Create Interactive Tour

Analysis Report http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==

Overview

General Information

Sample URL:http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==
Analysis ID:345645

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sample execution stops while process was sleeping (likely an evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 4012 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==' > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 5920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 5540 cmdline: wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==' MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: classification engineClassification label: clean0.win@4/1@0/0
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5920:120:WilError_01
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==' > cmdline.out 2>&1
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A=='
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==' Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSystem Information Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 345645 URL: http:///filestreamingservic... Startdate: 28/01/2021 Architecture: WINDOWS Score: 0 5 cmd.exe 2 2->5         started        process3 7 conhost.exe 5->7         started        9 wget.exe 1 5->9         started       
SourceDetectionScannerLabelLink
http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:345645
Start date:28.01.2021
Start time:18:43:20
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 1m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:urldownload.jbs
Sample URL:http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean0.win@4/1@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Unable to download file
Warnings:
  • Exclude process from analysis (whitelisted): svchost.exe
  • VT rate limit hit for: http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==
No simulations
No context
No context
No context
No context
No context
C:\Users\user\Desktop\cmdline.out
Process:C:\Windows\SysWOW64\wget.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):211
Entropy (8bit):5.688391589777038
Encrypted:false
SSDEEP:3:N1KvQAENy7zsqYQ5eFyohaiRVXqtPVoxPzP1Vfi1/uHufU1bVwQEJUTVKfngYrS+:CGkcvvdWWzNVfm81bEiVKfg0SWjLhvn
MD5:33F9D0C5AB32A4FAE45D58379EFB4B73
SHA1:80788420E9EBA2C4A2A22784D5F380C23B94CEB1
SHA-256:E65DD0CCFDFC54629F061486145DC39DD0DBD208B60DBD5DCBB993CDAF985E19
SHA-512:66EF99598BECFD69079F88D0999C163FBDA484050C8480513D4AE4BF2B0878206C578CA22EBC2E375773523503BB11B9CECA199B4470C2F107624116BE0BE6B1
Malicious:false
Reputation:low
Preview: http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==: Invalid host name...

Static File Info

No static file info

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

02468s020406080100

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:18:44:11
Start date:28/01/2021
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A==' > cmdline.out 2>&1
Imagebase:0x150000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Start time:18:44:13
Start date:28/01/2021
Path:C:\Windows\SysWOW64\wget.exe
Wow64 process (32bit):true
Commandline:wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http:///filestreamingservice/files/f61d9b15-1209-4969-a0bc-939d26e2d943?P1=1612443831&P2=402&P3=2&P4=Hj4PmYrUHBcOODeMgB0O3jPpzGQIzX80aYsKjwAqPlpt8NhyeSuaYDGyRKE0PBAcs/RYAf6tPp0JU7K4vBbZ6A=='
Imagebase:0x7ff676010000
File size:3895184 bytes
MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis