Windows Analysis Report iso.iso
Overview
General Information
Sample Name: | iso.iso (renamed file extension from iso to img) |
Analysis ID: | 736 |
MD5: | 00a47f21fea32a81de7a9e798fb32704 |
SHA1: | b68d87592f56444443a2a17cdeea2fc3c8575b6a |
SHA256: | 5d627575522c96ffb6af26bf7472f1f55a0a1e4ef4af7e75b062529f72304845 |
Infos: | |
Most interesting Screenshot: | |
Errors
|
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Copying Sensitive Files with Credential Data |
Source: | Author: Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community: |
Jbx Signature Overview |
---|
- • AV Detection
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
AV Detection: |
---|
Antivirus detection for dropped file |
Source: | Avira: |
System Summary: |
---|
Source: | Static PE information: |
Source: | Code function: | 9_2_000000C0000C22DC | |
Source: | Code function: | 9_2_000000C0000CC5D0 | |
Source: | Code function: | 9_2_000000C0000C05EC | |
Source: | Code function: | 9_2_000000C0000BA1E8 | |
Source: | Code function: | 9_2_000000C0000C4FE0 | |
Source: | Code function: | 9_2_000000C0000C15FC | |
Source: | Code function: | 9_2_000000C0000C540C | |
Source: | Code function: | 9_2_000000C0000CA204 | |
Source: | Code function: | 9_2_000000C0000C4310 | |
Source: | Code function: | 9_2_000000C0000BC82C | |
Source: | Code function: | 9_2_000000C0000C6320 | |
Source: | Code function: | 9_2_000000C0000BEA34 | |
Source: | Code function: | 9_2_000000C0000B7D4C | |
Source: | Code function: | 9_2_000000C0000B9840 | |
Source: | Code function: | 9_2_000000C0000BA644 | |
Source: | Code function: | 9_2_000000C0000BD450 | |
Source: | Code function: | 9_2_000000C0000C9464 | |
Source: | Code function: | 9_2_000000C0000C7084 | |
Source: | Code function: | 9_2_000000C0000C4994 | |
Source: | Code function: | 9_2_000000C0000BB4A8 | |
Source: | Code function: | 9_2_000000C0000BC2BC | |
Source: | Code function: | 9_2_000000C0000C0EB4 | |
Source: | Code function: | 9_2_000001673E9B8EBC | |
Source: | Code function: | 9_2_000001673E9C4C24 | |
Source: | Code function: | 9_2_000001673E9C2F20 | |
Source: | Code function: | 9_2_000001673E9C210B | |
Source: | Code function: | 9_2_000001673E9B6440 | |
Source: | Code function: | 9_2_000001673E9B7244 | |
Source: | Code function: | 9_2_000001673E9B942C | |
Source: | Code function: | 9_2_000001673E9C6064 | |
Source: | Code function: | 9_2_000001673E9C2057 | |
Source: | Code function: | 9_2_000001673E9BA050 | |
Source: | Code function: | 9_2_000001673E9B494C | |
Source: | Code function: | 9_2_000001673E9BB67C | |
Source: | Code function: | 9_2_000001673E9BDAB4 | |
Source: | Code function: | 9_2_000001673E9B80A8 | |
Source: | Code function: | 9_2_000001673E9C1BE0 | |
Source: | Code function: | 9_2_000001673E9BEEDC | |
Source: | Code function: | 9_2_000001673E9C15CF | |
Source: | Code function: | 9_2_000001673E9C91D0 | |
Source: | Code function: | 9_2_000001673E9C6E04 | |
Source: | Code function: | 9_2_000001673E9BE1FC | |
Source: | Code function: | 9_2_000001673E9C40FD | |
Source: | Code function: | 9_2_000001673E9B6DE8 | |
Source: | Code function: | 9_2_000001673E9BD1EC |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Joe Sandbox Cloud Basic: | Perma Link |
Source: | File read: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: |
Source: | Thread delayed: | Jump to behavior |
Source: | Code function: | 9_2_000001673E9B9AA0 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection11 | Rundll321 | OS Credential Dumping | Security Software Discovery11 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Virtualization/Sandbox Evasion1 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection11 | Security Account Manager | File and Directory Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Timestomp1 | NTDS | System Information Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1144327 |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 736 |
Start date: | 28.10.2021 |
Start time: | 09:07:26 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | iso.iso (renamed file extension from iso to img) |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 3 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal52.winIMG@6/1@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Errors: |
|
Time | Type | Description |
---|---|---|
09:08:33 | API Interceptor |
Process: | C:\Windows\System32\xcopy.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1702400 |
Entropy (8bit): | 6.178198204344416 |
Encrypted: | false |
SSDEEP: | 24576:yarBYucHPcCsi/GkU1C2LRB+HbkZ7TCYzaIXM:tYuegAGkU1CIu7wTC |
MD5: | 411074A668721B9FE2EF22197E9F7E48 |
SHA1: | E38E6555BF3D01EB3FA2CEE3F3A75128728F2DC2 |
SHA-256: | 95347BEA5432C09CC216F5DB771B956EB78A43139789036AF9446139967B1C7F |
SHA-512: | 651EF9F23E050A7049E0BC0D9F1E2D8985982CDBB9D1E4379072595811538709AA81BF5235E205B8D8B33F7C50A720142C021ACEA180C387BB0C329F15299304 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.056353001538691 |
TrID: |
|
File name: | iso.img |
File size: | 1757184 |
MD5: | 00a47f21fea32a81de7a9e798fb32704 |
SHA1: | b68d87592f56444443a2a17cdeea2fc3c8575b6a |
SHA256: | 5d627575522c96ffb6af26bf7472f1f55a0a1e4ef4af7e75b062529f72304845 |
SHA512: | 472bbe491d65e32252069c8ba3976dc3b4d1d2b3bacce8bcd2ed6e7fef1855246cc6ca9bfce08c8f580356947b668ccb4f898316d8f095fd2434bb090d27d2c3 |
SSDEEP: | 24576:JarBYucHPcCsi/GkU1C2LRB+HbkZ7TCYzaIXM:0YuegAGkU1CIu7wTC |
File Content Preview: | ............................................................................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | 74f0ccccd4c4ecf4 |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 09:08:31 |
Start date: | 28/10/2021 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff633bc0000 |
File size: | 280064 bytes |
MD5 hash: | 9D59442313565C2E0860B88BF32B2277 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 09:08:31 |
Start date: | 28/10/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff703e40000 |
File size: | 885760 bytes |
MD5 hash: | C5E9B1D1103EDCEA2E408E9497A5A88F |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 09:08:32 |
Start date: | 28/10/2021 |
Path: | C:\Windows\System32\xcopy.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9e0000 |
File size: | 47616 bytes |
MD5 hash: | F359375C36D2C540DFF1141B11BF2F7F |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Process Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 09:08:33 |
Start date: | 28/10/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff61cb30000 |
File size: | 71168 bytes |
MD5 hash: | F68AF942FD7CCC0E7BAB1A2335D2AD26 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Execution Graph |
---|
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 0.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 31.8% |
Total number of Nodes: | 132 |
Total number of Limit Nodes: | 5 |
Graph
Executed Functions |
---|
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Control-flow Graph |
---|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |