Windows
Analysis Report
NodeDisplay.Container.exe
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64native
NodeDisplay.Container.exe (PID: 7408 cmdline:
"C:\Users\ user\Deskt op\NodeDis play.Conta iner.exe" MD5: 74744FC068F935608DFF34ECD0EB1F96) schtasks.exe (PID: 7340 cmdline:
/C /create /F /sc mi nute /mo 5 /tn "Node JSEnvironm entUpdateT ask" /tr " C:\Users\u ser\AppDat a\Roaming\ Microsoft\ AddIns\Nod eDisplay.C ontainer.e xe" MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) conhost.exe (PID: 4100 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) schtasks.exe (PID: 4312 cmdline:
/C /Query /XML /TN " NodeJSEnvi ronmentUpd ateTask" MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) conhost.exe (PID: 6940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) schtasks.exe (PID: 1356 cmdline:
/C /create /F /tn "N odeJSEnvir onmentUpda teTask" /X ML "C:\Use rs\user\Ap pData\Roam ing\Micros oft\AddIns \hC5zF4xW4 pD6iF6a.xm l" MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) conhost.exe (PID: 6812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) WerFault.exe (PID: 4004 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 408 -s 476 MD5: 40A149513D721F096DDF50C04DA2F01F)
NodeDisplay.Container.exe (PID: 5596 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Microsoft\ AddIns\Nod eDisplay.C ontainer.e xe MD5: 74744FC068F935608DFF34ECD0EB1F96)
- cleanup
{
"Crypto Addresses": [
"32h53ccRQW6Vyw4rqR22xmip34WcC6pnFL",
"19iQuuqoVQPAtRhzm4GvNuM3bj4Nm29ByX",
"MTVvkKYrzipuB5ga8XNLpY7qx6FpBR74rr",
"0xF22ffD5be6efc35390dfD044B7156CC56C5d41f8",
"D7kjwr9bTZCd4u8ws7KLvKsv71ai53vppJ",
"Xb2miQJ1JjBJA6CTh1GYfDnzduSfRacTVg",
"hC5zF4xW4pD6iF6a.xml",
"t1T8AFPn2G9oXE5ZPgAQSiipGwYyvgxavyX",
"NodeDisplay.Container.exe",
"bc1qnd4p4vh6zvq68s7m70dvuzejfq2rfmqdlzmmse",
"addr1qxfaxxg87zn7y08wj784235sjussh5d0tvnf553nfqf3c2yn6vvs0u98ug7wa9u024rfp9epp0g67kexnffrxjqnrs5qlq308g",
"NodeJSEnvironmentUpdateTask",
"ronin:f99068a66aE783dCe4f7a811b09fe1CF071E4414",
"XLZZIN45UKRRZIYERPIP3NLHZLRJB5MPBBK5NVDSCKCM6TY3CP4MJJYOWE",
"433JgHYcvGfb5zCFFbfH3zW3HB6nz5ah1J6zSW8p2Ac6AvXCHzWacQdZD2snEnijjZVbhUxsMxVxwPHwopCGXFHWGDo59vU",
"cosmos1ljx6qdfud54mhquec20nncrsp9zn0pmvlhjfuy",
"832XKsTJiDCUSNjtnjcWVvXNwYKgzCoXPTejxnMhKHhNhb55RMyBgBMJpqS9RX7ywoKoV5pmTRdvvCMb3XsY4o9KHy5GLGE",
"ltc1qf78tyv7ygtvnhlyak026956uhfh6wrpjgnuvsp",
"bnb1zh48nf24wpcarq8clwfmxg5uggwwa9cqtpz6xk",
"TM2FqmawKhRe82BJJfY1WaEwRx48JLrTG2",
"LUYBs28KD92zYYjG28gWq9GFvvsWE6KoeN",
"rHDfnp9vP5aV81QqehsZZAEeKrgZUs3KyH",
"AaK9Z1EG6sZLfeVM3SkqUXFuamkDvBRfMy",
"Ae2tdPwUPEZ4SGK88ZzwuAzcUsos6SBQA1rDpbMNZhJo2TezusztfvxkfU7",
"RUG3uyX1vvgV3uadKnBPbgatH391U5E3E7",
"AGVDbNVutgwiep6615bjTJnQkScwWuUEMuU95NredRG5"
]
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security |
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Stealing of Sensitive Information
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Malware Configuration Extractor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Dropped File: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior | ||
Source: | System information queried: | Jump to behavior | ||
Source: | System information queried: | Jump to behavior | ||
Source: | System information queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Process information queried: | Jump to behavior |
Source: | System information queried: | Jump to behavior |
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior |
Source: | System information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 11 Process Injection | 1 Masquerading | 1 Credential API Hooking | 431 Security Software Discovery | Remote Services | 1 Credential API Hooking | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 22 Virtualization/Sandbox Evasion | LSASS Memory | 22 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 DLL Side-Loading | 11 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 DLL Side-Loading | NTDS | 2 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
78% | Virustotal | Browse | ||
29% | Metadefender | Browse | ||
92% | ReversingLabs | Win32.Trojan.Tasker | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
78% | Virustotal | Browse | ||
29% | Metadefender | Browse | ||
92% | ReversingLabs | Win32.Trojan.Tasker |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Joe Sandbox Version: | 35.0.0 Citrine |
Analysis ID: | 656320 |
Start date and time: 04/07/202205:04:01 | 2022-07-04 05:04:01 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | NodeDisplay.Container.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Number of analysed new started processes analysed: | 22 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal96.spyw.evad.winEXE@12/8@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, Ba ckgroundTransferHost.exe, WerF ault.exe, backgroundTaskHost.e xe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 104.208.16.94 - Excluded domains from analysis
(whitelisted): ris.api.iris.m icrosoft.com, wdcpalt.microsof t.com, blobcollector.events.da ta.trafficmanager.net, ctldl.w indowsupdate.com, umwatson.eve nts.data.microsoft.com, wdcp.m icrosoft.com, img-prod-cms-rt- microsoft-com.akamaized.net, a rc.msn.com, onedsblobprdcus16. centralus.cloudapp.azure.com - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
05:05:57 | Task Scheduler | |
05:06:03 | API Interceptor |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.797146872166699 |
Encrypted: | false |
SSDEEP: | 96:O3PsUyOSiASs8vtk1exfAvXIxcQPc6pcE6cw3UVwR+HbHg/rZHLnxZOycEmzyPn2:EPPyPS2mBtQejPeDu760fAIO8P |
MD5: | C93A5A7B156A80E9E96BA821D1C7BAD0 |
SHA1: | DE86FB01F8FEA91422AB8577AFA8B69F585B3CD3 |
SHA-256: | 1B4972B15AF70A21B98261C99CCCAE9C657FB1149E277DDC2639816930D18A3D |
SHA-512: | D4A3EA1ACDD4A676A38D2E445F426DCB52368D81C944687C98701E6691FB7D8403F2810104A7E23FE3BBC8948BAD451255B7688A862C0BA6D5FAF7B1145BFEF2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26334 |
Entropy (8bit): | 2.6064670297733215 |
Encrypted: | false |
SSDEEP: | 96:57Q8QS6Eb/dyzBKL3ugVTgGKKi7HmCEbVLj5XWudJm2++XCpTWFWI9bI84I88u3s:NTRdjL+4OreLjzUP+X0Iu3Mwr19 |
MD5: | EABB0CE5832AA93B34A4EC3025502C2C |
SHA1: | ADF08053992D8E26DE74204A65624FC079D0204D |
SHA-256: | 09B02E1004DC620318C4861B6844673D94B252F0A813C018464C23A076393740 |
SHA-512: | D28F5F4BCBB0AB845C8DBA69E4DB5B7C9FA5106679E5B353CA048C0A276C2FC6D127117B3D49BC4DACE6FF805C4F78C861E6424F2C0B47C818F8FB1E60DED549 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8344 |
Entropy (8bit): | 3.694553023362478 |
Encrypted: | false |
SSDEEP: | 192:R9l7lZNiBn6R6YdQrSULgmfXzEw4prk89b7Dsf03pm:R9lnNih6R6YerSULgmfXzER7ofd |
MD5: | 48BECA8EBE7032D36E96C7090EA44017 |
SHA1: | B84B9A811BC50CA340FAB8EA05E9D90FCC18C534 |
SHA-256: | 5B8106E39C917716F6030BA40F17F63323358AAA01CE141C7F227D7FA8BB66C1 |
SHA-512: | DB2957CDB7C2445DEA04D290BB80849CF0BFC9D1B041E058DA207942713341BAC05E8EF8B9FA9D605E456FDC8E1A1026114E2018413B2D44DA6DD4961FB055FB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4857 |
Entropy (8bit): | 4.504987404510825 |
Encrypted: | false |
SSDEEP: | 48:cvIwwtl8zs7e702I7VFJ5WS2CfjkTs3rm8M4J76GBcuFlEFvP+q8dKuSOl+BE23I:uILfy7GySPfLJMuFlOduPl+BEUN0td |
MD5: | 5083EF9A6101B2E033E34320C87C031C |
SHA1: | 7BACF05BC7E2893629A31AE1920CFD167BB0F933 |
SHA-256: | DBF1C1DF3356572C617BAD3DE284818C2393F7DAEAACCA7CD71E7A556AA5DEA5 |
SHA-512: | F5A6DCD1D83B3689DA9B78B94E58BF92881FD1F2C589C73204B6C6002A24F9B6C29A990646A25416FAB6EF9115D136208FAA40527D1E503D139BDBB0312D1B4B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\NodeDisplay.Container.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7276032 |
Entropy (8bit): | 7.957813314312425 |
Encrypted: | false |
SSDEEP: | 196608:VdOmLBBXPbbwnyP0kRINUXFQnHhyMN8S:VPV5bbcyck5QnBy |
MD5: | 74744FC068F935608DFF34ECD0EB1F96 |
SHA1: | 5E629DD17A206424302B9794F981D3E1B3B25695 |
SHA-256: | 8A9D3071E53165637980D076F325C66630A2189B8ADCFF78CABE17B41D7D87B3 |
SHA-512: | C750062B6E9FE2C0FBA5391B38553EDD7CFAC145A6ED2CD0A4EC7CD195B64F3FA1049154247D35494515781031BA7AC64BBAC4526EEDFE2CD7EF73AF16D09B42 |
Malicious: | true |
Antivirus: | |
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\Desktop\NodeDisplay.Container.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
Process: | C:\Users\user\Desktop\NodeDisplay.Container.exe |
File Type: | |
Category: | modified |
Size (bytes): | 1330 |
Entropy (8bit): | 5.21213966156796 |
Encrypted: | false |
SSDEEP: | 24:2dcd4+Sc9q944XPKtMhEMO5pwHYeGaDt0fORYv0qv9UuaWln:cmt9q9VK6dOQHuaD3uaE |
MD5: | 6341E1999ABABC6CF81D2AE8F1C3E096 |
SHA1: | 667998B3CFE4B5C9C37E67E376C613EDEB800414 |
SHA-256: | 7D5C4E30D2DCD6414003DB1821BF24353B78F0EB00FF5A606C7BB971457F9573 |
SHA-512: | 0DDE0AF6630487D56A34782DB8DFD564C93713105F4B8EFF429E48B135DEEA2B202E31267F362C6A105257F9B2ABB73565ABF3BB3B2A93CBA96E5ABF66768F80 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2097152 |
Entropy (8bit): | 4.510814273738912 |
Encrypted: | false |
SSDEEP: | 12288:lyMMY6/amIa6rBC4iTd+vXlnDhSEt+d5X+rEhFRNcylKOZdyKhUag6VSzX:lDa6rBC4iTd+vXlnD0vlyKhUag6VSzX |
MD5: | 7B43E57781380C8269104780373E2D4F |
SHA1: | 08406983386FD828F6E00D27CB835B0902076D01 |
SHA-256: | 208D32573B6FA9D417522CE9452094071488AEE1D2C06A3DB03DEBFD9D1C10E6 |
SHA-512: | 003D3362D6BCB2A9B159D8296C2757C5175EAA2A03610874E78CFC7ED57F37089CF1959723099CA519E7B9DE25FF29DD7EC8EFE2F4CBB53007D60145A431F643 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.957813314312425 |
TrID: |
|
File name: | NodeDisplay.Container.exe |
File size: | 7276032 |
MD5: | 74744fc068f935608dff34ecd0eb1f96 |
SHA1: | 5e629dd17a206424302b9794f981d3e1b3b25695 |
SHA256: | 8a9d3071e53165637980d076f325c66630a2189b8adcff78cabe17b41d7d87b3 |
SHA512: | c750062b6e9fe2c0fba5391b38553edd7cfac145a6ed2cd0a4ec7cd195b64f3fa1049154247d35494515781031ba7ac64bbac4526eedfe2cd7ef73af16d09b42 |
SSDEEP: | 196608:VdOmLBBXPbbwnyP0kRINUXFQnHhyMN8S:VPV5bbcyck5QnBy |
TLSH: | 8C76237317510154E4E7D83CA013BDE673F613238E8398B994E2FAD5BA369E0EA56C43 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b.....................B...............0....@..................................qo...@..........................2..O.. |
Icon Hash: | 70fcbaf8f8f2f030 |
Entrypoint: | 0xdb2ed2 |
Entrypoint Section: | .dHc |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x62ACAB14 [Fri Jun 17 16:25:56 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | d812527b5988192695ea156eae610de1 |
Instruction |
---|
push ecx |
pushfd |
mov ecx, 5053650Fh |
xor cx, cx |
push esi |
push ecx |
jbe 00007FDAD072A30Ch |
dec edx |
xor edx, 75E90A87h |
jmp 00007FDAD0C9F840h |
not ecx |
inc ecx |
jmp 00007FDAD06FD1AAh |
dec eax |
mov edi, dword ptr [edi] |
dec ecx |
sub esp, 00000004h |
inc cx |
bts edi, ecx |
inc ecx |
inc bh |
inc ebp |
mov edi, dword ptr [esp] |
inc ebp |
xor edi, eax |
jmp 00007FDAD0C9D340h |
jne 00007FDAD0B85B37h |
pop esi |
btr cx, 0019h |
movzx ecx, cx |
not eax |
mov ecx, edx |
xchg ecx, ecx |
mov dword ptr [edi], eax |
btc cx, 0048h |
shrd ecx, edx, 0000009Ah |
test bx, 464Fh |
mov ecx, dword ptr [ebp+00h] |
test edx, esi |
cmp cl, dh |
test bh, 00000061h |
add ebp, 00000004h |
xor ecx, ebx |
cmp edi, eax |
test ebp, 75144721h |
stc |
bswap ecx |
neg ecx |
jmp 00007FDAD0C224A2h |
push esi |
mov ecx, dword ptr [esp+14h] |
mov dword ptr [esp+14h], AFFE2CFBh |
mov esi, dword ptr [esp+04h] |
jl 00007FDAD0AED5A6h |
jng 00007FDAD0C2E61Bh |
mov byte ptr [esp+08h], FFFFFFBFh |
add dword ptr [esp+0Ch], esi |
call 00007FDAD0B857ADh |
or eax, 7FE171F3h |
sub ebx, FFFFFFD7h |
xchg eax, ebp |
jmp far 0067h : 1E8E836Bh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x9a32c4 | 0xc4f | .dHc |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8eab54 | 0x78 | .dHc |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xa9c000 | 0x228b5 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa9b000 | 0x5d0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3cd000 | 0x40 | .4U} |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1b1f | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x3000 | 0x1108 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x5000 | 0x64 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.>J2 | 0x6000 | 0x3c6f1c | 0x0 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.4U} | 0x3cd000 | 0x398 | 0x400 | False | 0.0625 | data | 0.36214201566229515 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.dHc | 0x3ce000 | 0x6ccd70 | 0x6cce00 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0xa9b000 | 0x5d0 | 0x600 | False | 0.5299479166666666 | GLS_BINARY_LSB_FIRST | 4.3086189026501405 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xa9c000 | 0x228b5 | 0x22a00 | False | 0.43735898014440433 | data | 6.15996091069098 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0xa9c220 | 0x468 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0xa9c688 | 0x10a8 | dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0 | English | United States |
RT_ICON | 0xa9d730 | 0x25a8 | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0 | English | United States |
RT_ICON | 0xa9fcd8 | 0x4228 | dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0 | English | United States |
RT_ICON | 0xaa3f00 | 0x10828 | dBase III DBT, version number 0, next free block index 40 | English | United States |
RT_ICON | 0xab4728 | 0x9cca | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States |
RT_GROUP_ICON | 0xabe3f4 | 0x5a | data | English | United States |
RT_VERSION | 0xabe450 | 0x2e8 | data | English | United States |
RT_MANIFEST | 0xabe738 | 0x17d | XML 1.0 document text | English | United States |
DLL | Import |
---|---|
KERNEL32.dll | LoadLibraryW |
SHELL32.dll | SHGetFolderPathW |
KERNEL32.dll | GetSystemTimeAsFileTime |
USER32.dll | CharUpperBuffW |
KERNEL32.dll | LocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 05:05:54 |
Start date: | 04/07/2022 |
Path: | C:\Users\user\Desktop\NodeDisplay.Container.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4f0000 |
File size: | 7276032 bytes |
MD5 hash: | 74744FC068F935608DFF34ECD0EB1F96 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Target ID: | 2 |
Start time: | 05:05:56 |
Start date: | 04/07/2022 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 187904 bytes |
MD5 hash: | 478BEAEC1C3A9417272BC8964ADD1CEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 3 |
Start time: | 05:05:56 |
Start date: | 04/07/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b5f20000 |
File size: | 875008 bytes |
MD5 hash: | 81CA40085FC75BABD2C91D18AA9FFA68 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 4 |
Start time: | 05:05:56 |
Start date: | 04/07/2022 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 187904 bytes |
MD5 hash: | 478BEAEC1C3A9417272BC8964ADD1CEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 5 |
Start time: | 05:05:56 |
Start date: | 04/07/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b5f20000 |
File size: | 875008 bytes |
MD5 hash: | 81CA40085FC75BABD2C91D18AA9FFA68 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 6 |
Start time: | 05:05:57 |
Start date: | 04/07/2022 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\AddIns\NodeDisplay.Container.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4e0000 |
File size: | 7276032 bytes |
MD5 hash: | 74744FC068F935608DFF34ECD0EB1F96 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Antivirus matches: | |
Reputation: | low |
Target ID: | 7 |
Start time: | 05:05:57 |
Start date: | 04/07/2022 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 187904 bytes |
MD5 hash: | 478BEAEC1C3A9417272BC8964ADD1CEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 8 |
Start time: | 05:05:57 |
Start date: | 04/07/2022 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b5f20000 |
File size: | 875008 bytes |
MD5 hash: | 81CA40085FC75BABD2C91D18AA9FFA68 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 12 |
Start time: | 05:06:01 |
Start date: | 04/07/2022 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xaf0000 |
File size: | 482640 bytes |
MD5 hash: | 40A149513D721F096DDF50C04DA2F01F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |