Edit tour

Windows Analysis Report
winatp-intro-backdoor.exe

Overview

General Information

Sample Name:winatp-intro-backdoor.exe
Analysis ID:575603
MD5:fed6550f6e51492ac5d0fb0050e744e4
SHA1:5e1c8874b29de480a0513516fb542cad2b049cc3
SHA256:929cf5c2a2ce25d82699fc1bfe578bbe8abedce0e477a40980016ee32c2c7cbe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Obfuscated command line found
Uses cmd line tools excessively to alter registry or file data
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Reg Add RUN Key
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Direct Autorun Keys Modification
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is start
  • winatp-intro-backdoor.exe (PID: 7740 cmdline: "C:\Users\user\Desktop\winatp-intro-backdoor.exe" MD5: FED6550F6E51492AC5D0FB0050E744E4)
    • conhost.exe (PID: 3640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
    • cmd.exe (PID: 384 cmdline: "C:\Windows\System32\cmd.exe" /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj MD5: 9D59442313565C2E0860B88BF32B2277)
      • conhost.exe (PID: 6024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
      • reg.exe (PID: 7412 cmdline: REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj MD5: 05CF3CE225B05B669E3118092F4C8EAB)
    • cmd.exe (PID: 1964 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe MD5: 9D59442313565C2E0860B88BF32B2277)
      • conhost.exe (PID: 3120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
      • reg.exe (PID: 6940 cmdline: REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe MD5: 05CF3CE225B05B669E3118092F4C8EAB)
  • cleanup
No configs have been found
No yara matches

There are no malicious signatures, click here to show all signatures.

Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %userprofile%\desktop\WinATP-Intro-Backdoor.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 6940, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\Troj
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe, CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\winatp-intro-backdoor.exe" , ParentImage: C:\Users\user\Desktop\winatp-intro-backdoor.exe, ParentProcessId: 7740, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe, ProcessId: 1964
Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe, CommandLine: REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe, CommandLine|base64offset|contains: DA, Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 1964, ProcessCommandLine: REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe, ProcessId: 6940
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: %userprofile%\desktop\WinATP-Intro-Backdoor.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 6940, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\Troj

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: winatp-intro-backdoor.exeAvira: detected
Source: winatp-intro-backdoor.exeVirustotal: Detection: 58%Perma Link
Source: winatp-intro-backdoor.exeMetadefender: Detection: 15%Perma Link
Source: winatp-intro-backdoor.exeReversingLabs: Detection: 62%
Source: 0.0.winatp-intro-backdoor.exe.1a642b80000.0.unpackAvira: Label: TR/Agent.kkjis
Source: 0.2.winatp-intro-backdoor.exe.1a642b80000.0.unpackAvira: Label: TR/Agent.kkjis
Source: winatp-intro-backdoor.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Binary string: C:\dev\Repos\DIY\WinATPIntroBackdoorRS4\obj\Debug\Troj.pdb source: winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exeStatic PE information: No import functions for PE file found
Source: winatp-intro-backdoor.exeBinary or memory string: OriginalFilename vs winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exe, 00000000.00000002.2659643964.000001A642D7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exe, 00000000.00000002.2661461067.000001A6448A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsSense.exe.muij% vs winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exe, 00000000.00000002.2661461067.000001A6448A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exe, 00000000.00000002.2661461067.000001A6448A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ,\\StringFileInfo\\040904B0\\OriginalFilename vs winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exe, 00000000.00000000.1634626306.000001A642B82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTroj.exe4 vs winatp-intro-backdoor.exe
Source: winatp-intro-backdoor.exeBinary or memory string: OriginalFilenameTroj.exe4 vs winatp-intro-backdoor.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: winatp-intro-backdoor.exeVirustotal: Detection: 58%
Source: winatp-intro-backdoor.exeMetadefender: Detection: 15%
Source: winatp-intro-backdoor.exeReversingLabs: Detection: 62%
Source: winatp-intro-backdoor.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ec23d1294499b4ffba61f212cb1217cd\mscorlib.ni.dll
Source: unknownProcess created: C:\Users\user\Desktop\winatp-intro-backdoor.exe "C:\Users\user\Desktop\winatp-intro-backdoor.exe"
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6024:120:WilError_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3640:120:WilError_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6024:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3120:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3640:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3120:120:WilError_02
Source: winatp-intro-backdoor.exeString found in binary or memory: $688f5b1e-caa6-4abe-adde-a45c44aa7bf0
Source: winatp-intro-backdoor.exeString found in binary or memory: $688f5b1e-caa6-4abe-adde-a45c44aa7bf0
Source: classification engineClassification label: mal64.winEXE@12/1@0/0
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: winatp-intro-backdoor.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: winatp-intro-backdoor.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: winatp-intro-backdoor.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: winatp-intro-backdoor.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\dev\Repos\DIY\WinATPIntroBackdoorRS4\obj\Debug\Troj.pdb source: winatp-intro-backdoor.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeCode function: 0_2_00007FFCE6761D9D push ebx; ret
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeCode function: 0_2_00007FFCE6761CDD pushad ; iretd

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce TrojJump to behavior
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce TrojJump to behavior
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce TrojJump to behavior
Source: C:\Windows\System32\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce TrojJump to behavior
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe
Source: C:\Users\user\Desktop\winatp-intro-backdoor.exeQueries volume information: C:\Users\user\Desktop\winatp-intro-backdoor.exe VolumeInformation
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts22
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
11
Process Injection
1
Modify Registry
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Obfuscated Files or Information
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 575603 Sample: winatp-intro-backdoor.exe Startdate: 21/02/2022 Architecture: WINDOWS Score: 64 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 7 winatp-intro-backdoor.exe 2 2->7         started        process3 signatures4 29 Obfuscated command line found 7->29 10 cmd.exe 1 7->10         started        13 cmd.exe 1 7->13         started        15 conhost.exe 7->15         started        process5 signatures6 31 Uses cmd line tools excessively to alter registry or file data 10->31 17 conhost.exe 10->17         started        19 reg.exe 1 10->19         started        21 conhost.exe 13->21         started        23 reg.exe 1 1 13->23         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
winatp-intro-backdoor.exe58%VirustotalBrowse
winatp-intro-backdoor.exe16%MetadefenderBrowse
winatp-intro-backdoor.exe63%ReversingLabsByteCode-MSIL.Trojan.Ursu
winatp-intro-backdoor.exe100%AviraTR/Agent.kkjis
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.0.winatp-intro-backdoor.exe.1a642b80000.0.unpack100%AviraTR/Agent.kkjisDownload File
0.2.winatp-intro-backdoor.exe.1a642b80000.0.unpack100%AviraTR/Agent.kkjisDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:575603
Start date:21.02.2022
Start time:10:44:27
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 6s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:winatp-intro-backdoor.exe
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.winEXE@12/1@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 2.6% (good quality ratio 1.3%)
  • Quality average: 50%
  • Quality standard deviation: 50%
HCA Information:
  • Successful, ratio: 94%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, nexusrules.officeapps.live.com, arc.msn.com
  • Execution Graph export aborted for target winatp-intro-backdoor.exe, PID 7740 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\winatp-intro-backdoor.exe
File Type:ASCII text, with CRLF, LF line terminators
Category:dropped
Size (bytes):54
Entropy (8bit):4.112831308403153
Encrypted:false
SSDEEP:3:YlOsGUw2/A6PEHW:YUUwuA6M2
MD5:C540DF743DAC65AA096E87CEE8C58DD2
SHA1:13463F6E4027530A39C12DE7EA377B421E55BF38
SHA-256:B6C2963D17F8A870C0C2615A2734EF6A8EA1ACC4A989C123CE8F5E18C4330206
SHA-512:5D7A8362299DC575E6EF503F51D334D4BB507E521FBF7B96351B10424DE4DDB0F6C60E485B35DB64ECFEB597660142C9B9D279485C27A603E434E777BE3A9BBB
Malicious:false
Reputation:low
Preview:Attack scenario completed .Press any key to close.....
File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
Entropy (8bit):4.639781655267923
TrID:
  • Win64 Executable Console Net Framework (206006/5) 48.58%
  • Win64 Executable Console (202006/5) 47.64%
  • Win64 Executable (generic) (12005/4) 2.83%
  • Generic Win/DOS Executable (2004/3) 0.47%
  • DOS Executable Generic (2002/1) 0.47%
File name:winatp-intro-backdoor.exe
File size:7168
MD5:fed6550f6e51492ac5d0fb0050e744e4
SHA1:5e1c8874b29de480a0513516fb542cad2b049cc3
SHA256:929cf5c2a2ce25d82699fc1bfe578bbe8abedce0e477a40980016ee32c2c7cbe
SHA512:e488ca7017e8bd3c4f94c6f2fe376d0c31c8347401cd6361605f1670358ed0f8daf2e4de1c7fb2de84f6b5d63b5af676a5aca26cdf883712a5e24feb1d7dd255
SSDEEP:96:TvL6oH3cs/1M4xLjzkV3JKi6QN+Tf8jJaGLyo3sqJnAhKJqc7zNt:TTH3cEdHwf6QNYeauzAhKrd
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...?..Z.........."...0.................. .....@..... .......................`............`...@......@............... .....
Icon Hash:00828e8e8686b000
Entrypoint:0x140000000
Entrypoint Section:
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0x5A97EF3F [Thu Mar 1 12:17:03 2018 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x4cc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x32240x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x135c0x1400False0.5052734375data4.97394821079IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rsrc0x40000x4cc0x600False0.374348958333data3.70353186302IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_VERSION0x40900x23cdata
RT_MANIFEST0x42dc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
DescriptionData
Translation0x0000 0x04b0
LegalCopyright
Assembly Version1.0.0.0
InternalNameTroj.exe
FileVersion1.0.0.0
ProductVersion1.0.0.0
FileDescription
OriginalFilenameTroj.exe
No network behavior found
Target ID:0
Start time:10:45:01
Start date:21/02/2022
Path:C:\Users\user\Desktop\winatp-intro-backdoor.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\winatp-intro-backdoor.exe"
Imagebase:0x1a642b80000
File size:7168 bytes
MD5 hash:FED6550F6E51492AC5D0FB0050E744E4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET
Reputation:low

Target ID:1
Start time:10:45:01
Start date:21/02/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6a8820000
File size:885760 bytes
MD5 hash:C5E9B1D1103EDCEA2E408E9497A5A88F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:5
Start time:10:45:05
Start date:21/02/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\cmd.exe" /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Imagebase:0x7ff70ecc0000
File size:280064 bytes
MD5 hash:9D59442313565C2E0860B88BF32B2277
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:6
Start time:10:45:05
Start date:21/02/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6a8820000
File size:885760 bytes
MD5 hash:C5E9B1D1103EDCEA2E408E9497A5A88F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:7
Start time:10:45:05
Start date:21/02/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d ^%userprofile^%\desktop\WinATP-Intro-Backdoor.exe
Imagebase:0x7ff70ecc0000
File size:280064 bytes
MD5 hash:9D59442313565C2E0860B88BF32B2277
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:8
Start time:10:45:05
Start date:21/02/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6a8820000
File size:885760 bytes
MD5 hash:C5E9B1D1103EDCEA2E408E9497A5A88F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:9
Start time:10:45:06
Start date:21/02/2022
Path:C:\Windows\System32\reg.exe
Wow64 process (32bit):false
Commandline:REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj
Imagebase:0x7ff614680000
File size:74240 bytes
MD5 hash:05CF3CE225B05B669E3118092F4C8EAB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:10
Start time:10:45:06
Start date:21/02/2022
Path:C:\Windows\System32\reg.exe
Wow64 process (32bit):false
Commandline:REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /f /v Troj /t REG_EXPAND_SZ /d %userprofile%\desktop\WinATP-Intro-Backdoor.exe
Imagebase:0x7ff614680000
File size:74240 bytes
MD5 hash:05CF3CE225B05B669E3118092F4C8EAB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

No disassembly