Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ScreenConnect.WindowsClient.exe

Overview

General Information

Sample name:ScreenConnect.WindowsClient.exe
Analysis ID:1500129
MD5:ab5fa8d90645878d587f386d0e276c02
SHA1:a602a20735a1104851f293965f1fe4ab678bf627
SHA256:316bbf433f1f803d113adf060c528ccc636656cee26b90f5fea011c1c73c7d16
Infos:

Detection

ScreenConnect Tool
Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

.NET source code contains a domain name check
.NET source code contains potential unpacker
Contains functionality to capture screen (.Net source)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • ScreenConnect.WindowsClient.exe (PID: 6852 cmdline: "C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe" MD5: AB5FA8D90645878D587F386D0E276C02)
    • dw20.exe (PID: 5144 cmdline: dw20.exe -x -s 1232 MD5: 29F49B77C60A7F0A6A614C167FE64E3C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1646016569.0000000000202000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      Process Memory Space: ScreenConnect.WindowsClient.exe PID: 6852JoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.ScreenConnect.WindowsClient.exe.200000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results
          Source: ScreenConnect.WindowsClient.exeStatic PE information: certificate valid
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
          Source: ScreenConnect.WindowsClient.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbBB source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: Client.pdbTV source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1821702084.00000000003D1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\exe\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.0000000000854000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\symbols\exe\ScreenConnect.WindowsClient.pdbn Fil source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\ScreenConnect.WindowsClient.pdbon source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.0000000000854000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\Desktop\ScreenConnect.WindowsClient.pdbgMh source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.000000000082B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\ScreenConnect.WindowsClient.pdbo source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe
          Source: Binary string: C:\Users\user\Desktop\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1821702084.00000000003D1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: ws\ScreenConnect.WindowsClient.pdbpdbent.pdb\jone source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\exe\ScreenConnect.WindowsClient.pdbommon source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.000000000082B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\Desktop\ScreenConnect.WindowsClient.PDB/N source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.000000000082B000.00000004.00000020.00020000.00000000.sdmp
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://ocsp.digicert.com0
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://ocsp.digicert.com0A
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://ocsp.digicert.com0C
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://ocsp.digicert.com0X
          Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: http://www.digicert.com/CPS0

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: ScreenConnect.WindowsClient.exe, WindowsClientExtensions.cs.Net Code: CaptureScreen
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1232
          Source: classification engineClassification label: mal52.spyw.evad.winEXE@3/4@0/0
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeMutant created: NULL
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7d5a730d-ef8b-44c4-9f9a-7826c204f454Jump to behavior
          Source: ScreenConnect.WindowsClient.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: ScreenConnect.WindowsClient.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: ScreenConnect.WindowsClient.exeString found in binary or memory: Status/Adding main form from:
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeFile read: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe "C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe"
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1232
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1232Jump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
          Source: ScreenConnect.WindowsClient.exeStatic PE information: certificate valid
          Source: ScreenConnect.WindowsClient.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
          Source: ScreenConnect.WindowsClient.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: ScreenConnect.WindowsClient.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbBB source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: Client.pdbTV source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1821702084.00000000003D1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\exe\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.0000000000854000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\symbols\exe\ScreenConnect.WindowsClient.pdbn Fil source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\ScreenConnect.WindowsClient.pdbon source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.0000000000854000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\Desktop\ScreenConnect.WindowsClient.pdbgMh source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.000000000082B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\ScreenConnect.WindowsClient.pdbo source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe
          Source: Binary string: C:\Users\user\Desktop\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1821702084.00000000003D1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: ws\ScreenConnect.WindowsClient.pdbpdbent.pdb\jone source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\exe\ScreenConnect.WindowsClient.pdbommon source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822708751.0000000000D76000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.000000000082B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Users\user\Desktop\ScreenConnect.WindowsClient.PDB/N source: ScreenConnect.WindowsClient.exe, 00000000.00000002.1822245852.000000000082B000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: ScreenConnect.WindowsClient.exe, PrintJobReceiver.cs.Net Code: RunThread
          Source: ScreenConnect.WindowsClient.exeStatic PE information: 0xC05DF8E0 [Fri Apr 8 23:33:52 2072 UTC]
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: ScreenConnect.WindowsClient.exe, Program.cs.Net Code: Environment.GetEnvironmentVariable("USERDOMAIN")
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeMemory allocated: 9C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeMemory allocated: 1A960000 memory commit | memory reserve | memory write watchJump to behavior
          Source: Amcache.hve.1.drBinary or memory string: VMware
          Source: dw20.exe, 00000001.00000003.1820063002.0000000000681000.00000004.00000020.00020000.00000000.sdmp, dw20.exe, 00000001.00000003.1819711424.000000000067A000.00000004.00000020.00020000.00000000.sdmp, dw20.exe, 00000001.00000002.1822387679.0000000000682000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW*l
          Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: dw20.exe, 00000001.00000003.1820063002.0000000000681000.00000004.00000020.00020000.00000000.sdmp, dw20.exe, 00000001.00000003.1819711424.000000000067A000.00000004.00000020.00020000.00000000.sdmp, dw20.exe, 00000001.00000002.1822387679.0000000000682000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.1.drBinary or memory string: vmci.sys
          Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.1.drBinary or memory string: VMware20,1
          Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: dw20.exe, 00000001.00000002.1822210616.0000000000614000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW }h%SystemRoot%\system32\mswsock.dll`Jd
          Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe dw20.exe -x -s 1232Jump to behavior
          Source: ScreenConnect.WindowsClient.exeBinary or memory string: Progman
          Source: ScreenConnect.WindowsClient.exeBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
          Source: C:\Users\user\Desktop\ScreenConnect.WindowsClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe
          Source: Yara matchFile source: ScreenConnect.WindowsClient.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.ScreenConnect.WindowsClient.exe.200000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1646016569.0000000000202000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 6852, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          12
          Process Injection
          12
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Screen Capture
          Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          Office Application Startup
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory121
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Software Packing
          Security Account Manager12
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
          Process Injection
          NTDS1
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Timestomp
          LSA Secrets2
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ScreenConnect.WindowsClient.exe0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://upx.sf.net0%URL Reputationsafe
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://upx.sf.netAmcache.hve.1.drfalse
          • URL Reputation: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1500129
          Start date and time:2024-08-27 23:28:06 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 3m 55s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:ScreenConnect.WindowsClient.exe
          Detection:MAL
          Classification:mal52.spyw.evad.winEXE@3/4@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.189.173.22
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • VT rate limit hit for: ScreenConnect.WindowsClient.exe
          TimeTypeDescription
          17:29:11API Interceptor1x Sleep call for process: dw20.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):0.9264744961076542
          Encrypted:false
          SSDEEP:192:xYYioHhwRH3iaB89oHcm5mV4QzuiFKZ24lO8:uYiswRHSacmSzuiFKY4lO8
          MD5:9CCE5B2E38926A1FCD2D8D536B077B6C
          SHA1:32EA6FA7F40CDAA47B6A9507DD8EFC7DFCD8E73E
          SHA-256:F6094AFF4A09B273A733FB29D0821120CAA8680EAC7E4504DFF34CB70538D4DC
          SHA-512:471FC52866DF9472576C29F015AF639FB030779EB66805BD59B2252B46D7F0AE6046CF00091E49656A538FC6B66FBF6A501AFD7FBD5E268D7ECD208D5BCC6822
          Malicious:false
          Reputation:low
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.2.6.7.7.3.4.3.7.2.5.8.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.2.6.7.7.3.4.6.5.3.8.5.4.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.1.6.e.6.a.6.8.-.d.2.7.3.-.4.b.2.2.-.9.5.2.8.-.2.a.b.1.f.c.8.b.7.f.7.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.c.r.e.e.n.C.o.n.n.e.c.t...W.i.n.d.o.w.s.C.l.i.e.n.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.c.4.-.0.0.0.1.-.0.0.1.4.-.7.7.4.d.-.d.0.1.d.c.8.f.8.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.7.4.8.e.c.3.0.8.6.2.8.4.5.f.f.b.4.e.7.a.6.e.7.f.5.8.e.d.f.0.0.0.0.0.0.0.0.0.0.!.0.0.0.0.a.6.0.2.a.2.0.7.3.5.a.1.1.0.4.8.5.1.f.2.9.3.9.6.5.f.1.f.e.4.a.b.6.7.8.b.f.6.2.7.!.S.c.r.e.e.n.C.o.n.n.e.c.t...W.i.n.d.o.w.s.C.l.i.e.n.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.7.2././.0.4././.0.8.:.2.3.:.3.3.:.5.2.!.9.b.0.3.0.!.S.c.r.e.e.n.C.o.
          Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):7914
          Entropy (8bit):3.705344154020749
          Encrypted:false
          SSDEEP:192:R6l7wVeJyL+6Y9iqlb6GgmfN/wp1LRiJf5Y8Zm:R6lXJO+6Y4ql3gmfN/8L0Jf5Yv
          MD5:7C084A149657646C6A5C6B440EA5BD51
          SHA1:CB30914288B38A2F014F9D9FF6E790B519E4FE42
          SHA-256:6C848F8D68156AE4CE2C8C39306A57B58657E292ED10A1AF06BD06FF1C267B3F
          SHA-512:860A4ADAD4D96C7288238B9EB92D027EAE72D24A93385C1AC9A0BAB4AE5AF9ADCC0C6F9570899370F03DB80BBBC6AE073241970FA0C2C363F0A6D1527A2F9A57
          Malicious:false
          Reputation:low
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.5.2.<./.P.i.
          Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4766
          Entropy (8bit):4.52263813862476
          Encrypted:false
          SSDEEP:48:cvIwWl8zsiJg771I9/8WpW8VYkmYm8M4JFKfoQYF/yq855sBp3od:uIjfwI7817VpJFKr2Egp3od
          MD5:81C22493AE27C91D69F200BFED46273A
          SHA1:B6F4268153A726DEE02581756F2F31BBD68B663C
          SHA-256:2E3AF68D63912F09CD7A8880C44E335C319582901BB78A23811F0576FB6C2839
          SHA-512:BC32A0E195F64D0F57D4538EF817A626E7BD00D23175D7C922DF00D0E6027CC192D5E57CE4939781E32303B4FA0B543DA27F4CB91539A9ADF596983B7B71FB4A
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="474511" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.465954198313559
          Encrypted:false
          SSDEEP:6144:oIXfpi67eLPU9skLmb0b4xWSPKaJG8nAgejZMMhA2gX4WABl0uNldwBCswSbu:9XD94xWlLZMM6YFH3+u
          MD5:F7D955DC84B3C1BF3B5A923A1D1BEC5D
          SHA1:48EF0CF23F7B7B8ABC84805326BC7AFF040F5B62
          SHA-256:3AC5A39D050288D8CBA26B79153EA0C99939815B8E56112782D7D72A05B303CA
          SHA-512:EDC5A464C7A7CF3562AE920F8036A59C5585F90F3599B7C2E57C5B3A0E5BBD24269C448AE0FDB59015BBBB35E31D215E9F0284A270CF717DD3A6A72574BEC214
          Malicious:false
          Reputation:low
          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.......................................................................................................................................................................................................................................................................................................................................................*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):6.182826342545805
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
          • Win32 Executable (generic) a (10002005/4) 49.93%
          • Windows Screen Saver (13104/52) 0.07%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:ScreenConnect.WindowsClient.exe
          File size:598'816 bytes
          MD5:ab5fa8d90645878d587f386d0e276c02
          SHA1:a602a20735a1104851f293965f1fe4ab678bf627
          SHA256:316bbf433f1f803d113adf060c528ccc636656cee26b90f5fea011c1c73c7d16
          SHA512:a181e23c8fa01bc1d9f0f9f95a5ca6112e2b61f34f4c1da696d3ccabbbd942bcc81a3f4a60921328a6020d28aed8711c22be33761cb685921d50fea8b1d7b986
          SSDEEP:6144:0ya9pDzjhf+YMojz3cZRzyyUs0Ny2rOfQyEAlVw72191BVi1NnfEQcYF2/R4IrNC:jajDzNZFjLcZRzyyh5/EA3wv1lSYGXk
          TLSH:24D47E223379DABAC5AF0739B0E15C242BB0E9066245E38F49E4B5DD1E973864D093F7
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....]..........."...0.............".... ... ....@.. .......................`......0.....@................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x490c22
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0xC05DF8E0 [Fri Apr 8 23:33:52 2072 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Signature Valid:true
          Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
          Signature Validation Error:The operation completed successfully
          Error Number:0
          Not Before, Not After
          • 17/08/2022 01:00:00 16/08/2025 00:59:59
          Subject Chain
          • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
          Version:3
          Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
          Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
          Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
          Serial:0B9360051BCCF66642998998D5BA97CE
          Instruction
          jmp dword ptr [00402000h]
          inc esp
          pop eax
          inc edx
          inc ebx
          jmp dword ptr [ecx+47h]
          loopne 00007F29A4E043EDh
          mov bh, byte ptr [eax]
          loopne 00007F29A4E04489h
          sbb byte ptr [ebp+08h], FFFFFFF1h
          mov al, 78h
          jmp far 02BCh : 00000001h
          add byte ptr [eax], al
          push es
          add byte ptr [eax], al
          add byte ptr [eax], bh
          add byte ptr [eax], al
          add byte ptr [eax+eax+01100000h], ah
          add byte ptr [eax], al
          mov word ptr [ecx], es
          add byte ptr [eax], al
          xor byte ptr [edx], al
          add byte ptr [eax], al
          mov byte ptr [edx], al
          add byte ptr [eax], al
          inc ecx
          outsd
          outsb
          cmp dword ptr [eax+eax+00h], esp
          add byte ptr [eax+eax+00h], ah
          add byte ptr [eax], al
          add bh, bh
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x90bcd0x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x3bc.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x8fa000x2920
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x90b240x38.text
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x8f1f00x8f2008fcd01766af47721b29efdf4eee6d3e5False0.41480622270742357data6.150081701351699IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x920000x3bc0x40015d991bfd2310571b54d1cf8d57b18b7False0.373046875data3.103042504365969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x940000xc0x2001da0f3cff0bf800142de40459023bb08False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0x920580x360data0.4074074074074074
          DLLImport
          mscoree.dll_CorExeMain
          TimestampSource PortDest PortSource IPDest IP
          Aug 27, 2024 23:29:38.510521889 CEST5358242162.159.36.2192.168.2.4
          Aug 27, 2024 23:29:39.625787020 CEST53585221.1.1.1192.168.2.4

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:17:28:53
          Start date:27/08/2024
          Path:C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe"
          Imagebase:0x200000
          File size:598'816 bytes
          MD5 hash:AB5FA8D90645878D587F386D0E276C02
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1646016569.0000000000202000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:17:28:54
          Start date:27/08/2024
          Path:C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          Wow64 process (32bit):false
          Commandline:dw20.exe -x -s 1232
          Imagebase:0x10000000
          File size:46'208 bytes
          MD5 hash:29F49B77C60A7F0A6A614C167FE64E3C
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          No disassembly