Windows
Analysis Report
essai.exe
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
essai.exe (PID: 4628 cmdline:
"C:\Users\ user\Deskt op\essai.e xe" MD5: 6F776E9782C231B5FF969A0F16C1821A) explorer.exe (PID: 4792 cmdline:
C:\windows \explorer. exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
- cleanup
System Summary |
---|
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
- • AV Detection
- • Compliance
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Section loaded: |
Source: | File created: | Jump to behavior |
Source: | Code function: |
Source: | Dropped File: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | Section loaded: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: | ||
Source: | Process created: |
Source: | File read: | Jump to behavior |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry key monitored for changes: |
Source: | Process information set: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 13 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | 12 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | 1 Software Packing | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 12 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 DLL Side-Loading | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
93% | Virustotal | Browse | ||
86% | Metadefender | Browse | ||
98% | ReversingLabs | Win32.Worm.Mofksys | ||
100% | Avira | TR/VB.Agent.IK | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/VB.Agent.IK | ||
100% | Avira | TR/VB.Agent.IK | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
93% | Virustotal | Browse | ||
86% | Metadefender | Browse | ||
98% | ReversingLabs | Win32.Worm.Mofksys | ||
93% | Virustotal | Browse | ||
86% | Metadefender | Browse | ||
98% | ReversingLabs | Win32.Worm.Mofksys |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.CFI.Gen | Download File | ||
100% | Avira | TR/Crypt.CFI.Gen | Download File |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 560086 |
Start date: | 26.01.2022 |
Start time: | 06:11:57 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 23s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | essai.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal92.adwa.winEXE@3/3@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): svchost.exe - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Process: | C:\Users\user\Desktop\essai.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 376832 |
Entropy (8bit): | 2.6161997591789414 |
Encrypted: | false |
SSDEEP: | 3072:VMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6W:Vn3MN1JlveK6VUsQOj |
MD5: | 6F776E9782C231B5FF969A0F16C1821A |
SHA1: | 1F6FE84939DA4051CE47B81130823665298A2B60 |
SHA-256: | 00165A5A0AF9312110E3E579DC8E599F5DA540A33F12F3E55B098653A8A4D043 |
SHA-512: | 2B37FB088FC294B030D23B1CD45E13D513B389237EC966E93309DD66A830A6C1D38960F642CF33847D2AEE57EE669D783DA52B31CDC97ED90EBA03950D1F59E7 |
Malicious: | true |
Antivirus: | |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\essai.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26750 |
Entropy (8bit): | 4.312743780697173 |
Encrypted: | false |
SSDEEP: | 192:SaAl+No9UH86KlVsV9P6AO1miRx8VYr4eZJgnda4/cUe3uS:Sbgl86+yyA2UVYrpZAB/5e3uS |
MD5: | D1BE5FAEBD2D0EDA16E0BC3CED28BC4D |
SHA1: | C0D48C5121FB07D8EBEECA7488B1965FB8E59AFE |
SHA-256: | 9A9641164188E3C6E379AC46389174E07FCF6D4E125B501F9D5A63189F907992 |
SHA-512: | BB7A895265A9DE1D3E5FAEEBE84CE2C8544B4ABF25FEECC3085F49FFF4596470D51AB989B410A2113CE3C7DBB60BE946DC23663DE027A0BC726BA7E2998DA3CF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\essai.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 376832 |
Entropy (8bit): | 2.6161997591789414 |
Encrypted: | false |
SSDEEP: | 3072:VMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6W:Vn3MN1JlveK6VUsQOj |
MD5: | 6F776E9782C231B5FF969A0F16C1821A |
SHA1: | 1F6FE84939DA4051CE47B81130823665298A2B60 |
SHA-256: | 00165A5A0AF9312110E3E579DC8E599F5DA540A33F12F3E55B098653A8A4D043 |
SHA-512: | 2B37FB088FC294B030D23B1CD45E13D513B389237EC966E93309DD66A830A6C1D38960F642CF33847D2AEE57EE669D783DA52B31CDC97ED90EBA03950D1F59E7 |
Malicious: | true |
Antivirus: | |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 2.6161997591789414 |
TrID: |
|
File name: | essai.exe |
File size: | 376832 |
MD5: | 6f776e9782c231b5ff969a0f16c1821a |
SHA1: | 1f6fe84939da4051ce47b81130823665298a2b60 |
SHA256: | 00165a5a0af9312110e3e579dc8e599f5da540a33f12f3e55b098653a8a4d043 |
SHA512: | 2b37fb088fc294b030d23b1cd45e13d513b389237ec966e93309dd66a830a6c1d38960f642cf33847d2aee57ee669d783da52b31cdc97ed90eba03950d1f59e7 |
SSDEEP: | 3072:VMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6W:Vn3MN1JlveK6VUsQOj |
File Content Preview: | MZ......................@.............$.....................h...........!..L.!This program cannot be runPE..L......F..........................................@.............................................................................(........ ......... |
Icon Hash: | 44e6fad2e07e9e60 |
Entrypoint: | 0x4012b4 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x46A4AA95 [Mon Jul 23 13:18:13 2007 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 30e5df4fdb501cc0bf738d65c89185b6 |
Instruction |
---|
push 004076BCh |
call 00007FD080B10165h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
xor byte ptr [eax], al |
add byte ptr [eax], al |
cmp byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
push ds |
and byte ptr [edx+5Fh], bh |
pop ebx |
add al, B6h |
inc edx |
mov edx, 2541FDB4h |
add dword ptr [eax+60h], 00000000h |
add byte ptr [eax], al |
add dword ptr [eax], eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
js 00007FD080B101D5h |
jbe 00007FD080B10172h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
dec esp |
xor dword ptr [eax], eax |
add ch, byte ptr [edx] |
push 7B5A9218h |
mov bl, 49h |
mov ah, 12h |
pop ss |
pop ebp |
inc ecx |
loope 00007FD080B101BBh |
aaa |
mov al, bh |
dec esp |
ficomp word ptr [ecx] |
xor eax, dword ptr [eax-50h] |
xchg eax, ecx |
xchg eax, esp |
scasd |
test al, 85h |
dec esp |
cmp cl, byte ptr [edi-53h] |
xor ebx, dword ptr [ecx-48EE309Ah] |
or al, 00h |
stosb |
add byte ptr [eax-2Dh], ah |
xchg eax, ebx |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
push cs |
arpl word ptr [eax], ax |
add dl, cl |
bound eax, dword ptr [eax] |
add byte ptr [eax], al |
add eax, 726F4600h |
insd |
xor dword ptr [eax], eax |
or eax, 46000501h |
outsd |
jc 00007FD080B101DFh |
xor dword ptr [eax], eax |
sbb dword ptr [ecx], eax |
add byte ptr [edx+00h], al |
and al, byte ptr [eax] |
and eax, dword ptr [esi+00000062h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x95f4 | 0x28 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb000 | 0x42000 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x228 | 0x20 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0xfc | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x9000 | 0x9000 | False | 0.310574001736 | data | 4.84291359329 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x9f0 | 0x1000 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0xb000 | 0x42000 | 0x42000 | False | 0.130311908144 | data | 1.78643267268 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
kwvzuww | 0x4d000 | 0xf000 | 0xf000 | False | 0.437613932292 | data | 4.43065012785 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
xnqjrdx | 0x5c000 | 0x1000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x110a4 | 0x668 | data | ||
RT_ICON | 0x10dbc | 0x2e8 | data | ||
RT_ICON | 0x10c94 | 0x128 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0xe6ec | 0x25a8 | dBase III DBT, version number 0, next free block index 40 | ||
RT_ICON | 0xd844 | 0xea8 | data | ||
RT_ICON | 0xc79c | 0x10a8 | dBase III DBT, version number 0, next free block index 40 | ||
RT_ICON | 0xbef4 | 0x8a8 | data | ||
RT_ICON | 0xba8c | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0xb524 | 0x568 | GLS_BINARY_LSB_FIRST | ||
RT_GROUP_ICON | 0xb4a0 | 0x84 | data | ||
RT_VERSION | 0xb270 | 0x230 | data | English | United States |
DLL | Import |
---|---|
MSVBVM60.DLL | _CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaEnd, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaExitProc, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaVarCat, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarSetVar, __vbaI4Var, __vbaLateMemCall, __vbaVarAdd, __vbaVarLateMemCallLd, _CIatan, __vbaStrMove, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr |
Description | Data |
---|---|
Translation | 0x0409 0x04b0 |
InternalName | essai |
FileVersion | 15.05.0088 |
ProductName | xcv |
ProductVersion | 15.05.0088 |
FileDescription | Dossier de fichiers |
OriginalFilename | essai.exe |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Target ID: | 1 |
Start time: | 06:12:54 |
Start date: | 26/01/2022 |
Path: | C:\Users\user\Desktop\essai.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 376832 bytes |
MD5 hash: | 6F776E9782C231B5FF969A0F16C1821A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Visual Basic |
Reputation: | low |
Target ID: | 2 |
Start time: | 06:12:56 |
Start date: | 26/01/2022 |
Path: | C:\Windows\explorer.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f22f0000 |
File size: | 3933184 bytes |
MD5 hash: | AD5296B280E8F522A8A897C96BAB0E1D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |