Windows
Analysis Report
IaaSBcdrExtension.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
IaaSBcdrExtension.exe (PID: 6808 cmdline:
"C:\Users\ user\Deskt op\IaaSBcd rExtension .exe" MD5: 8BBB201B8958FAFEFF35AD70A859617D) conhost.exe (PID: 6816 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) WerFault.exe (PID: 6928 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 808 -s 756 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 619147 |
Start date and time: 02/05/202219:39:30 | 2022-05-02 19:39:30 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | IaaSBcdrExtension.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 26 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean3.winEXE@3/5@0/0 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, B ackgroundTransferHost.exe, Wer Fault.exe, backgroundTaskHost. exe, SgrmBroker.exe, conhost.e xe, svchost.exe, wuapihost.exe - Excluded IPs from analysis (wh
itelisted): 23.211.6.115, 20.4 2.65.92 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, store-images.s-microsoft.c om-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e 12564.dspb.akamaiedge.net, one dsblobprdeus17.eastus.cloudapp .azure.com, login.live.com, st ore-images.s-microsoft.com, bl obcollector.events.data.traffi cmanager.net, sls.update.micro soft.com, displaycatalog.mp.mi crosoft.com, img-prod-cms-rt-m icrosoft-com.akamaized.net, wa tson.telemetry.microsoft.com - Execution Graph export aborted
for target IaaSBcdrExtension. exe, PID 6808 because there ar e no executed function - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Time | Type | Description |
---|---|---|
19:40:39 | API Interceptor |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9006813274260909 |
Encrypted: | false |
SSDEEP: | 192:33/ootiGG4H1ZAZga12/u7sUS274lt5cg:footiGGg1ZAZgak/u7sUX4lt5c |
MD5: | 6DB066AB23378FF533CF9BFE465F1690 |
SHA1: | 8C15F15C2C1ADCAC2080520EA0930192A5F79180 |
SHA-256: | 355D19CDC737BFCF6C03B86D59B0357B0941FFD60F319D27DFAAD9013D1FFF8C |
SHA-512: | C483E40331851F7B709B2B9D14653009D29655A4A26EFA6F3512EF59C37918BEE1BB87F3368613AA33F28A182C357FCEE301E1B77AE4B956EF98F6758B2F660C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 246235 |
Entropy (8bit): | 3.3749892615451333 |
Encrypted: | false |
SSDEEP: | 3072:Fdxc7F0+iu6fgpTN8RGpPZkl9cwyy1Z/v5R9lbT4f:7x/KTgmPZOyyzJ |
MD5: | 3B18E20792B3DF1CAE78C0C7C1DE723F |
SHA1: | 5D248BE44F5D8862145E0F1672A5471018DFED92 |
SHA-256: | 76DF5DE9ED6151882E1AB8D1F9E7683BEC814C13BD40C816E1AC78698E10E744 |
SHA-512: | 0BC5F0ACB3CAA29AFCA699E4513573D3C0525482246BBBFAC7E774D410AEE9D91EAFC7D4CE9C63A5FD2BDB6D8921DE3CD2686A45FD8CF8F30325C8B375CAA968 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8560 |
Entropy (8bit): | 3.7010853079400268 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNirik6YWTxR9g9gmf74aS8bICpra89bklLf9sm:RrlsNiuk6YCxRIgmf74aS83kJfD |
MD5: | F7E1EF45625EB64185F90944B8426A32 |
SHA1: | C2DEC813BA37FB5E467A2C4DBF4280DBA493A67B |
SHA-256: | 72A1214A5021D7AC689D39AB7F5020FA94EE6A82DC35943BFB5FA5AE745B2959 |
SHA-512: | B6A8E3A384B4F12CFBD4D3226294EABE1A3187738C3521FD6181036E4E37E7CFC8EC1E0E03433C13B201417F71F241BE1E918C62F0D68D8EFE9A7460EC5B44FF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4744 |
Entropy (8bit): | 4.498422966857588 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsFJgtBI9RlWgc8sqYjZ/8fm8M4JN3NFN5TE/yq85f8VhpM0d:uITffnUgrsqYFkJZTODhpM0d |
MD5: | 47818D7D97220F6713DB45364E156EAA |
SHA1: | 0D9773CDBF2B66EB767CAF5A3D6DA0D7B2B4AD6C |
SHA-256: | 7F99E1571D13871530A000E5E205A988DEB0873A7C6EF99133010953127E4DE8 |
SHA-512: | 56867E2602808F4B863EF1F65A1F28F8A001319D916A23DE4A081CEFF0D0F893A19824B302817C8EE3E1BA318A79454898DA0357A7BE25398714041DC5AA470A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\IaaSBcdrExtension.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 318 |
Entropy (8bit): | 4.974220327498828 |
Encrypted: | false |
SSDEEP: | 6:WsTbZqbbUcfvfA0v/3/WJotP12MUAvvOeXBJpQWoJPn1aYnImKZe:2HfvfjX3/9t4MzrQ1vCBe |
MD5: | CAEAC16EC1A3E1ECE652ED808190D57E |
SHA1: | B5D7339C7714CBDFF9878CB87D8E7F57689ED676 |
SHA-256: | 228043EDC757723C8035A54D19803809F4FAF277ECCD99DE80542EDB69162888 |
SHA-512: | F68D29F4E851500413D0962837506B60559978B94EA152F567185E3FA7A960FC27349AEE051D41C123DEDF4E23E386F3FB4C3B02B00BB669A53DB34A3C4A7D62 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.858413190270637 |
TrID: |
|
File name: | IaaSBcdrExtension.exe |
File size: | 48424 |
MD5: | 8bbb201b8958fafeff35ad70a859617d |
SHA1: | 736cf89a8ff9fbf2d2794338a93acf0149a6748e |
SHA256: | eeb56fdeb4b9bfb4eda8b834abafb47e8eee5a7c19b76fa99635e8d026e355a6 |
SHA512: | 7ad6fe8550822c3e60d1c8b05b3add79f69e690a947d3a18a7f96138d1a8e715be8e61be5e66ab57fd38e686de61c5c291fcd4b1903b62a62292ffab5dede737 |
SSDEEP: | 768:I8+3lQeEk+po3M0TOkIUbV4Tk/MCw933SoB34HFIY4VjRg9FsHBrBm9c3a0UnQU:d+VQdNpo3M0TOkIUbv0933SoBoHFIY48 |
TLSH: | D023835057F80D14F2FF5F30A970E4114A36BED7A875CB1C1B92609D5AAAB80DBA07B3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......a.........."...0.................. .....@..... ....................................`...@......@............... ..... |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x140000000 |
Entrypoint Section: | |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Time Stamp: | 0x61DBC6D3 [Mon Jan 10 05:40:35 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v4.0.30319 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Signature Valid: | false |
Signature Issuer: | CN=AME CS CA 01, DC=AME, DC=GBL |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | A6566003503E70647D1587A8321917E7 |
Thumbprint SHA-1: | F4A0DC40A260A6E77A69F33CF9188B157EA1C683 |
Thumbprint SHA-256: | 18902A47E0C6A33BBE4048CC78EFDD44F83D79CBF1C6C4F14C4DCA49956DE30B |
Serial: | 360000017D2F60C578D6AB1C9400020000017D |
Instruction |
---|
dec ebp |
pop edx |
nop |
add byte ptr [ebx], al |
add byte ptr [eax], al |
add byte ptr [eax+eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x7e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x9600 | 0x2728 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa8e4 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x8aac | 0x8c00 | False | 0.384430803571 | data | 5.31327910021 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x7e8 | 0x800 | False | 0.4130859375 | data | 4.07710752747 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0xc090 | 0x558 | data | ||
RT_MANIFEST | 0xc5f8 | 0x1ea | XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
LegalCopyright | Microsoft Corporation. All rights reserved. |
Assembly Version | 3.0.0.0 |
InternalName | IaaSBcdrExtension.exe |
FileVersion | 3.0.57.0 |
CompanyName | Microsoft Corporation |
LegalTrademarks | Microsoft is a registered trademark of Microsoft Corporation |
Comments | Mgmt-RecoverySvcs-VMSnapshot develop (c4dd8a8) Microsoft Azure Backup Services is a BCDR solutions in Azure and On-Prem platforms |
ProductName | Microsoft Azure Backup |
ProductVersion | 3.0.57.0 |
FileDescription | IaaSBcdrExtension |
OriginalFilename | IaaSBcdrExtension.exe |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 19:40:31 |
Start date: | 02/05/2022 |
Path: | C:\Users\user\Desktop\IaaSBcdrExtension.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x26ca7aa0000 |
File size: | 48424 bytes |
MD5 hash: | 8BBB201B8958FAFEFF35AD70A859617D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 1 |
Start time: | 19:40:32 |
Start date: | 02/05/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c9170000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 3 |
Start time: | 19:40:35 |
Start date: | 02/05/2022 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6c7fd0000 |
File size: | 494488 bytes |
MD5 hash: | 2AFFE478D86272288BBEF5A00BBEF6A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | high |