Edit tour

Windows Analysis Report
squirrel.exe

Overview

General Information

Sample Name:squirrel.exe
Analysis ID:799988
MD5:407cf58bf93ea428c6444813119740a2
SHA1:86cda5e68c7f5e6d3ddbe7ed76765e258b04290d
SHA256:2b42847d184c2542e95a90da7f9c8baa212e0e2d729cc66af140b8a2750dfa6f
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains long sleeps (>= 3 min)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • squirrel.exe (PID: 5912 cmdline: C:\Users\user\Desktop\squirrel.exe MD5: 407CF58BF93EA428C6444813119740A2)
    • conhost.exe (PID: 6012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: squirrel.exeStatic PE information: certificate valid
Source: squirrel.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: squirrel.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: squirrel.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: squirrel.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: squirrel.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: squirrel.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: squirrel.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: squirrel.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: squirrel.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: squirrel.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: squirrel.exeString found in binary or memory: http://ocsp.digicert.com0
Source: squirrel.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: squirrel.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: squirrel.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: squirrel.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: squirrel.exeString found in binary or memory: https://api.github.com/
Source: squirrel.exeString found in binary or memory: https://api.github.com/#
Source: squirrel.exeString found in binary or memory: https://github.com/myuser/myrepo
Source: squirrel.exeStatic PE information: No import functions for PE file found
Source: squirrel.exeBinary or memory string: originalFileName vs squirrel.exe
Source: squirrel.exe, 00000000.00000002.257857415.0000000000A92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: originalFileName vs squirrel.exe
Source: squirrel.exe, 00000000.00000002.258117422.0000000000C52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUpdate.exe. vs squirrel.exe
Source: squirrel.exe, 00000000.00000002.258151069.00000000010FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs squirrel.exe
Source: squirrel.exeBinary or memory string: originalFileName vs squirrel.exe
Source: squirrel.exeBinary or memory string: OriginalFilenameUpdate.exe. vs squirrel.exe
Source: C:\Users\user\Desktop\squirrel.exeCode function: 0_2_00007FFBAD4306600_2_00007FFBAD430660
Source: C:\Users\user\Desktop\squirrel.exeCode function: 0_2_00007FFBAD4305870_2_00007FFBAD430587
Source: squirrel.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\squirrel.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: squirrel.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\squirrel.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\squirrel.exe C:\Users\user\Desktop\squirrel.exe
Source: C:\Users\user\Desktop\squirrel.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6012:120:WilError_01
Source: C:\Users\user\Desktop\squirrel.exeFile created: C:\Users\user\Desktop\Squirrel-Unset.logJump to behavior
Source: squirrel.exeString found in binary or memory: Z) # Lookahead for non-space at line-start, or end of doc
Source: squirrel.exeString found in binary or memory: squirrel-install
Source: squirrel.exeString found in binary or memory: --squirrel-install
Source: squirrel.exeString found in binary or memory: Update.exe not found, not a Squirrel-installed app?
Source: squirrel.exeString found in binary or memory: Failed to invoke post-install
Source: squirrel.exeString found in binary or memory: --squirrel-install {0}
Source: squirrel.exeString found in binary or memory: a=|process-start-args=
Source: squirrel.exeString found in binary or memory: b=|baseUrl={Provides a base URL to prefix the RELEASES file packages with-a=|process-start-args=iArguments that will be used when starting executable-l=|shortcut-locations=
Source: squirrel.exeString found in binary or memory: ((?=^[ ]{{0,{0}}}[^ \t\n])|\Z) # Lookahead for non-space at line-start, or end of doc
Source: squirrel.exeString found in binary or memory: onError%Downloading file: 1Failed downloading URL: #Downloading url: 1Failed to download url: !squirrel-install3Starting automatic update7Failed to check for updates5Failed to download updates/Failed to apply updates9Failed to set up uninstaller){0} {1}{2} {3} # {4}
Source: squirrel.exeString found in binary or memory: Scanning {0}mIgnoring {0} as the target framework is not compatible%Writing {0} to {1}UCouldn't find file for package in {1}: {0}%--squirrel-install%--squirrel-updated'--squirrel-obsolete)--squirrel-uninstall'--squirrel-firstrunAFailed to handle Squirrel events[\StringFileInfo\040904B0\SquirrelAwareVersion)SquirrelAwareVersion;Failed to promote Tray icon:
Source: squirrel.exeString found in binary or memory: ..\Update.exegUpdate.exe not found, not a Squirrel-installed app?
Source: squirrel.exeString found in binary or memory: update.MNo release to install, running the appIFailed to install package to app dirIFailed to update local releases file;Failed to invoke post-install;Starting fixPinnedExecutables)Fixing up tray icons
Source: squirrel.exeString found in binary or memory: -delta.nupkg$iCannot apply combinations of delta and full packagesQCouldn't run Squirrel hook, continuing: ---squirrel-updated {0}---squirrel-install {0}9Squirrel Enabled Apps: [{0}]wNo apps are marked as Squirrel-aware! Going to run them all-Failed to delete key: /--squirrel-obsolete {0}7Couldn't delete directory: QCoudln't run Squirrel hook, continuing: WcleanDeadVersions: checking for version {0}kcleanDeadVersions: exclude current version folder {0}ccleanDeadVersions: exclude new version folder {0}#"{0}" --uninstall
Source: classification engineClassification label: clean3.winEXE@2/3@0/0
Source: squirrel.exe, SharpCompress/Common/Zip/WinzipAesCryptoStream.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
Source: squirrel.exe, SharpCompress/Compressors/LZMA/AesDecoderStream.csCryptographic APIs: 'CreateDecryptor'
Source: squirrel.exe, SharpCompress/Compressors/LZMA/AesDecoderStream.csCryptographic APIs: 'TransformBlock'
Source: squirrel.exe, SharpCompress/Compressors/LZMA/AesDecoderStream.csCryptographic APIs: 'TransformBlock'
Source: squirrel.exe, Squirrel/Utility.csTask registration methods: 'CreateZipFromDirectory'
Source: squirrel.exe, Squirrel/UpdateManager.csTask registration methods: 'CreateUninstallerRegistryEntry'
Source: squirrel.exe, Squirrel/Update/Program.csTask registration methods: 'createSetupEmbeddedZip', 'createExecutableStubForExe', 'createMsiPackage'
Source: squirrel.exe, Squirrel/IUpdateManager.csTask registration methods: 'CreateUninstallerRegistryEntry'
Source: squirrel.exeStatic file information: File size 1870640 > 1048576
Source: squirrel.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: squirrel.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: squirrel.exeStatic PE information: certificate valid
Source: squirrel.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1be200
Source: squirrel.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\squirrel.exeCode function: 0_2_00007FFBAD4371AF push esp; iretd 0_2_00007FFBAD4371B0
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\squirrel.exe TID: 5972Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\squirrel.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\squirrel.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeQueries volume information: C:\Users\user\Desktop\squirrel.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\squirrel.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
1
Scheduled Task/Job
1
Process Injection
1
Masquerading
OS Credential Dumping21
Virtualization/Sandbox Evasion
Remote Services11
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Obfuscated Files or Information
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 799988 Sample: squirrel.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 3 5 squirrel.exe 4 2->5         started        process3 7 conhost.exe 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
squirrel.exe0%ReversingLabs
squirrel.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/myuser/myreposquirrel.exefalse
    high
    https://api.github.com/#squirrel.exefalse
      high
      https://api.github.com/squirrel.exefalse
        high
        No contacted IP infos
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:799988
        Start date and time:2023-02-07 02:27:18 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 4m 22s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:squirrel.exe
        Detection:CLEAN
        Classification:clean3.winEXE@2/3@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 3.2% (good quality ratio 3.2%)
        • Quality average: 77.6%
        • Quality standard deviation: 13.1%
        HCA Information:
        • Successful, ratio: 95%
        • Number of executed functions: 4
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Excluded domains from analysis (whitelisted): fs.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\squirrel.exe
        File Type:CSV text
        Category:modified
        Size (bytes):1265
        Entropy (8bit):5.3482778101486135
        Encrypted:false
        SSDEEP:24:ML9E4KrgKDE4KGKN08AKh7E4/wxQlEE48S6uE4zUAE4KvFc:MxHKEYHKGD8Ao7H/wxQlEH8cHz7HKK
        MD5:9368D03BA0999F4DBC877ED5F57D3AE9
        SHA1:6BD070A89464DEE1B3F90CF4C11BE8960238D4C5
        SHA-256:63F4634CBF8DD04A2DCDE8ADF07324F7FA33B8A49949BEBC96907C135EA11F60
        SHA-512:D02E216B26DF374D9ED5102A118CD6DFC84CBC71CDC66744C1DE88B0DE1081AFE3CD1EF1215A66F1176D0462763973424AB3E9A4524ED671D15E3C35CE3AD2FE
        Malicious:false
        Reputation:low
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\PresentationCore\83c7ede68d13b2882d9b382e05efed26\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\Presentatio5ae0f00f#\46a2c27668386512a2b68c0ab20c8ca2\PresentationFramework.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\Wi
        Process:C:\Users\user\Desktop\squirrel.exe
        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):67
        Entropy (8bit):4.707349452552437
        Encrypted:false
        SSDEEP:3:5nF9/cW3KfF/5QEBM2F2UZHsOBEREov:ZcCKfFSVUB4Bv
        MD5:73D6B5C041AD48BABA69D50BD6154206
        SHA1:93F80BE15E793E91B7871C7DCB2EC5AFB0488923
        SHA-256:775C8BCF12B871380BAF3FD33FCA6FCE26A32204170AAD89AADB7D8C5B3E7CC5
        SHA-512:B14EBD26A34E208FB3B87C19908AB4884F20C3C3288E1FF7606D3A43F56CF4C1D1ABD47D7756F42BC32BA06C71680AFA9DB0287F1824B1D7870976C15E3E6006
        Malicious:false
        Reputation:low
        Preview:.[07/02/23 02:29:09] info: Program: Starting Squirrel Updater: ..
        Process:C:\Users\user\Desktop\squirrel.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):2549
        Entropy (8bit):4.0792338041347564
        Encrypted:false
        SSDEEP:48:MPdT9BD+jBjatHqdMYvtHi2WxBk2GjKRW+XvcEwP1:M1pkjBjaGvQajfUcEwt
        MD5:9D268E08D7029210710B483F3D386161
        SHA1:485F034EF95A572FE2EEBDF06317B6168A29256A
        SHA-256:B0D94CB0F14A340406F485FCCBDD04B109A5B8EAFD310691EFE44833604B6B9D
        SHA-512:2A4CD6B7FA17EDDF075043765495769E7582AC7B1232841221AFF8794745999710AED108B63CB05A16EA3807C230664BE74A53E9D8AA7C69483426FD17A6A739
        Malicious:false
        Reputation:low
        Preview:Usage: Squirrel.exe command [OPTS]..Manages Squirrel packages....Commands.. --install=VALUE Install the app whose package is in the specified.. directory.. --uninstall Uninstall the app the same dir as Update.exe.. --download=VALUE Download the releases specified by the URL and.. write new results to stdout as JSON.. --checkForUpdate=VALUE Check for one available update and writes new.. results to stdout as JSON.. --update=VALUE Update the application to the latest remote.. version specified by URL.. --releasify=VALUE Update or generate a releases directory with a.. given NuGet package.. --createShortcut=VALUE Create a shortcut for the given executable name.. --removeShortcut=VALUE Remove a shortcut for the given executable name.. --updateSelf=VALUE Copy
        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.928080870228547
        TrID:
        • Win64 Executable GUI Net Framework (217006/5) 49.88%
        • Win64 Executable GUI (202006/5) 46.43%
        • Win64 Executable (generic) (12005/4) 2.76%
        • Generic Win/DOS Executable (2004/3) 0.46%
        • DOS Executable Generic (2002/1) 0.46%
        File name:squirrel.exe
        File size:1870640
        MD5:407cf58bf93ea428c6444813119740a2
        SHA1:86cda5e68c7f5e6d3ddbe7ed76765e258b04290d
        SHA256:2b42847d184c2542e95a90da7f9c8baa212e0e2d729cc66af140b8a2750dfa6f
        SHA512:e9f903f11851deceb19240a3f42740b35a3eebf7039b6550f9b99affacc2ef04993b2f109d442ad21e60ac9b13939e7d94bbc6303991b7bc5759de3aa6ad0a95
        SSDEEP:24576:rav+UvzLSrrg5P47tuwtOdoZoT60zOipX6LMGDI+HZ0VhtbvZzGnMKH27:pr7tnrnc5Vh1am
        TLSH:EF856A11A7D88E2BE56E26BAF431055963F2E9826373F78B2B48707D2BD37544D02363
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...8..c.........."...................... ....@...... ..............................b^....@................................
        Icon Hash:70cce6b2ba8ce470
        Entrypoint:0x400000
        Entrypoint Section:
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x630FB738 [Wed Aug 31 19:32:08 2022 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Signature Valid:true
        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 9/2/2021 5:00:00 PM 9/26/2023 4:59:59 PM
        Subject Chain
        • CN="Postman, Inc.", O="Postman, Inc.", L=San Francisco, S=California, C=US
        Version:3
        Thumbprint MD5:B5318363B6AB4E1770DABA8A8B81F07D
        Thumbprint SHA-1:3B19835AEBF81A3643A7DFCC18B29B5EBF7DF168
        Thumbprint SHA-256:D3CC79314E510DDE8463754F900F88C8F707D0EF6460D621863D35A0AB220468
        Serial:0FAD7ED2A113874E1194198F2553727F
        Instruction
        dec ebp
        pop edx
        nop
        add byte ptr [ebx], al
        add byte ptr [eax], al
        add byte ptr [eax+eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c20000x7e78.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x1c64000x2730.rsrc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x1be0280x1be200False0.3737303866629308data5.8827036722604085IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x1c20000x7e780x8000False0.58123779296875data6.160420939085719IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x1c21ec0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024
        RT_ICON0x1c26540x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
        RT_ICON0x1c36fc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
        RT_ICON0x1c5ca40x364bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
        RT_GROUP_ICON0x1c92f00x3edata
        RT_VERSION0x1c93300x33cdata
        RT_VERSION0x1c966c0x258dataEnglishUnited States
        RT_MANIFEST0x1c98c40x5b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        Report size exceeds maximum size, please checkout the PCAP download to see all network behavior
        051015s020406080100

        Click to jump to process

        051015s0.005101520MB

        Click to jump to process

        • File
        • Registry

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:02:29:06
        Start date:07/02/2023
        Path:C:\Users\user\Desktop\squirrel.exe
        Wow64 process (32bit):false
        Commandline:C:\Users\user\Desktop\squirrel.exe
        Imagebase:0xa90000
        File size:1870640 bytes
        MD5 hash:407CF58BF93EA428C6444813119740A2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:low

        Target ID:1
        Start time:02:29:09
        Start date:07/02/2023
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff745070000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Execution Graph

        Execution Coverage

        Dynamic/Packed Code Coverage

        Signature Coverage

        Execution Coverage:17.5%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:0%
        Total number of Nodes:6
        Total number of Limit Nodes:0
        Show Legend
        Hide Nodes/Edges
        execution_graph 5686 7ffbad436c89 5687 7ffbad436c9f AttachConsole 5686->5687 5689 7ffbad436d23 5687->5689 5682 7ffbad436d58 5683 7ffbad436d61 AllocConsole 5682->5683 5685 7ffbad436dfe 5683->5685

        Executed Functions

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 30 7ffbad430587-7ffbad430589 31 7ffbad43058b-7ffbad431f5d 30->31 32 7ffbad4305c7-7ffbad4305f1 30->32 36 7ffbad431f63-7ffbad431f95 31->36 37 7ffbad431ff7-7ffbad43201b 31->37 39 7ffbad43062f 32->39 40 7ffbad4305f3-7ffbad43060e 32->40 50 7ffbad431fef-7ffbad431ff6 36->50 51 7ffbad431f97-7ffbad431fa6 36->51 45 7ffbad43201d-7ffbad432052 37->45 46 7ffbad43207c-7ffbad432087 37->46 52 7ffbad432088-7ffbad43209d 45->52 46->52 54 7ffbad431fe9-7ffbad431fee 51->54 55 7ffbad431fa8-7ffbad431fcb 51->55 59 7ffbad43209f-7ffbad4320b1 52->59 60 7ffbad432054-7ffbad43207a 52->60 54->50 63 7ffbad431fcd 55->63 64 7ffbad431fd5-7ffbad431fe5 55->64 70 7ffbad4320b3 59->70 71 7ffbad4320b4-7ffbad4320c1 59->71 60->46 63->54 66 7ffbad431fcf-7ffbad431fd3 63->66 64->51 76 7ffbad431fe7 64->76 66->64 70->71 74 7ffbad4320c3 71->74 75 7ffbad4320c4-7ffbad43210b 71->75 74->75 80 7ffbad432111-7ffbad432199 call 7ffbad431a80 75->80 81 7ffbad43219a-7ffbad4321be 75->81 76->50 86 7ffbad43221f-7ffbad432232 81->86 87 7ffbad4321c0-7ffbad432219 81->87 92 7ffbad43226c-7ffbad4322b0 86->92 93 7ffbad432234-7ffbad43224b 86->93 87->86 106 7ffbad4322b2-7ffbad4322b3 92->106 107 7ffbad4322b4-7ffbad4322d3 92->107 93->92 96 7ffbad43224d-7ffbad43226b 93->96 106->107 109 7ffbad432386-7ffbad432388 107->109 110 7ffbad4322d9-7ffbad4322e1 107->110 111 7ffbad43239d-7ffbad4323a3 109->111 112 7ffbad43238a-7ffbad43239c 109->112 113 7ffbad432640-7ffbad432691 110->113 114 7ffbad4322e7-7ffbad4322f6 110->114 117 7ffbad4323b2-7ffbad4323b5 111->117 118 7ffbad4323a5-7ffbad4323ac 111->118 139 7ffbad432732-7ffbad432735 113->139 140 7ffbad432697-7ffbad43269a 113->140 115 7ffbad4322fc-7ffbad432319 114->115 116 7ffbad432494-7ffbad4324be 114->116 135 7ffbad43231b-7ffbad43233b 115->135 136 7ffbad432377-7ffbad432380 115->136 149 7ffbad43250d-7ffbad43252c 116->149 122 7ffbad4323bb-7ffbad4323c2 117->122 123 7ffbad432463-7ffbad432466 117->123 118->117 121 7ffbad4325cc-7ffbad43263f 118->121 121->113 129 7ffbad432410-7ffbad432414 122->129 130 7ffbad4323c4-7ffbad43240e 122->130 126 7ffbad43247e-7ffbad432493 123->126 127 7ffbad432468-7ffbad43247d 123->127 132 7ffbad43244f-7ffbad43245c 129->132 133 7ffbad432416-7ffbad432419 129->133 130->123 132->123 141 7ffbad43241b-7ffbad432420 133->141 142 7ffbad43242a-7ffbad432432 133->142 169 7ffbad43233d-7ffbad432340 135->169 170 7ffbad432357-7ffbad43235a 135->170 136->109 136->110 151 7ffbad43273b-7ffbad432747 139->151 152 7ffbad432856-7ffbad432861 139->152 147 7ffbad4326a0-7ffbad4326b0 140->147 148 7ffbad4328b5-7ffbad432aa1 140->148 141->142 142->113 150 7ffbad432438-7ffbad432440 142->150 154 7ffbad4326b2-7ffbad4326b6 147->154 155 7ffbad4326ba-7ffbad4326bd 147->155 149->121 150->132 158 7ffbad432442-7ffbad43244b 150->158 164 7ffbad4326c8-7ffbad4326cb 154->164 165 7ffbad4326b8 154->165 160 7ffbad4326c3-7ffbad4326c6 155->160 161 7ffbad432748-7ffbad43277d 155->161 158->126 168 7ffbad43244d 158->168 187 7ffbad43277f-7ffbad4327a8 161->187 171 7ffbad4326d1-7ffbad4326fb 164->171 172 7ffbad4327cf-7ffbad4327f1 164->172 174 7ffbad4326fd-7ffbad43272c 165->174 168->127 169->113 176 7ffbad432346-7ffbad432351 169->176 170->113 177 7ffbad432360-7ffbad432372 call 7ffbad430708 170->177 171->174 172->187 188 7ffbad4327f3 172->188 174->139 174->140 176->149 176->170 177->136 187->172 195 7ffbad4327f5-7ffbad43284f 188->195 196 7ffbad432854-7ffbad432855 188->196 195->152 196->152
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.258657160.00007FFBAD430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAD430000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffbad430000_squirrel.jbxd
        Similarity
        • API ID:
        • String ID: +<
        • API String ID: 0-1800757418
        • Opcode ID: 2a478724e4c1abd29141e235ae89f50d9f2eacdb378f7859438b1a7cea015084
        • Instruction ID: 2767fc6f251465cc24fbcbc0d59ecf8621aa27c7484fcd4abac4a06e85a7643a
        • Opcode Fuzzy Hash: 2a478724e4c1abd29141e235ae89f50d9f2eacdb378f7859438b1a7cea015084
        • Instruction Fuzzy Hash: 06828C72A0D65A4FEB5AE73CD4921F977D0FF89320B1401BAD58AC71A3ED286847C391
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 259 7ffbad430660-7ffbad437f91 261 7ffbad437f96-7ffbad437f9d 259->261 262 7ffbad437f9f-7ffbad437fb6 261->262 263 7ffbad437fb8-7ffbad437fbb 261->263 262->263 269 7ffbad437f93-7ffbad437f94 262->269 264 7ffbad437fbd-7ffbad437fcd 263->264 265 7ffbad437fce-7ffbad437fd1 263->265 266 7ffbad438272-7ffbad438285 265->266 267 7ffbad437fd7-7ffbad437fe3 265->267 274 7ffbad43828d-7ffbad4382ab 266->274 275 7ffbad438287-7ffbad43828b 266->275 270 7ffbad43801f-7ffbad438051 267->270 271 7ffbad437fe5-7ffbad438017 267->271 269->261 280 7ffbad438057-7ffbad438069 call 7ffbad430668 270->280 278 7ffbad43801d 271->278 279 7ffbad4382af-7ffbad4382b4 274->279 275->274 278->280 281 7ffbad4382b6-7ffbad4382b8 279->281 282 7ffbad4382d3-7ffbad4382db 279->282 287 7ffbad43811e-7ffbad438124 280->287 288 7ffbad43806f-7ffbad438094 280->288 284 7ffbad4382dc-7ffbad43831a 281->284 285 7ffbad4382ba-7ffbad4382d1 281->285 308 7ffbad43831c-7ffbad43831f 284->308 309 7ffbad43835a-7ffbad43835d 284->309 285->282 293 7ffbad4382ad 285->293 290 7ffbad43812f-7ffbad438132 287->290 291 7ffbad438126-7ffbad438129 287->291 288->266 299 7ffbad43809a-7ffbad4380a6 288->299 296 7ffbad43815f-7ffbad4381a1 call 7ffbad430678 290->296 297 7ffbad438134-7ffbad438159 290->297 291->290 295 7ffbad43825e-7ffbad438271 291->295 293->279 322 7ffbad4381a7-7ffbad4381ae 296->322 297->296 301 7ffbad4380b2-7ffbad4380b3 299->301 302 7ffbad4380a8-7ffbad4380b0 299->302 306 7ffbad4380ba-7ffbad4380e0 301->306 302->306 321 7ffbad4380e6-7ffbad4380e9 306->321 311 7ffbad43834d-7ffbad438355 308->311 312 7ffbad438321-7ffbad438348 308->312 313 7ffbad43839f-7ffbad4383e8 309->313 314 7ffbad43835f-7ffbad43839d 309->314 316 7ffbad4384ec-7ffbad4384fc 311->316 312->316 347 7ffbad4383ef-7ffbad4383f9 313->347 314->347 324 7ffbad4380ee-7ffbad4380f1 321->324 326 7ffbad4381b0-7ffbad4381b6 322->326 327 7ffbad4381b8-7ffbad4381c0 322->327 329 7ffbad438115-7ffbad438118 324->329 330 7ffbad4380f3-7ffbad4380f6 324->330 326->327 332 7ffbad4381c2-7ffbad4381c5 326->332 333 7ffbad4381d2-7ffbad4381df 327->333 329->287 329->288 330->266 335 7ffbad4380fc-7ffbad438113 330->335 332->266 336 7ffbad4381cb-7ffbad4381d0 332->336 337 7ffbad43822d-7ffbad438231 333->337 338 7ffbad4381e1-7ffbad43822b call 7ffbad430678 333->338 335->329 345 7ffbad4380eb-7ffbad4380ec 335->345 336->333 337->295 341 7ffbad438233-7ffbad438258 337->341 338->337 341->295 345->324 350 7ffbad438492-7ffbad438495 347->350 351 7ffbad4383ff-7ffbad438400 347->351 352 7ffbad4384e4-7ffbad4384e5 350->352 353 7ffbad438497-7ffbad4384be 350->353 354 7ffbad438402-7ffbad438427 351->354 352->316 353->316 359 7ffbad438429-7ffbad43842c 354->359 360 7ffbad438457-7ffbad43845a 354->360 359->360 362 7ffbad43842e-7ffbad43843b 359->362 363 7ffbad43845c-7ffbad438484 360->363 364 7ffbad438486-7ffbad43848c 360->364 366 7ffbad4384fd-7ffbad43854b 362->366 367 7ffbad438441-7ffbad438455 362->367 363->364 370 7ffbad4384c0-7ffbad4384e2 363->370 364->350 364->351 366->316 375 7ffbad43854d-7ffbad438557 call 7ffbad4362e0 366->375 367->354 367->360 370->316 377 7ffbad43855c-7ffbad438570 375->377
        Memory Dump Source
        • Source File: 00000000.00000002.258657160.00007FFBAD430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAD430000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffbad430000_squirrel.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e9449d27e485b7731c9fa7153943991bda6adc5c59fe92c9aaa41314db953114
        • Instruction ID: ec733520472a0e2be2dcb86a6ddf8f056b7730681df31e655ed9be1f43efb0cb
        • Opcode Fuzzy Hash: e9449d27e485b7731c9fa7153943991bda6adc5c59fe92c9aaa41314db953114
        • Instruction Fuzzy Hash: 3922B47460DA094FDB5AEB2CC4859B9F7E1FF99310B1046B9D45AC32A6EE24FC42C781
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 239 7ffbad436d58-7ffbad436d5f 240 7ffbad436d61-7ffbad436d69 239->240 241 7ffbad436d6a-7ffbad436dfc AllocConsole 239->241 240->241 245 7ffbad436dfe 241->245 246 7ffbad436e04-7ffbad436e2b 241->246 245->246
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.258657160.00007FFBAD430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAD430000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffbad430000_squirrel.jbxd
        Similarity
        • API ID: AllocConsole
        • String ID:
        • API String ID: 4167703944-0
        • Opcode ID: 0a9d526e8ffcd3b9fbb65936167b3f1c9c3f90bd5affc8d891c098d3b058d43b
        • Instruction ID: 1899ebe26d233e0ac8c8da905b37c3bdf7f2978718f4b61767612d72cc115d49
        • Opcode Fuzzy Hash: 0a9d526e8ffcd3b9fbb65936167b3f1c9c3f90bd5affc8d891c098d3b058d43b
        • Instruction Fuzzy Hash: 4F31D57190CB4C8FEB29DFA8D846BE9BBF0EF56321F00426ED089D3552DA746846CB51
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 247 7ffbad436c89-7ffbad436d21 AttachConsole 251 7ffbad436d23 247->251 252 7ffbad436d29-7ffbad436d50 247->252 251->252
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.258657160.00007FFBAD430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFBAD430000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffbad430000_squirrel.jbxd
        Similarity
        • API ID: AttachConsole
        • String ID:
        • API String ID: 986699043-0
        • Opcode ID: ea4828f1b784695e62eccdc63fc3fa53ac6e63f291ecf1f9c1ec0ba900a8126d
        • Instruction ID: 2fcfa1d115c0bdf8ecbe6f6115b75ef842d782411c530ea04e8b27c5baaf93ca
        • Opcode Fuzzy Hash: ea4828f1b784695e62eccdc63fc3fa53ac6e63f291ecf1f9c1ec0ba900a8126d
        • Instruction Fuzzy Hash: FC21C17090CB4C8FDB19DF68D8496E9BBF0EF66321F04426FD049D3152DA646856CB51
        Uniqueness

        Uniqueness Score: -1.00%