Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
snd.exe

Overview

General Information

Sample Name:snd.exe
Analysis ID:568663
MD5:0a76e0e59456d310419266270c410936
SHA1:1b6df9f456fbb2f793d8402d78c3338355ed98be
SHA256:886cb22ffe43a3838ef152ef57bbfa66f52b71c534bfe3d8af3d29ea973daadf
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Sample execution stops while process was sleeping (likely an evasion)
Potential time zone aware malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Program does not show much activity (idle)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • snd.exe (PID: 5692 cmdline: "C:\Users\user\Desktop\snd.exe" MD5: 0A76E0E59456D310419266270C410936)
    • conhost.exe (PID: 5516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
snd.exeMALWARE_Win_ExMatterDetects BlackMatter data exfiltration toolditekSHen
  • 0xf63a1:$s1: Renci.SshNet.
  • 0xf6ce2:$s1: Renci.SshNet.
  • 0xf6da5:$s1: Renci.SshNet.
  • 0xf6e2b:$s1: Renci.SshNet.
  • 0xf7b60:$s1: Renci.SshNet.
  • 0xf7ba6:$s1: Renci.SshNet.
  • 0xf7bf6:$s1: Renci.SshNet.
  • 0xf7e44:$s1: Renci.SshNet.
  • 0xf8298:$s1: Renci.SshNet.
  • 0xf82c0:$s1: Renci.SshNet.
  • 0xf83bd:$s1: Renci.SshNet.
  • 0xfb414:$s1: Renci.SshNet.
  • 0xfb437:$s1: Renci.SshNet.
  • 0xfb605:$s1: Renci.SshNet.
  • 0xfb97f:$s1: Renci.SshNet.
  • 0xfb9a8:$s1: Renci.SshNet.
  • 0xfb9db:$s1: Renci.SshNet.
  • 0xfba06:$s1: Renci.SshNet.
  • 0xfba35:$s1: Renci.SshNet.
  • 0xfba67:$s1: Renci.SshNet.
  • 0xfba89:$s1: Renci.SshNet.
SourceRuleDescriptionAuthorStrings
0.2.snd.exe.d30000.0.unpackMALWARE_Win_ExMatterDetects BlackMatter data exfiltration toolditekSHen
  • 0xf63a1:$s1: Renci.SshNet.
  • 0xf6ce2:$s1: Renci.SshNet.
  • 0xf6da5:$s1: Renci.SshNet.
  • 0xf6e2b:$s1: Renci.SshNet.
  • 0xf7b60:$s1: Renci.SshNet.
  • 0xf7ba6:$s1: Renci.SshNet.
  • 0xf7bf6:$s1: Renci.SshNet.
  • 0xf7e44:$s1: Renci.SshNet.
  • 0xf8298:$s1: Renci.SshNet.
  • 0xf82c0:$s1: Renci.SshNet.
  • 0xf83bd:$s1: Renci.SshNet.
  • 0xfb414:$s1: Renci.SshNet.
  • 0xfb437:$s1: Renci.SshNet.
  • 0xfb605:$s1: Renci.SshNet.
  • 0xfb97f:$s1: Renci.SshNet.
  • 0xfb9a8:$s1: Renci.SshNet.
  • 0xfb9db:$s1: Renci.SshNet.
  • 0xfba06:$s1: Renci.SshNet.
  • 0xfba35:$s1: Renci.SshNet.
  • 0xfba67:$s1: Renci.SshNet.
  • 0xfba89:$s1: Renci.SshNet.
0.0.snd.exe.d30000.0.unpackMALWARE_Win_ExMatterDetects BlackMatter data exfiltration toolditekSHen
  • 0xf63a1:$s1: Renci.SshNet.
  • 0xf6ce2:$s1: Renci.SshNet.
  • 0xf6da5:$s1: Renci.SshNet.
  • 0xf6e2b:$s1: Renci.SshNet.
  • 0xf7b60:$s1: Renci.SshNet.
  • 0xf7ba6:$s1: Renci.SshNet.
  • 0xf7bf6:$s1: Renci.SshNet.
  • 0xf7e44:$s1: Renci.SshNet.
  • 0xf8298:$s1: Renci.SshNet.
  • 0xf82c0:$s1: Renci.SshNet.
  • 0xf83bd:$s1: Renci.SshNet.
  • 0xfb414:$s1: Renci.SshNet.
  • 0xfb437:$s1: Renci.SshNet.
  • 0xfb605:$s1: Renci.SshNet.
  • 0xfb97f:$s1: Renci.SshNet.
  • 0xfb9a8:$s1: Renci.SshNet.
  • 0xfb9db:$s1: Renci.SshNet.
  • 0xfba06:$s1: Renci.SshNet.
  • 0xfba35:$s1: Renci.SshNet.
  • 0xfba67:$s1: Renci.SshNet.
  • 0xfba89:$s1: Renci.SshNet.
No Sigma rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: snd.exeVirustotal: Detection: 52%Perma Link
Source: snd.exeReversingLabs: Detection: 60%
Source: snd.exeJoe Sandbox ML: detected
Source: snd.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: snd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\work\file_sender\sender2\sender2\bin\Release\sender2.pdb source: snd.exe
Source: Binary string: C:\work\file_sender\sender2\sender2\bin\Release\sender2.pdbx source: snd.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: unknownTCP traffic detected without corresponding DNS query: 164.92.232.192
Source: snd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: snd.exeString found in binary or memory: https://164.92.232.192/data/
Source: snd.exeString found in binary or memory: https://164.92.232.192/data/3Can
Source: snd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://164.92.232.192/data/WORKGROUP.813848/
Source: snd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://164.92.232.192/data/x
Source: snd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://164.92.232.192x
Source: snd.exe, 00000000.00000002.519656216.000000000327C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://164.92H
Source: snd.exeString found in binary or memory: https://duckduckgo.com
Source: snd.exeString found in binary or memory: https://duckduckgo.comqThere
Source: snd.exeString found in binary or memory: https://tools.ietf.org/html/rfc4253#sec
Source: snd.exeString found in binary or memory: https://tools.ietf.org/html/rfc4253#section-4.
Source: snd.exeString found in binary or memory: https://tools.ietf.org/html/rfc4253#section-4.2

System Summary

barindex
Source: snd.exe, type: SAMPLEMatched rule: Detects BlackMatter data exfiltration tool Author: ditekSHen
Source: 0.2.snd.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects BlackMatter data exfiltration tool Author: ditekSHen
Source: 0.0.snd.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects BlackMatter data exfiltration tool Author: ditekSHen
Source: snd.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: snd.exe, type: SAMPLEMatched rule: MALWARE_Win_ExMatter hash2 = a5e050f1278473d41c3a3d6f98f3fd82932f51a937bc57d8f5605815f0efb0f8, hash1 = 4a0e10e1e9fea0906379f99fa350b91c2af37f0fd2cc55491643cc71a9887d30, author = ditekSHen, description = Detects BlackMatter data exfiltration tool
Source: 0.2.snd.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_ExMatter hash2 = a5e050f1278473d41c3a3d6f98f3fd82932f51a937bc57d8f5605815f0efb0f8, hash1 = 4a0e10e1e9fea0906379f99fa350b91c2af37f0fd2cc55491643cc71a9887d30, author = ditekSHen, description = Detects BlackMatter data exfiltration tool
Source: 0.0.snd.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_ExMatter hash2 = a5e050f1278473d41c3a3d6f98f3fd82932f51a937bc57d8f5605815f0efb0f8, hash1 = 4a0e10e1e9fea0906379f99fa350b91c2af37f0fd2cc55491643cc71a9887d30, author = ditekSHen, description = Detects BlackMatter data exfiltration tool
Source: snd.exe, 00000000.00000002.518779511.00000000012BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs snd.exe
Source: snd.exe, 00000000.00000000.250137464.0000000000E7E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesender2.exe0 vs snd.exe
Source: snd.exeBinary or memory string: OriginalFilenamesender2.exe0 vs snd.exe
Source: snd.exeVirustotal: Detection: 52%
Source: snd.exeReversingLabs: Detection: 60%
Source: snd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\snd.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\snd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: unknownProcess created: C:\Users\user\Desktop\snd.exe "C:\Users\user\Desktop\snd.exe"
Source: C:\Users\user\Desktop\snd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5516:120:WilError_01
Source: snd.exe, 00000000.00000002.520557629.0000000003631000.00000004.00000800.00020000.00000000.sdmp, snd.exe, 00000000.00000002.520547699.0000000003621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C\\?\C:\Program Files (x86)\autoit3\AutoItX\Examples\C++\AutoItX.sln
Source: snd.exe, 00000000.00000002.520557629.0000000003631000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ?C:\Program Files (x86)\autoit3\AutoItX\Examples\C++\AutoItX.sln0y
Source: snd.exe, 00000000.00000002.520557629.0000000003631000.00000004.00000800.00020000.00000000.sdmp, snd.exe, 00000000.00000002.520584273.0000000003669000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AutoItX.sln
Source: snd.exe, 00000000.00000002.520584273.0000000003669000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C\\?\C:\Program Files (x86)\autoit3\AutoItX\Examples\C++\AutoItX.sln(
Source: snd.exe, 00000000.00000002.520547699.0000000003621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \\?\C:\Program Files (x86)\autoit3\AutoItX\Examples\C++\AutoItX.sln
Source: snd.exe, 00000000.00000002.520584273.0000000003669000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ?C:\Program Files (x86)\autoit3\AutoItX\Examples\C++\AutoItX.sln
Source: classification engineClassification label: mal64.evad.winEXE@2/1@0/1
Source: snd.exe, Renci.SshNet/Security/KeyExchangeHashData.csSuspicious method names: System.Void Renci.SshNet.Security.KeyExchangeHashData::set_ClientPayload(System.Byte[])
Source: snd.exe, Renci.SshNet/Security/KeyExchangeHashData.csSuspicious method names: System.Void Renci.SshNet.Security.KeyExchangeHashData::set_ServerPayload(System.Byte[])
Source: snd.exe, Renci.SshNet/Security/KeyExchangeHashData.csSuspicious method names: System.Byte[] Renci.SshNet.Security.KeyExchangeHashData::get_ServerPayload()
Source: snd.exe, Renci.SshNet/Security/KeyExchangeHashData.csSuspicious method names: System.Byte[] Renci.SshNet.Security.KeyExchangeHashData::get_ClientPayload()
Source: snd.exe, Renci.SshNet/Security/GroupExchangeHashData.csSuspicious method names: System.Byte[] Renci.SshNet.Security.GroupExchangeHashData::get_ServerPayload()
Source: snd.exe, Renci.SshNet/Security/GroupExchangeHashData.csSuspicious method names: System.Void Renci.SshNet.Security.GroupExchangeHashData::set_ServerPayload(System.Byte[])
Source: snd.exe, Renci.SshNet/Security/GroupExchangeHashData.csSuspicious method names: System.Byte[] Renci.SshNet.Security.GroupExchangeHashData::get_ClientPayload()
Source: snd.exe, Renci.SshNet/Security/GroupExchangeHashData.csSuspicious method names: System.Void Renci.SshNet.Security.GroupExchangeHashData::set_ClientPayload(System.Byte[])
Source: snd.exe, Alphaleonis/Win32/Security/ProcessContext.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: snd.exe, Alphaleonis/Win32/Security/ProcessContext.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Int32)
Source: snd.exe, Alphaleonis/Win32/Security/ProcessContext.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: snd.exe, Alphaleonis/Win32/Security/ProcessContext.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.SecurityIdentifier)
Source: snd.exe, TakeOwnership/OwnershipTaker.csSecurity API names: System.Void System.IO.Directory::SetAccessControl(System.String,System.Security.AccessControl.DirectorySecurity)
Source: snd.exe, TakeOwnership/OwnershipTaker.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.Directory::GetAccessControl(System.String)
Source: snd.exe, TakeOwnership/OwnershipTaker.csSecurity API names: System.Security.AccessControl.AuthorizationRuleCollection System.Security.AccessControl.CommonObjectSecurity::GetAccessRules(System.Boolean,System.Boolean,System.Type)
Source: snd.exe, TakeOwnership/OwnershipTaker.csSecurity API names: System.Void System.IO.File::SetAccessControl(System.String,System.Security.AccessControl.FileSecurity)
Source: snd.exe, TakeOwnership/OwnershipTaker.csSecurity API names: System.Security.AccessControl.FileSecurity System.IO.File::GetAccessControl(System.String)
Source: snd.exe, Alphaleonis/Win32/Filesystem/Directory.csSecurity API names: System.Security.AccessControl.DirectorySecurity Alphaleonis.Win32.Filesystem.File::GetAccessControlCore<System.Security.AccessControl.DirectorySecurity>(System.Boolean,System.String,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/Directory.csSecurity API names: System.Void Alphaleonis.Win32.Filesystem.File::SetAccessControlCore(System.String,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.ObjectSecurity,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/Directory.csSecurity API names: System.Security.AccessControl.DirectorySecurity Alphaleonis.Win32.Filesystem.File::GetAccessControlHandleCore<System.Security.AccessControl.DirectorySecurity>(System.Boolean,System.Boolean,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Security.SECURITY_INFORMATION)
Source: snd.exe, Alphaleonis/Win32/Filesystem/File.csSecurity API names: System.Security.AccessControl.FileSecurity Alphaleonis.Win32.Filesystem.File::GetAccessControlCore<System.Security.AccessControl.FileSecurity>(System.Boolean,System.String,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/File.csSecurity API names: System.Security.AccessControl.FileSecurity Alphaleonis.Win32.Filesystem.File::GetAccessControlHandleCore<System.Security.AccessControl.FileSecurity>(System.Boolean,System.Boolean,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Security.SECURITY_INFORMATION)
Source: snd.exe, Alphaleonis/Win32/Filesystem/File.csSecurity API names: System.Void Alphaleonis.Win32.Filesystem.File::SetAccessControlCore(System.String,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.ObjectSecurity,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Security/InternalPrivilegeEnabler.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Security.Principal.TokenAccessLevels)
Source: snd.exe, Alphaleonis/Win32/Filesystem/FileInfo.csSecurity API names: System.Security.AccessControl.FileSecurity Alphaleonis.Win32.Filesystem.File::GetAccessControlCore<System.Security.AccessControl.FileSecurity>(System.Boolean,System.String,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/FileInfo.csSecurity API names: System.Void Alphaleonis.Win32.Filesystem.File::SetAccessControlCore(System.String,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.ObjectSecurity,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/DirectoryInfo.csSecurity API names: System.Void Alphaleonis.Win32.Filesystem.File::SetAccessControlCore(System.String,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.ObjectSecurity,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/DirectoryInfo.csSecurity API names: System.Security.AccessControl.DirectorySecurity Alphaleonis.Win32.Filesystem.File::GetAccessControlCore<System.Security.AccessControl.DirectorySecurity>(System.Boolean,System.String,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exe, Alphaleonis/Win32/Filesystem/BackupFileStream.csSecurity API names: System.Void Alphaleonis.Win32.Filesystem.File::SetAccessControlCore(System.String,Microsoft.Win32.SafeHandles.SafeFileHandle,System.Security.AccessControl.ObjectSecurity,System.Security.AccessControl.AccessControlSections,Alphaleonis.Win32.Filesystem.PathFormat)
Source: snd.exeStatic file information: File size 1355264 > 1048576
Source: snd.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: snd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: snd.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14a400
Source: snd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: snd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\work\file_sender\sender2\sender2\bin\Release\sender2.pdb source: snd.exe
Source: Binary string: C:\work\file_sender\sender2\sender2\bin\Release\sender2.pdbx source: snd.exe
Source: C:\Users\user\Desktop\snd.exeCode function: 0_2_00007FFF3016620C push ds; ret
Source: C:\Windows\System32\conhost.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\snd.exeWindow / User API: threadDelayed 3965
Source: C:\Users\user\Desktop\snd.exeWindow / User API: threadDelayed 5815
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -22136092888451448s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -100000s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99843s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99703s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99584s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99435s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99290s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99187s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -99077s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98968s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98859s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98750s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98640s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98530s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98421s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98312s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98202s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -98093s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97983s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97874s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97765s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97656s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97546s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97437s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97327s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97218s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -97108s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96998s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96890s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96780s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96669s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96562s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96449s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96342s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96234s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96121s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -96015s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95906s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95795s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95687s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95577s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95468s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95359s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95241s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95140s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -95031s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -94922s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -94812s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -94703s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -94592s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -94483s >= -30000s
Source: C:\Users\user\Desktop\snd.exe TID: 4592Thread sleep time: -94373s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\snd.exeSystem information queried: CurrentTimeZoneInformation
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 100000
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99843
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99703
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99584
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99435
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99290
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99187
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 99077
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98968
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98859
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98750
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98640
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98530
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98421
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98312
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98202
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 98093
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97983
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97874
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97765
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97656
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97546
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97437
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97327
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97218
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 97108
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96998
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96890
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96780
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96669
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96562
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96449
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96342
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96234
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96121
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 96015
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95906
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95795
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95687
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95577
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95468
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95359
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95241
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95140
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 95031
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 94922
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 94812
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 94703
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 94592
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 94483
Source: C:\Users\user\Desktop\snd.exeThread delayed: delay time: 94373
Source: snd.exe, 00000000.00000002.519127719.000000000131A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: snd.exe, 00000000.00000002.519127719.000000000131A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD

Anti Debugging

barindex
Source: C:\Users\user\Desktop\snd.exeProcess Stats: CPU usage > 90% for more than 60s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\snd.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\snd.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\snd.exeQueries volume information: C:\Users\user\Desktop\snd.exe VolumeInformation
Source: C:\Users\user\Desktop\snd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts122
Virtualization/Sandbox Evasion
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS122
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
snd.exe53%VirustotalBrowse
snd.exe61%ReversingLabsByteCode-MSIL.Trojan.ExMatter
snd.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://164.92.232.192/data/x0%Avira URL Cloudsafe
https://164.92.232.192/data/3Can0%Avira URL Cloudsafe
https://164.92.232.192/data/WORKGROUP.813848/0%Avira URL Cloudsafe
https://duckduckgo.comqThere0%Avira URL Cloudsafe
https://164.92.232.192x0%Avira URL Cloudsafe
https://164.92.232.192/data/0%Avira URL Cloudsafe
https://164.92H0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://164.92.232.192/data/xsnd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://164.92.232.192/data/3Cansnd.exefalse
  • Avira URL Cloud: safe
unknown
https://164.92.232.192/data/WORKGROUP.813848/snd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://tools.ietf.org/html/rfc4253#section-4.2snd.exefalse
    high
    https://duckduckgo.comqTheresnd.exefalse
    • Avira URL Cloud: safe
    unknown
    https://164.92.232.192xsnd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesnd.exe, 00000000.00000002.519526709.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://164.92.232.192/data/snd.exefalse
      • Avira URL Cloud: safe
      unknown
      https://tools.ietf.org/html/rfc4253#secsnd.exefalse
        high
        https://164.92Hsnd.exe, 00000000.00000002.519656216.000000000327C000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        https://tools.ietf.org/html/rfc4253#section-4.snd.exefalse
          high
          https://duckduckgo.comsnd.exefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            164.92.232.192
            unknownUnited States
            46930ASN-DPSDUSfalse
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:568663
            Start date:08.02.2022
            Start time:17:23:19
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 6s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:snd.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:25
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal64.evad.winEXE@2/1@0/1
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 7.1% (good quality ratio 5.6%)
            • Quality average: 55.7%
            • Quality standard deviation: 36.8%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.6.115
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Execution Graph export aborted for target snd.exe, PID 5692 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            17:24:49API Interceptor963x Sleep call for process: snd.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\snd.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):91
            Entropy (8bit):4.298548340139557
            Encrypted:false
            SSDEEP:3:ccFJfwV3XA8nwGA9KYoNRgLcv:FFOjwj9dauLe
            MD5:87449663D541AE83DCD4BDF9CBE96D0F
            SHA1:A1419597141B07ACEBDE8683C16C6D6EB92FA0B8
            SHA-256:803117358C99A080AB7B481E412993F2A9EF6A6128E1BE390A038A249650AC6F
            SHA-512:D7A73F4E32F15A6BC9C5C23B49623C183B7E7F0A76744067FD07561851815078BFF865B2C41276BF0C1C62F7B3E33BB2C2F4AD6D46E0D3DF99F095EACF7F1CC7
            Malicious:false
            Reputation:low
            Preview:Can't make an upload dir One or more errors occurred. falling back..Connecting to host.....
            File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):6.04960117701529
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Generic Win/DOS Executable (2004/3) 0.01%
            File name:snd.exe
            File size:1355264
            MD5:0a76e0e59456d310419266270c410936
            SHA1:1b6df9f456fbb2f793d8402d78c3338355ed98be
            SHA256:886cb22ffe43a3838ef152ef57bbfa66f52b71c534bfe3d8af3d29ea973daadf
            SHA512:bc32f32dbabf995a9971b7f34a433f93cd5ef634aa1bc91402b9474b957d115f493f93ca8d738080f2e3bdfd5d5430d694706a1cc6a42e9743edc87c064336ac
            SSDEEP:24576:Jmh0AMeTP7tpKY3sN1XUNPZKoN2ALtSax+:cFBThpKTXUNPZK2jf
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%..a................................. ........@.. ....................... ............@................................
            Icon Hash:00828e8e8686b000
            Entrypoint:0x54c29e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows cui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x61FB1625 [Wed Feb 2 23:39:17 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:v4.0.30319
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x14c2500x4b.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x14e0000x596.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1500000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x14c1e00x1c.text
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x14a2a40x14a400False0.377296880914data6.05319018352IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rsrc0x14e0000x5960x600False0.412760416667data4.03797800026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1500000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_VERSION0x14e0a00x30cdata
            RT_MANIFEST0x14e3ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
            DLLImport
            mscoree.dll_CorExeMain
            DescriptionData
            Translation0x0000 0x04b0
            LegalCopyrightCopyright 2021
            Assembly Version1.0.0.0
            InternalNamesender2.exe
            FileVersion1.0.0.0
            CompanyName
            LegalTrademarks
            Comments
            ProductNamesender2
            ProductVersion1.0.0.0
            FileDescriptionsender2
            OriginalFilenamesender2.exe
            TimestampSource PortDest PortSource IPDest IP
            Feb 8, 2022 17:24:23.024465084 CET49762443192.168.2.7164.92.232.192
            Feb 8, 2022 17:24:23.024528027 CET44349762164.92.232.192192.168.2.7
            Feb 8, 2022 17:24:23.024657965 CET49762443192.168.2.7164.92.232.192
            Feb 8, 2022 17:24:23.287492037 CET49762443192.168.2.7164.92.232.192
            Feb 8, 2022 17:24:23.287561893 CET44349762164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:02.606378078 CET49762443192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:02.653862953 CET44349762164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:03.405878067 CET49849443192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:03.405937910 CET44349849164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:03.406033039 CET49849443192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:03.461317062 CET49849443192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:03.461361885 CET44349849164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:06.693900108 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:06.724852085 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:06.724984884 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:06.749135971 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:06.764698982 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:06.816354990 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:07.017211914 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:07.046648979 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:07.047993898 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:07.097641945 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:12.561610937 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:12.590997934 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:14.518470049 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:14.547741890 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:14.555624962 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:14.723253965 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:22.299853086 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:22.328149080 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:22.329166889 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:22.358473063 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:22.358499050 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:22.370834112 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:22.409041882 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:22.421771049 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:22.453186989 CET2249853164.92.232.192192.168.2.7
            Feb 8, 2022 17:26:22.453304052 CET4985322192.168.2.7164.92.232.192
            Feb 8, 2022 17:26:26.199938059 CET49849443192.168.2.7164.92.232.192

            Click to jump to process

            Target ID:0
            Start time:17:24:45
            Start date:08/02/2022
            Path:C:\Users\user\Desktop\snd.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\snd.exe"
            Imagebase:0xd30000
            File size:1355264 bytes
            MD5 hash:0A76E0E59456D310419266270C410936
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:.Net C# or VB.NET
            Reputation:low

            Target ID:1
            Start time:17:24:45
            Start date:08/02/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff774ee0000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            No disassembly