Edit tour

Windows Analysis Report
eicar txt file.txt

Overview

General Information

Sample Name:eicar txt file.txt
Analysis ID:706620
MD5:44d88612fea8a8f36de82e1278abb02f
SHA1:3395856ce81f2b7382dee72602f798b642f14140
SHA256:275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
EICAR test file detected
Machine Learning detection for sample
Queries the volume information (name, serial number etc) of a device
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • notepad.exe (PID: 2348 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\eicar txt file.txt MD5: BB9A06B8F2DD9D24C77F389D7B2B58D2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
eicar txt file.txtSUSP_Just_EICARJust an EICAR test file - this is boring but users asked for itFlorian Roth
  • 0x0:$s1: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: eicar txt file.txtAvira: detected
Source: eicar txt file.txtReversingLabs: Detection: 92%
Source: eicar txt file.txtVirustotal: Detection: 93%Perma Link
Source: eicar txt file.txtMetadefender: Detection: 82%Perma Link
Source: eicar txt file.txtJoe Sandbox ML: detected

System Summary

barindex
Source: eicar txt file.txtInitial sample: EICAR test sig
Source: eicar txt file.txt, type: SAMPLEMatched rule: SUSP_Just_EICAR date = 2019-03-24, author = Florian Roth, description = Just an EICAR test file - this is boring but users asked for it, score = 275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f, reference = http://2016.eicar.org/85-0-Download.html
Source: eicar txt file.txtReversingLabs: Detection: 92%
Source: eicar txt file.txtVirustotal: Detection: 93%
Source: eicar txt file.txtMetadefender: Detection: 82%
Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
Source: C:\Windows\System32\notepad.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: clean68.winTXT@1/0@0/0
Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\eicar txt file.txt VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
System Information Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 706620 Sample: eicar txt file.txt Startdate: 20/09/2022 Architecture: WINDOWS Score: 0 7 EICAR test file detected 2->7 9 Antivirus / Scanner detection for submitted sample 2->9 11 Multi AV Scanner detection for submitted file 2->11 13 Machine Learning detection for sample 2->13 5 notepad.exe 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
eicar txt file.txt92%ReversingLabsDOS.Malware.EICAR
eicar txt file.txt94%VirustotalBrowse
eicar txt file.txt82%MetadefenderBrowse
eicar txt file.txt100%AviraEicar-Test-Signature
eicar txt file.txt100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:706620
Start date and time:2022-09-20 22:30:44 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 3m 57s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:eicar txt file.txt
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean68.winTXT@1/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .txt
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:EICAR virus test files
Entropy (8bit):4.8723276870872425
TrID:
    File name:eicar txt file.txt
    File size:68
    MD5:44d88612fea8a8f36de82e1278abb02f
    SHA1:3395856ce81f2b7382dee72602f798b642f14140
    SHA256:275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
    SHA512:cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab
    SSDEEP:3:a+JraNvsgzsVqSwHq9:tJuOgzsko
    TLSH:41A022003B0EEE2BA20B00200032E8B00808020E2CE00A3820A020B8C83308803EC228
    File Content Preview:X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
    Icon Hash:74f4e4e4e4e4e4e4
    No network behavior found
    050100s020406080100

    Click to jump to process

    050100s0.0051015MB

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:22:31:35
    Start date:20/09/2022
    Path:C:\Windows\System32\notepad.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\eicar txt file.txt
    Imagebase:0x7ff7296f0000
    File size:245760 bytes
    MD5 hash:BB9A06B8F2DD9D24C77F389D7B2B58D2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly