Windows
Analysis Report
template.pdf
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
template.exe (PID: 5684 cmdline:
"C:\Users\ user\Deskt op\templat e.exe" MD5: 7B478A52E723DE424790F4C0B0658C11)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Msfpayloads_msf_10 | Metasploit Payloads - file msf.exe | Florian Roth |
| |
JoeSecurity_MetasploitPayload | Yara detected Metasploit Payload | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Msfpayloads_msf_10 | Metasploit Payloads - file msf.exe | Florian Roth |
| |
JoeSecurity_MetasploitPayload | Yara detected Metasploit Payload | Joe Security | ||
Msfpayloads_msf_10 | Metasploit Payloads - file msf.exe | Florian Roth |
| |
JoeSecurity_MetasploitPayload | Yara detected Metasploit Payload | Joe Security |
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
- • Anti Debugging
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Source: | Socket bind: | Jump to behavior |
Source: | Binary string: |
Source: | Code function: | 1_2_004055D0 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 1_2_00407053 | |
Source: | Code function: | 1_2_0040586F | |
Source: | Code function: | 1_2_0040989D | |
Source: | Code function: | 1_2_00402883 | |
Source: | Code function: | 1_2_00402883 | |
Source: | Code function: | 1_2_00409FBB | |
Source: | Code function: | 1_2_00409FBB | |
Source: | Code function: | 1_2_004051C6 | |
Source: | Code function: | 1_2_00402400 | |
Source: | Code function: | 1_2_004027F5 |
Source: | Static PE information: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Binary or memory string: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 1_2_0046008E |
Source: | Socket bind: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 3 Software Packing | 1 Input Capture | 1 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | 1 Non-Standard Port | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 3 Obfuscated Files or Information | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Remote Access Software | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | Virustotal | Browse | ||
89% | ReversingLabs | Win32.Trojan.Retelesh | ||
100% | Avira | TR/Patched.Gen2 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Patched.Gen2 | Download File | ||
100% | Avira | TR/Patched.Gen2 | Download File |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 573251 |
Start date: | 16.02.2022 |
Start time: | 12:55:54 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 35s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | template.pdf (renamed file extension from pdf to exe) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal76.troj.winEXE@1/0@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, BackgroundTransfer Host.exe, WMIADAP.exe, backgro undTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe - Excluded domains from analysis
(whitelisted): ris.api.iris.m icrosoft.com, ctldl.windowsupd ate.com, displaycatalog.mp.mic rosoft.com, img-prod-cms-rt-mi crosoft-com.akamaized.net, arc .msn.com - Not all processes where analyz
ed, report is missing behavior information
File type: | |
Entropy (8bit): | 6.319813352449741 |
TrID: |
|
File name: | template.exe |
File size: | 73802 |
MD5: | 7b478a52e723de424790f4c0b0658c11 |
SHA1: | 39ebd7b22d816c9fa2690353a4d334e80a2ca909 |
SHA256: | 7e1c7bf2d20218ca328153ee8a0889ca7938dc030c7139efd28845d8c0b54ccf |
SHA512: | fb00e1397e35928ea77fd315d3c0c45ec2a879281ca12ce35fd063b8c869fae8bb35febc06f071a2a85794b436c340faf222b0aa5a2419b753bf7107d71c7d5c |
SSDEEP: | 1536:IUpGe/Dji70cAW5X0WC7qHkT11CJcjw1r1KlGMb+KR0Nc8QsJq39:lhLje6W5gOETfgcjEs4e0Nc8QsC9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...C.}J........... |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x4054cb |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x4A7D8443 [Sat Aug 8 13:57:23 2009 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 481f47bbb2c9c21e108d65f52b04c448 |
Instruction |
---|
inc edx |
daa |
aaa |
xchg eax, ecx |
aaa |
salc |
stc |
inc ecx |
inc eax |
salc |
cld |
std |
cld |
cwde |
stc |
xchg eax, ecx |
aas |
inc ecx |
wait |
inc eax |
dec eax |
xchg eax, ebx |
inc eax |
wait |
nop |
lahf |
lahf |
xchg eax, ecx |
inc ecx |
daa |
clc |
daa |
cdq |
inc eax |
salc |
daa |
inc ecx |
dec ecx |
lahf |
stc |
xchg eax, edx |
inc ecx |
dec eax |
wait |
stc |
cmc |
cld |
dec ebx |
daa |
clc |
clc |
std |
inc edx |
xchg eax, edx |
cmc |
nop |
stc |
inc eax |
daa |
cmc |
xchg eax, ebx |
cdq |
dec ecx |
xchg eax, ebx |
dec eax |
inc ebx |
inc ebx |
nop |
wait |
inc edx |
inc ecx |
xchg eax, ecx |
dec edx |
clc |
cmc |
jmp 00007F10B50EACF5h |
cmp eax, 270C688Bh |
sal byte ptr [ecx+ecx+50h], FFFFFF9Eh |
nop |
add byte ptr fs:[eax], al |
mov edx, dword ptr [ebp+08h] |
mov edi, dword ptr [esi+14h] |
lea ebp, dword ptr [edi+74FF8514h] |
adc byte ptr [ebx+4F3BF227h], cl |
or byte ptr [esi+46h], dh |
mov eax, edi |
and al, 73h |
test edi, edi |
jne 00007F10B50E9802h |
mov esi, dword ptr [esi+0Ch] |
test esi, esi |
je 00007F10B50E9818h |
push esi |
call 00007F10B50EE602h |
mov edi, dword ptr [ebp-08h] |
mov eax, dword ptr [ebp-04h] |
push eax |
call dword ptr [0040C15Ch] |
add esp, FFFFFFABh |
jc 00007F10B50E97D2h |
je 00007F10B50E986Bh |
mov edx, dword ptr [eax+18508DFCh] |
mov dword ptr [eax-12h], edx |
mov dword ptr [eax], 25005700h |
lea edx, dword ptr [esi+eax] |
mov dword ptr [eax+08h], edi |
mov dword ptr [eax+1Eh], edx |
jmp 00007F10B4AF974Eh |
mov ecx, dword ptr [edi] |
mov dword ptr [ecx+4E8B0847h], edi |
or byte ptr [eax+ecx*8-75h], ch |
inc esi |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xc76c | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x15000 | 0x7c8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xc1e0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xc000 | 0x1e0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xa966 | 0xb000 | False | 0.814586292614 | data | 7.01001868151 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0xc000 | 0xfe6 | 0x1000 | False | 0.46142578125 | DOS executable (COM, 0x8C-variant) | 5.31839035374 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xd000 | 0x705c | 0x4000 | False | 0.25634765625 | data | 4.4078410232 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x15000 | 0x7c8 | 0x1000 | False | 0.197998046875 | data | 1.95829602517 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0x15060 | 0x768 | data | English | United States |
DLL | Import |
---|---|
MSVCRT.dll | _iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp |
KERNEL32.dll | PeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree |
ADVAPI32.dll | FreeSid, AllocateAndInitializeSid |
WSOCK32.dll | getsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError |
WS2_32.dll | WSARecv, WSASend |
Description | Data |
---|---|
LegalCopyright | Copyright 2009 The Apache Software Foundation. |
InternalName | ab.exe |
FileVersion | 2.2.14 |
CompanyName | Apache Software Foundation |
Comments | Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License athttp://www.apache.org/licenses/LICENSE-2.0Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. |
ProductName | Apache HTTP Server |
ProductVersion | 2.2.14 |
FileDescription | ApacheBench command line utility |
OriginalFilename | ab.exe |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 1 |
Start time: | 12:56:49 |
Start date: | 16/02/2022 |
Path: | C:\Users\user\Desktop\template.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73802 bytes |
MD5 hash: | 7B478A52E723DE424790F4C0B0658C11 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 0.7% |
Dynamic/Decrypted Code Coverage: | 17.5% |
Signature Coverage: | 15% |
Total number of Nodes: | 40 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |