Play interactive tourEdit tour

Analysis Report LTSVC.exe

Overview

General Information

Sample Name:LTSVC.exe
Analysis ID:422781
MD5:6c719219f6edc0e49f1505d21b1f0eff
SHA1:3be4c6ae86af847275a848d42dade9a3540bfc57
SHA256:dd0ebcab07e4a257cb6ac2f235e9a720615fc79a5a3a450541ff9650a73f7042
Infos:

Most interesting Screenshot:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains strange resources
Queries information about the installed CPU (vendor, model number etc)
Queries the installation date of Windows
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • LTSVC.exe (PID: 6476 cmdline: 'C:\Users\user\Desktop\LTSVC.exe' MD5: 6C719219F6EDC0E49F1505D21B1F0EFF)
    • conhost.exe (PID: 6492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dw20.exe (PID: 6568 cmdline: dw20.exe -x -s 1264 MD5: 9B2D2AE232F2D0EFAEF9D5EB2509BE79)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: LTSVC.exeStatic PE information: certificate valid
Source: C:\Users\user\Desktop\LTSVC.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dllJump to behavior
Source: LTSVC.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: ws\LTSVC.pdbpdbSVC.pdbmDa source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: E:\B\_w\212\s\Projects\LabTech\Core\trunk\RemoteAgent\Service\bin\SignedRelease\ObOut\LTSVC.pdbBB source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: `C:\Windows\LTSVC.pdb source: LTSVC.exe, 00000000.00000002.244548011.00000000003E0000.00000004.00000001.sdmp
Source: Binary string: \??\C:\Windows\LTSVC.pdbswe source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: C:\Windows\exe\LTSVC.pdbram source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\LTSVC.pdbd source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\exe\LTSVC.pdbInp source: LTSVC.exe, 00000000.00000002.244806600.00000000007CB000.00000004.00000001.sdmp
Source: Binary string: C:\Users\user\Desktop\LTSVC.pdb source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: E:\B\_w\212\s\Projects\LabTech\Core\trunk\RemoteAgent\Service\bin\SignedRelease\ObOut\LTSVC.pdb source: LTSVC.exe
Source: Binary string: C:\Windows\symbols\exe\LTSVC.pdbami source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\LTSVC.pdbnProgra source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\LTSVC.pdbnt source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\LTSVC.PDBess source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: mscorrc.pdb source: LTSVC.exe, 00000000.00000002.245019961.0000000002380000.00000002.00000001.sdmp
Source: LTSVC.exeString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
Source: LTSVC.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
Source: LTSVC.exe, 00000000.00000003.234738714.0000000000746000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: LTSVC.exeString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
Source: LTSVC.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: LTSVC.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: LTSVC.exeString found in binary or memory: http://s.symcd.com06
Source: LTSVC.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
Source: LTSVC.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: LTSVC.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: LTSVC.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: LTSVC.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: LTSVC.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: LTSVC.exeString found in binary or memory: https://d.symcb.com/rpa0.
Source: LTSVC.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\LTSVC.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1264
Source: LTSVC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: LTSVC.exeBinary or memory string: OriginalFilename vs LTSVC.exe
Source: LTSVC.exe, 00000000.00000002.244847488.00000000008C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs LTSVC.exe
Source: LTSVC.exe, 00000000.00000002.245649663.000000001B650000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs LTSVC.exe
Source: LTSVC.exe, 00000000.00000002.245019961.0000000002380000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs LTSVC.exe
Source: LTSVC.exe, 00000000.00000002.244680576.00000000006FA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs LTSVC.exe
Source: classification engineClassification label: clean3.winEXE@4/4@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6492:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE5B6.tmpJump to behavior
Source: LTSVC.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\LTSVC.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: LTSVC.exe, 00000000.00000000.231328057.0000000000112000.00000002.00020000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS DataCollectorData( DataCollectorId VARCHAR(255), Time BIGINT, Value TEXT, PRIMARY KEY(DataCollectorId, Time));
Source: C:\Users\user\Desktop\LTSVC.exeFile read: C:\Users\user\Desktop\LTSVC.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\LTSVC.exe 'C:\Users\user\Desktop\LTSVC.exe'
Source: C:\Users\user\Desktop\LTSVC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\LTSVC.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1264
Source: C:\Users\user\Desktop\LTSVC.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1264Jump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
Source: LTSVC.exeStatic PE information: certificate valid
Source: LTSVC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: LTSVC.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: LTSVC.exeStatic file information: File size 1666888 > 1048576
Source: C:\Users\user\Desktop\LTSVC.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dllJump to behavior
Source: LTSVC.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x18b200
Source: LTSVC.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: LTSVC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: ws\LTSVC.pdbpdbSVC.pdbmDa source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: E:\B\_w\212\s\Projects\LabTech\Core\trunk\RemoteAgent\Service\bin\SignedRelease\ObOut\LTSVC.pdbBB source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: `C:\Windows\LTSVC.pdb source: LTSVC.exe, 00000000.00000002.244548011.00000000003E0000.00000004.00000001.sdmp
Source: Binary string: \??\C:\Windows\LTSVC.pdbswe source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: C:\Windows\exe\LTSVC.pdbram source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\LTSVC.pdbd source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Windows\exe\LTSVC.pdbInp source: LTSVC.exe, 00000000.00000002.244806600.00000000007CB000.00000004.00000001.sdmp
Source: Binary string: C:\Users\user\Desktop\LTSVC.pdb source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: E:\B\_w\212\s\Projects\LabTech\Core\trunk\RemoteAgent\Service\bin\SignedRelease\ObOut\LTSVC.pdb source: LTSVC.exe
Source: Binary string: C:\Windows\symbols\exe\LTSVC.pdbami source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\LTSVC.pdbnProgra source: LTSVC.exe, 00000000.00000002.245127246.0000000002466000.00000004.00000040.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\LTSVC.pdbnt source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\LTSVC.PDBess source: LTSVC.exe, 00000000.00000002.244731999.0000000000741000.00000004.00000020.sdmp
Source: Binary string: mscorrc.pdb source: LTSVC.exe, 00000000.00000002.245019961.0000000002380000.00000002.00000001.sdmp
Source: C:\Users\user\Desktop\LTSVC.exeCode function: 0_2_00118FFD push 00000020h; retf 0_2_0011900E
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: LTSVC.exe, 00000000.00000002.245649663.000000001B650000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: dw20.exe, 00000002.00000002.244389449.0000000000528000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW</
Source: dw20.exe, 00000002.00000002.244480012.00000000005CD000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
Source: LTSVC.exe, 00000000.00000002.245649663.000000001B650000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: LTSVC.exe, 00000000.00000002.245649663.000000001B650000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: LTSVC.exe, 00000000.00000002.245649663.000000001B650000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\LTSVC.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1264Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
Source: C:\Users\user\Desktop\LTSVC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Virtualization/Sandbox Evasion1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Information Discovery22Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 422781 Sample: LTSVC.exe Startdate: 24/05/2021 Architecture: WINDOWS Score: 3 5 LTSVC.exe 3 2->5         started        process3 7 dw20.exe 20 6 5->7         started        9 conhost.exe 5->9         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
LTSVC.exe1%VirustotalBrowse
LTSVC.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:422781
Start date:24.05.2021
Start time:15:37:07
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 0s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:LTSVC.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:27
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean3.winEXE@4/4@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 43.8% (good quality ratio 37.5%)
  • Quality average: 62.5%
  • Quality standard deviation: 31.3%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 1
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 20.82.210.154, 13.64.90.137, 92.122.145.220, 13.88.21.125, 184.30.20.56, 13.107.5.88, 13.107.42.23, 20.82.209.183, 20.54.26.129, 92.122.213.247, 92.122.213.194
  • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, client-office365-tas.msedge.net, ocos-office365-s2s.msedge.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, l-0014.config.skype.com, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, config.edge.skype.com, www.bing.com, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, afdo-tas-offload.trafficmanager.net, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, l-0014.l-msedge.net, skypedataprdcolwus15.cloudapp.net
  • Execution Graph export aborted for target LTSVC.exe, PID 6476 because it is empty
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
15:38:04API Interceptor1x Sleep call for process: dw20.exe modified
No context
No context
No context
No context
No context
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_ltsvc.exe_93160c6931424215137dc141a114f85972dd48_00000000_19f2f334\Report.wer
Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):12614
Entropy (8bit):3.769401756167136
Encrypted:false
SSDEEP:192:WS2fN50ydlwnay/29llfLsPOvEpLa/u7spS274lts:QfNTX2aXvGa/u7spX4lts
MD5:2880BBC65C387A1F29E226253AE3D04A
SHA1:B56B716CB760D0F15898336B5140AA61F899ACD6
SHA-256:AD6081B6BD0C61EF3FD3478AF8CE92A926DA02360B3DD8841746D83B25F92976
SHA-512:4417C85EAA3FBAB1CD66DE06E34C8A28BC63AB2A0E2E93E646D0921EA08D9FD3BFE41E86E35B7CB5E5336EFA16663ACF7D5ABAB7BA8765FB144011AEDA4FC60D
Malicious:false
Reputation:low
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.6.3.6.9.4.8.1.2.5.8.2.0.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.6.3.6.9.4.8.2.8.0.5.0.7.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.b.d.7.e.0.f.e.-.e.3.f.c.-.4.1.a.6.-.a.f.b.0.-.e.5.2.6.9.5.2.6.4.1.a.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.T.S.V.C...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.4.c.-.0.0.0.1.-.0.0.1.6.-.6.c.b.1.-.0.4.7.2.e.d.5.0.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.1.6.5.e.e.b.6.b.3.0.2.5.5.8.b.6.c.b.d.b.5.7.7.3.f.9.0.2.e.c.4.0.0.0.0.0.0.0.0.!.0.0.0.0.3.b.e.4.c.6.a.e.8.6.a.f.8.4.7.2.7.5.a.8.4.8.d.4.2.d.a.d.e.9.a.3.5.4.0.b.f.c.5.7.!.L.T.S.V.C...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.0.3././.2.6.:.2.0.:.1.7.:.4.1.!.1.9.f.3.b.c.!.L.T.S.V.C...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.t.A.s.I.d.=.3.4.2.....I.s.F.
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE5B6.tmp.WERInternalMetadata.xml
Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8074
Entropy (8bit):3.704065276151016
Encrypted:false
SSDEEP:192:Rrl7r3GLNiMHuUzg24O46YIwwDjgmfZr0SrCp1CWtfWw2m:RrlsNiSuf24p6YPwDjgmf10SSCkfr
MD5:2B88ABE35191E4C674A9010DD1277BB3
SHA1:C7CA016E914A8A0A0869A3166BC8C5623F036094
SHA-256:A10BAB4FF9C62E80AD3F5E540B4F1D5A976A3002CC3B1B976B32435F8F1B91B5
SHA-512:8DB39B3F61058B6A48ADCBEB6458556F4864E82E1350FB68F14F7280E1F24EF0B8D650AFCC09E9BE181F33FEA9D7F1F464A6AE0490CEAAB57961A2B290306204
Malicious:false
Reputation:low
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.7.6.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE683.tmp.xml
Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4739
Entropy (8bit):4.467128567288201
Encrypted:false
SSDEEP:48:cvIwSD8zs+JgtBI9xlWSC8BW8fm8M4JFKkm+8EFTyq8vxm+8m1cmzAgzV7d:uITf0XUSNFJFKWWR1fAO9d
MD5:CFC41AC310FF841256D5650C2103B7C0
SHA1:C6759620778C1A64A5593593E0C8794544929B79
SHA-256:FD428F7B038075BD4B061F5715F1D00D41F7299AD154EC5D80A0D35E9DE5C856
SHA-512:F6BAD371295974597728DD4CA24ED53932CB57280B928DF761D3672E3D54987F0D257772B9F5CA62A548E6D630717E064177A1C260AC8B4DB04BFEE181743B30
Malicious:false
Reputation:low
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1004148" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
\Device\ConDrv
Process:C:\Users\user\Desktop\LTSVC.exe
File Type:ASCII text, with very long lines, with CRLF, LF line terminators
Category:dropped
Size (bytes):887
Entropy (8bit):5.1222392562687435
Encrypted:false
SSDEEP:24:RwHtNaFN2r4CFNaFNm0uhdrC7U4APUrEe:eHtNOXONOm0mOUxgEe
MD5:20C75699319C1A8E693434F0A0AF53F4
SHA1:C05202104D56BE0E4138BFB71BDA3F1EDC8C0B34
SHA-256:CB212E19A7CC07FBA1FE687D212027B018BC77965957491D1EF2F4006F9BF8AD
SHA-512:B662EF9F48DB234DDEF91E4AF3E75CFE38F27B473F516BDBD9A2B789389B86944769AB180697A073E7B6A202708BAAF375A9650BB33E2005C0962D63FC32FCD6
Malicious:false
Reputation:low
Preview: .Unhandled Exception: System.TypeInitializationException: The type initializer for '?' threw an exception. ---> System.IO.FileNotFoundException: Could not load file or assembly 'LabTechCommonBase, Version=2020.12.437.0, Culture=neutral, PublicKeyToken=null' or one of its dependencies. The system cannot find the file specified...File name: 'LabTechCommonBase, Version=2020.12.437.0, Culture=neutral, PublicKeyToken=null'.. at ?..cctor()....WRN: Assembly binding logging is turned OFF...To enable assembly bind failure logging, set the registry value [HKLM\Software\Microsoft\Fusion!EnableLog] (DWORD) to 1...Note: There is some performance penalty associated with assembly bind failure logging...To turn this feature off, remove the registry value [HKLM\Software\Microsoft\Fusion!EnableLog]..... --- End of inner exception stack trace ---.. at LTSVC.LTService.Main(String[] args).

Static File Info

General

File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):6.1317325451106255
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
  • Win32 Executable (generic) a (10002005/4) 49.93%
  • Windows Screen Saver (13104/52) 0.07%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:LTSVC.exe
File size:1666888
MD5:6c719219f6edc0e49f1505d21b1f0eff
SHA1:3be4c6ae86af847275a848d42dade9a3540bfc57
SHA256:dd0ebcab07e4a257cb6ac2f235e9a720615fc79a5a3a450541ff9650a73f7042
SHA512:0d26fb7a31d71d985bbe8358e8779c8bf863196b126473efc2759fecde70b99e59585e1170f1679681d35695ae2d22fc74fb2490924cb4bb47d8f4df40ac57dd
SSDEEP:24576:VOQD0PQ514yHym9POA8g4dYmw806zmmdpEQ6hwk3otqpU:DD0Pm14yHym90dYmN0+m6iQ6hwk4tz
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...eA^`.........."...P.................. ........... ....................................@................................

File Icon

Icon Hash:b08eccb2b2ecd2b2

General

Entrypoint:0x1118d1de
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x11000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x605E4165 [Fri Mar 26 20:17:41 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:v2.0.50727
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Signature Valid:true
Signature Issuer:CN=GlobalSign Extended Validation CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 1/11/2019 12:03:41 PM 4/7/2022 2:58:55 PM
Subject Chain
  • CN="ConnectWise, Inc.", O="ConnectWise, Inc.", STREET=4110 George Rd., L=Tampa, S=Florida, C=US, OID.1.3.6.1.4.1.311.60.2.1.2=Florida, OID.1.3.6.1.4.1.311.60.2.1.3=US, SERIALNUMBER=F16000000308, OID.2.5.4.15=Private Organization
Version:3
Thumbprint MD5:474D674528677850C6B8DAAE19447779
Thumbprint SHA-1:07290735CAC17E851C608F28C3C03F68B94DDC35
Thumbprint SHA-256:F6FEE5A4737C24588F48FBCA87BECE244656FCD80E4ADF0B31F9EE94CF1C9420
Serial:159CBD61D46835827A089BD0
Instruction
jmp dword ptr [11002000h]
retn 5BF8h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x18d1900x4b.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x18e0000x9e00.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x1954000x1b48.rsrc
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1980000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x18d0fc0x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x18b1e80x18b200False0.424625192779data6.12687234481IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rsrc0x18e0000x9e000x9e00False0.25215090981data4.58047893213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1980000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_ICON0x18e1800x468GLS_BINARY_LSB_FIRST
RT_ICON0x18e5f80x988data
RT_ICON0x18ef900x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
RT_ICON0x1900480x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
RT_ICON0x1926000x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
RT_GROUP_ICON0x1968380x4cdata
RT_VERSION0x1968940x3a8data
RT_MANIFEST0x196c4c0x1001XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
DLLImport
mscoree.dll_CorExeMain
DescriptionData
Translation0x0000 0x04b0
LegalCopyrightCopyright 2005-2015 LabTech Software
Assembly Version210.82.7755.29326
InternalNameLTSVC.exe
FileVersion210.82.7755.29326
CompanyNameLabTech Software
CommentsRemote reporting and administration tool.
ProductNameLabTech MSP
ProductVersion3.0
FileDescriptionLabTech Service
OriginalFilenameLTSVC.exe

Network Behavior

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
May 24, 2021 15:37:50.911567926 CEST6434453192.168.2.58.8.8.8
May 24, 2021 15:37:50.969238997 CEST53643448.8.8.8192.168.2.5
May 24, 2021 15:37:51.321475983 CEST6206053192.168.2.58.8.8.8
May 24, 2021 15:37:51.371126890 CEST53620608.8.8.8192.168.2.5
May 24, 2021 15:37:51.685807943 CEST6180553192.168.2.58.8.8.8
May 24, 2021 15:37:51.754277945 CEST53618058.8.8.8192.168.2.5
May 24, 2021 15:37:52.534930944 CEST5479553192.168.2.58.8.8.8
May 24, 2021 15:37:52.586572886 CEST53547958.8.8.8192.168.2.5
May 24, 2021 15:37:52.695518970 CEST4955753192.168.2.58.8.8.8
May 24, 2021 15:37:52.756100893 CEST53495578.8.8.8192.168.2.5
May 24, 2021 15:37:53.999545097 CEST6173353192.168.2.58.8.8.8
May 24, 2021 15:37:54.051851988 CEST53617338.8.8.8192.168.2.5
May 24, 2021 15:37:54.564791918 CEST6544753192.168.2.58.8.8.8
May 24, 2021 15:37:54.624133110 CEST53654478.8.8.8192.168.2.5
May 24, 2021 15:37:55.243189096 CEST5244153192.168.2.58.8.8.8
May 24, 2021 15:37:55.301314116 CEST53524418.8.8.8192.168.2.5
May 24, 2021 15:37:56.496846914 CEST6217653192.168.2.58.8.8.8
May 24, 2021 15:37:56.546195030 CEST53621768.8.8.8192.168.2.5
May 24, 2021 15:37:58.146553993 CEST5959653192.168.2.58.8.8.8
May 24, 2021 15:37:58.197179079 CEST53595968.8.8.8192.168.2.5
May 24, 2021 15:37:59.723550081 CEST6529653192.168.2.58.8.8.8
May 24, 2021 15:37:59.776124001 CEST53652968.8.8.8192.168.2.5
May 24, 2021 15:38:01.629211903 CEST6318353192.168.2.58.8.8.8
May 24, 2021 15:38:01.679328918 CEST53631838.8.8.8192.168.2.5
May 24, 2021 15:38:02.710369110 CEST6015153192.168.2.58.8.8.8
May 24, 2021 15:38:02.760061979 CEST53601518.8.8.8192.168.2.5
May 24, 2021 15:38:04.313112020 CEST5696953192.168.2.58.8.8.8
May 24, 2021 15:38:04.314493895 CEST5516153192.168.2.58.8.8.8
May 24, 2021 15:38:04.365657091 CEST53569698.8.8.8192.168.2.5
May 24, 2021 15:38:04.372848034 CEST53551618.8.8.8192.168.2.5
May 24, 2021 15:38:05.413750887 CEST5475753192.168.2.58.8.8.8
May 24, 2021 15:38:05.463536978 CEST53547578.8.8.8192.168.2.5
May 24, 2021 15:38:06.966394901 CEST4999253192.168.2.58.8.8.8
May 24, 2021 15:38:07.016088009 CEST53499928.8.8.8192.168.2.5
May 24, 2021 15:38:16.484643936 CEST6007553192.168.2.58.8.8.8
May 24, 2021 15:38:16.562484980 CEST53600758.8.8.8192.168.2.5
May 24, 2021 15:38:24.687164068 CEST5973653192.168.2.58.8.8.8
May 24, 2021 15:38:24.703183889 CEST5105853192.168.2.58.8.8.8
May 24, 2021 15:38:24.708192110 CEST5263653192.168.2.58.8.8.8
May 24, 2021 15:38:24.745512009 CEST53597368.8.8.8192.168.2.5
May 24, 2021 15:38:24.752518892 CEST53510588.8.8.8192.168.2.5
May 24, 2021 15:38:24.760869026 CEST53526368.8.8.8192.168.2.5
May 24, 2021 15:38:28.871155024 CEST5501653192.168.2.58.8.8.8
May 24, 2021 15:38:28.938971043 CEST53550168.8.8.8192.168.2.5
May 24, 2021 15:38:57.466895103 CEST6434553192.168.2.58.8.8.8
May 24, 2021 15:38:57.533468008 CEST53643458.8.8.8192.168.2.5
May 24, 2021 15:39:04.335458994 CEST5712853192.168.2.58.8.8.8
May 24, 2021 15:39:04.402666092 CEST53571288.8.8.8192.168.2.5
May 24, 2021 15:39:08.786279917 CEST5479153192.168.2.58.8.8.8
May 24, 2021 15:39:08.850893021 CEST53547918.8.8.8192.168.2.5
May 24, 2021 15:39:41.764441967 CEST5046353192.168.2.58.8.8.8
May 24, 2021 15:39:41.822890997 CEST53504638.8.8.8192.168.2.5
May 24, 2021 15:39:43.461764097 CEST5039453192.168.2.58.8.8.8
May 24, 2021 15:39:43.522617102 CEST53503948.8.8.8192.168.2.5

Code Manipulations

Statistics

CPU Usage

050100s020406080100

Click to jump to process

Memory Usage

050100s0.005101520MB

Click to jump to process

High Level Behavior Distribution

  • File
  • Registry

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

Start time:15:37:59
Start date:24/05/2021
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7ecfc0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:15:38:00
Start date:24/05/2021
Path:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
Wow64 process (32bit):false
Commandline:dw20.exe -x -s 1264
Imagebase:0x10000000
File size:43664 bytes
MD5 hash:9B2D2AE232F2D0EFAEF9D5EB2509BE79
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Disassembly

Code Analysis

Executed Functions

Memory Dump Source
  • Source File: 00000000.00000002.246278764.00007FFA162F0000.00000040.00000001.sdmp, Offset: 00007FFA162F0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ffa162f0000_LTSVC.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 39e8c532647a9d1b38f0882d976fda7ef76563791bc427dc1d4a86a1e99fc2c5
  • Instruction ID: cda929930a13ae85d829fa36fbb9273b2ed0dec1b59e19aafe86c386a3a5b530
  • Opcode Fuzzy Hash: 39e8c532647a9d1b38f0882d976fda7ef76563791bc427dc1d4a86a1e99fc2c5
  • Instruction Fuzzy Hash: 8F418C52A0EBC20FE747937848A56647FE19F97120B4E91FBE08DCB1D3E80C5849CB52
Uniqueness

Uniqueness Score: -1.00%

Non-executed Functions