Play interactive tourEdit tour

Windows Analysis Report http://SetupHost.exe

Overview

General Information

Sample URL:http://SetupHost.exe
Analysis ID:547105
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cmd.exe (PID: 7140 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 7156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 6336 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

There are no malicious signatures, click here to show all signatures.

System Summary:

barindex
Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Source: Process startedAuthor: James Pemberton / @4A616D6573: Data: Command: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" , CommandLine: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wget.exe, NewProcessName: C:\Windows\SysWOW64\wget.exe, OriginalFileName: C:\Windows\SysWOW64\wget.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" > cmdline.out 2>&1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7140, ProcessCommandLine: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" , ProcessId: 6336

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownDNS traffic detected: query: setuphost.exe replaycode: Name error (3)
Source: unknownDNS traffic detected: queries for: setuphost.exe
Source: wget.exe, 00000003.00000002.274257800.0000000000B70000.00000004.00000020.sdmpString found in binary or memory: http://SetupHost.exe
Source: wget.exe, 00000003.00000002.274298398.00000000010A5000.00000004.00000040.sdmp, wget.exe, 00000003.00000002.274213667.00000000009CC000.00000004.00000001.sdmp, cmdline.out.0.drString found in binary or memory: http://setuphost.exe/
Source: wget.exe, 00000003.00000002.274298398.00000000010A5000.00000004.00000040.sdmpString found in binary or memory: http://setuphost.exe/&
Source: wget.exe, 00000003.00000002.274298398.00000000010A5000.00000004.00000040.sdmpString found in binary or memory: http://setuphost.exe/.
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7156:120:WilError_01
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: classification engineClassification label: clean1.win@4/1@1/0
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSystem Information Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryRemote System Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 547105 URL: http://SetupHost.exe Startdate: 02/01/2022 Architecture: WINDOWS Score: 1 5 cmd.exe 2 2->5         started        process3 7 wget.exe 1 5->7         started        10 conhost.exe 5->10         started        dnsIp4 12 setuphost.exe 7->12
SourceDetectionScannerLabelLink
http://SetupHost.exe0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://setuphost.exe/0%Avira URL Cloudsafe
http://setuphost.exe/&0%Avira URL Cloudsafe
http://setuphost.exe/.0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
setuphost.exe
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://setuphost.exe/wget.exe, 00000003.00000002.274298398.00000000010A5000.00000004.00000040.sdmp, wget.exe, 00000003.00000002.274213667.00000000009CC000.00000004.00000001.sdmp, cmdline.out.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://setuphost.exe/&wget.exe, 00000003.00000002.274298398.00000000010A5000.00000004.00000040.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://SetupHost.exewget.exe, 00000003.00000002.274257800.0000000000B70000.00000004.00000020.sdmpfalse
      unknown
      http://setuphost.exe/.wget.exe, 00000003.00000002.274298398.00000000010A5000.00000004.00000040.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos

      General Information

      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:547105
      Start date:02.01.2022
      Start time:12:27:54
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 1m 51s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:urldownload.jbs
      Sample URL:http://SetupHost.exe
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:CLEAN
      Classification:clean1.win@4/1@1/0
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Unable to download file
      Warnings:
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe
      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.35.236.56
      • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, fs.microsoft.com, store-images.s-microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      C:\Users\user\Desktop\cmdline.out
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):179
      Entropy (8bit):4.675502185168244
      Encrypted:false
      SSDEEP:3:1tX5cz4ARoNvFVNNv3RGvKiMOrSGIPCOLK46ZmqLvdXnA+WpV7v7:HXu5eznpicpGmsdXAtX
      MD5:2042A8D9D5C0300CF8CFEDBE5B9F99EF
      SHA1:EE16E2DB5A511F15A3FF2BA777D7414BA3886890
      SHA-256:DF0AFD212CEA9AEF92E3ED6A9BDA480BEB09C55F905BB03B9874FE7F83861AC7
      SHA-512:2019042DF082370945940F8B46347C0BF6BD316B398618EA479BA19CAA147875F65C451482B3BE1F0C879C6CEA9428A130EE258A75B40BD18BF1399CE31D489A
      Malicious:false
      Reputation:low
      Preview: --2022-01-02 12:28:43-- http://setuphost.exe/..Resolving setuphost.exe (setuphost.exe)... failed: No such host is known. ...wget: unable to resolve host address 'setuphost.exe'..

      Static File Info

      No static file info

      Network Behavior

      Download Network PCAP: filteredfull

      TimestampSource PortDest PortSource IPDest IP
      Jan 2, 2022 12:28:44.175865889 CET5114353192.168.2.38.8.8.8
      Jan 2, 2022 12:28:44.196456909 CET53511438.8.8.8192.168.2.3
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Jan 2, 2022 12:28:44.175865889 CET192.168.2.38.8.8.80xb7caStandard query (0)setuphost.exeA (IP address)IN (0x0001)
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Jan 2, 2022 12:28:44.196456909 CET8.8.8.8192.168.2.30xb7caName error (3)setuphost.exenonenoneA (IP address)IN (0x0001)

      Code Manipulations

      Statistics

      CPU Usage

      02468s020406080100

      Click to jump to process

      Memory Usage

      Click to jump to process

      Behavior

      Click to jump to process

      System Behavior

      Start time:12:28:42
      Start date:02/01/2022
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe" > cmdline.out 2>&1
      Imagebase:0xd80000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Start time:12:28:43
      Start date:02/01/2022
      Path:C:\Windows\SysWOW64\wget.exe
      Wow64 process (32bit):true
      Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "http://SetupHost.exe"
      Imagebase:0x400000
      File size:3895184 bytes
      MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly

      Code Analysis