Windows
Analysis Report
squirrel.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
squirrel.exe (PID: 5912 cmdline:
C:\Users\u ser\Deskto p\squirrel .exe MD5: 407CF58BF93EA428C6444813119740A2) conhost.exe (PID: 6012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00007FFBAD430660 | |
Source: | Code function: | 0_2_00007FFBAD430587 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Task registration methods: | ||
Source: | Task registration methods: | ||
Source: | Task registration methods: | ||
Source: | Task registration methods: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFBAD4371B0 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Command and Scripting Interpreter | 1 Scheduled Task/Job | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 21 Virtualization/Sandbox Evasion | Remote Services | 11 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | 1 Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Scheduled Task/Job | 1 Disable or Modify Tools | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 21 Virtualization/Sandbox Evasion | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Process Injection | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 1 Obfuscated Files or Information | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 799988 |
Start date and time: | 2023-02-07 02:27:18 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 2 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | squirrel.exe |
Detection: | CLEAN |
Classification: | clean3.winEXE@2/3@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Excluded domains from analysis
(whitelisted): fs.microsoft.c om - Not all processes where analyz
ed, report is missing behavior information
Process: | C:\Users\user\Desktop\squirrel.exe |
File Type: | |
Category: | modified |
Size (bytes): | 1265 |
Entropy (8bit): | 5.3482778101486135 |
Encrypted: | false |
SSDEEP: | 24:ML9E4KrgKDE4KGKN08AKh7E4/wxQlEE48S6uE4zUAE4KvFc:MxHKEYHKGD8Ao7H/wxQlEH8cHz7HKK |
MD5: | 9368D03BA0999F4DBC877ED5F57D3AE9 |
SHA1: | 6BD070A89464DEE1B3F90CF4C11BE8960238D4C5 |
SHA-256: | 63F4634CBF8DD04A2DCDE8ADF07324F7FA33B8A49949BEBC96907C135EA11F60 |
SHA-512: | D02E216B26DF374D9ED5102A118CD6DFC84CBC71CDC66744C1DE88B0DE1081AFE3CD1EF1215A66F1176D0462763973424AB3E9A4524ED671D15E3C35CE3AD2FE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\squirrel.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 67 |
Entropy (8bit): | 4.707349452552437 |
Encrypted: | false |
SSDEEP: | 3:5nF9/cW3KfF/5QEBM2F2UZHsOBEREov:ZcCKfFSVUB4Bv |
MD5: | 73D6B5C041AD48BABA69D50BD6154206 |
SHA1: | 93F80BE15E793E91B7871C7DCB2EC5AFB0488923 |
SHA-256: | 775C8BCF12B871380BAF3FD33FCA6FCE26A32204170AAD89AADB7D8C5B3E7CC5 |
SHA-512: | B14EBD26A34E208FB3B87C19908AB4884F20C3C3288E1FF7606D3A43F56CF4C1D1ABD47D7756F42BC32BA06C71680AFA9DB0287F1824B1D7870976C15E3E6006 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\squirrel.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2549 |
Entropy (8bit): | 4.0792338041347564 |
Encrypted: | false |
SSDEEP: | 48:MPdT9BD+jBjatHqdMYvtHi2WxBk2GjKRW+XvcEwP1:M1pkjBjaGvQajfUcEwt |
MD5: | 9D268E08D7029210710B483F3D386161 |
SHA1: | 485F034EF95A572FE2EEBDF06317B6168A29256A |
SHA-256: | B0D94CB0F14A340406F485FCCBDD04B109A5B8EAFD310691EFE44833604B6B9D |
SHA-512: | 2A4CD6B7FA17EDDF075043765495769E7582AC7B1232841221AFF8794745999710AED108B63CB05A16EA3807C230664BE74A53E9D8AA7C69483426FD17A6A739 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.928080870228547 |
TrID: |
|
File name: | squirrel.exe |
File size: | 1870640 |
MD5: | 407cf58bf93ea428c6444813119740a2 |
SHA1: | 86cda5e68c7f5e6d3ddbe7ed76765e258b04290d |
SHA256: | 2b42847d184c2542e95a90da7f9c8baa212e0e2d729cc66af140b8a2750dfa6f |
SHA512: | e9f903f11851deceb19240a3f42740b35a3eebf7039b6550f9b99affacc2ef04993b2f109d442ad21e60ac9b13939e7d94bbc6303991b7bc5759de3aa6ad0a95 |
SSDEEP: | 24576:rav+UvzLSrrg5P47tuwtOdoZoT60zOipX6LMGDI+HZ0VhtbvZzGnMKH27:pr7tnrnc5Vh1am |
TLSH: | EF856A11A7D88E2BE56E26BAF431055963F2E9826373F78B2B48707D2BD37544D02363 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...8..c.........."...................... ....@...... ..............................b^....@................................ |
Icon Hash: | 70cce6b2ba8ce470 |
Entrypoint: | 0x400000 |
Entrypoint Section: | |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x630FB738 [Wed Aug 31 19:32:08 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | B5318363B6AB4E1770DABA8A8B81F07D |
Thumbprint SHA-1: | 3B19835AEBF81A3643A7DFCC18B29B5EBF7DF168 |
Thumbprint SHA-256: | D3CC79314E510DDE8463754F900F88C8F707D0EF6460D621863D35A0AB220468 |
Serial: | 0FAD7ED2A113874E1194198F2553727F |
Instruction |
---|
dec ebp |
pop edx |
nop |
add byte ptr [ebx], al |
add byte ptr [eax], al |
add byte ptr [eax+eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1c2000 | 0x7e78 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x1c6400 | 0x2730 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1be028 | 0x1be200 | False | 0.3737303866629308 | data | 5.8827036722604085 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x1c2000 | 0x7e78 | 0x8000 | False | 0.58123779296875 | data | 6.160420939085719 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x1c21ec | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | ||
RT_ICON | 0x1c2654 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | ||
RT_ICON | 0x1c36fc | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | ||
RT_ICON | 0x1c5ca4 | 0x364b | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | ||
RT_GROUP_ICON | 0x1c92f0 | 0x3e | data | ||
RT_VERSION | 0x1c9330 | 0x33c | data | ||
RT_VERSION | 0x1c966c | 0x258 | data | English | United States |
RT_MANIFEST | 0x1c98c4 | 0x5b4 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:29:06 |
Start date: | 07/02/2023 |
Path: | C:\Users\user\Desktop\squirrel.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa90000 |
File size: | 1870640 bytes |
MD5 hash: | 407CF58BF93EA428C6444813119740A2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 1 |
Start time: | 02:29:09 |
Start date: | 07/02/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff745070000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 17.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |