
SHA256:96cc69242a7900810c4d2e9f3f55aad8edb89137959f4c370f80a6e574ddc201
SHA512:a574e5184c0e4c7297e2c1f0137de965c26cb565fcd35817f9e9034da6b51e5be8ba72699e5de5f8d3bada5485944ef6fb66a9619378a23f7d90bd3fda28b53b
SSDEEP:768:UClGaU/ZUvI+MPr2HzhMXa3/MjEVC49zqbIevP2tq+RlkRFcG+MbADzht:UOGaU/ZX+S0FTMjmYbl+pTkRFT+MC3
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k!_..............0.................. ........@.. ....................... ............@................................

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x40dbbe
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x5F216B08 [Wed Jul 29 12:26:48 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

Entrypoint Preview

Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xdb6c0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x5cc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000xbbc40xbc00False0.463742519947data5.73813599932IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rsrc0xe0000x5cc0x600False0.419921875data4.09894530786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x100000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_VERSION0xe0900x33cdata
RT_MANIFEST0xe3dc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

DLLImport
mscoree.dll_CorExeMain

Version Infos

DescriptionData
Translation0x0000 0x04b0
LegalCopyrightCopyright 2020
Assembly Version1.0.0.0
InternalNameIPsec Helper.exe
FileVersion1.0.0.0
CompanyName
LegalTrademarks
Comments
ProductNameIPsec Helper
ProductVersion1.0.0.0
FileDescriptionIPsec Helper
OriginalFilenameIPsec Helper.exe

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:12:26:25
Start date:01/12/2020
Path:C:\Users\user\Desktop\IPsec Helper.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\IPsec Helper.exe'
Imagebase:0x170000
File size:50688 bytes
MD5 hash:9D7D20A21CF00F43E1B1701DF368E172
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET
Reputation:low

General

Start time:12:26:25
Start date:01/12/2020
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6b2800000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >

    Executed Functions

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.217195287.00007FFAEE940000.00000040.00000001.sdmp, Offset: 00007FFAEE940000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffaee940000_IPsec Helper.jbxd
    Similarity
    • API ID:
    • String ID: A__^
    • API String ID: 0-3573331105
    • Opcode ID: c82fa797a94995a46ff560fd1d856337d54887afccf001f4493f7cf7320774e9
    • Instruction ID: 19b5203eafcaa6f2c4ea3d262ab699c1423964d2b5ea3bae4892c04c0c1b85b9
    • Opcode Fuzzy Hash: c82fa797a94995a46ff560fd1d856337d54887afccf001f4493f7cf7320774e9
    • Instruction Fuzzy Hash: 5B11C356A0DA890BE746637D68E62E86BD1AF8716070E01B7D048CA1D7DC0D5C494393
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions