Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DrvMonitor.exe

Overview

General Information

Sample name:DrvMonitor.exe
Analysis ID:1501615
MD5:9ba76eb1c36e56f838e0d9e601a96dbc
SHA1:fbef3d4c790c6399c44e9334961fe4c2b2e85a94
SHA256:01739ee4fd9805930ea2cfa586ed1bb6d91655771263a7e672fa0ef9ca8b5648

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sample or dropped binary is a compiled AutoHotkey binary
Uses Windows timers to delay execution
Contains capabilities to detect virtual machines
Program does not show much activity (idle)
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • DrvMonitor.exe (PID: 6348 cmdline: "C:\Users\user\Desktop\DrvMonitor.exe" MD5: 9BA76EB1C36E56F838E0D9E601A96DBC)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: DrvMonitor.exeReversingLabs: Detection: 95%
Source: DrvMonitor.exeVirustotal: Detection: 83%Perma Link
Source: DrvMonitor.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

System Summary

barindex
Source: C:\Users\user\Desktop\DrvMonitor.exeWindow found: window name: AutoHotkey
Source: DrvMonitor.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: DrvMonitor.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9946760770234987
Source: classification engineClassification label: mal56.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\DrvMonitor.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: DrvMonitor.exeReversingLabs: Detection: 95%
Source: DrvMonitor.exeVirustotal: Detection: 83%
Source: C:\Users\user\Desktop\DrvMonitor.exeFile read: C:\Users\user\Desktop\DrvMonitor.exe
Source: C:\Users\user\Desktop\DrvMonitor.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\DrvMonitor.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\DrvMonitor.exeSection loaded: winmm.dll
Source: C:\Users\user\Desktop\DrvMonitor.exeSection loaded: wsock32.dll
Source: C:\Users\user\Desktop\DrvMonitor.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\DrvMonitor.exeSection loaded: textshaping.dll
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\DrvMonitor.exeUser Timer Set: Timeout: 100ms
Source: C:\Users\user\Desktop\DrvMonitor.exeUser Timer Set: Timeout: 10ms
Source: C:\Users\user\Desktop\DrvMonitor.exeUser Timer Set: Timeout: 10ms
Source: C:\Users\user\Desktop\DrvMonitor.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: DeviceType
Source: C:\Users\user\Desktop\DrvMonitor.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
Source: C:\Users\user\Desktop\DrvMonitor.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: InquiryData
Source: C:\Users\user\Desktop\DrvMonitor.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: DeviceIdentifierPage
Source: C:\Users\user\Desktop\DrvMonitor.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: SerialNumber
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\DrvMonitor.exeProcess information queried: ProcessInformation
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Software Packing
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DrvMonitor.exe96%ReversingLabsWin32.Worm.Generic
DrvMonitor.exe84%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501615
Start date and time:2024-08-30 08:29:46 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:13
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Sample name:DrvMonitor.exe
Detection:MAL
Classification:mal56.evad.winEXE@1/0@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, login.live.com, settings-win.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.967014132549632
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.39%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:DrvMonitor.exe
File size:205'167 bytes
MD5:9ba76eb1c36e56f838e0d9e601a96dbc
SHA1:fbef3d4c790c6399c44e9334961fe4c2b2e85a94
SHA256:01739ee4fd9805930ea2cfa586ed1bb6d91655771263a7e672fa0ef9ca8b5648
SHA512:4aa7403b5adc05491fe83d668a320e12e409639b2ff2dac183b8f2583892ea512a9a8fbaf4ef18b50ade312bdc3a3d313fd0840b7dd3aee4b2755eb1064c0177
SSDEEP:6144:jrTUGXDncBO9CRvpnWA2Q4qLpBZFQNmmN7Am1zoSNQs:lzcmEnv2QHTZFajhAmJoSCs
TLSH:8614124659228ED4F0C243754E1AA43B3464BA0596A6478B9ED0EB5FECB3E0C6B4C31F
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......SjS...=...=...=...2...=...b.c.=...b...=..(!...=...`...=..(6...=..($...=...`...=...<.|.=...]...=...c...=...g...=.Rich..=........
Icon Hash:81e8bebfc1e14125
Entrypoint:0x46f1c0
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x47D3FE43 [Sun Mar 9 15:12:03 2008 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:db81c626dd6a61c645d4eb4f28fb7c5e
Instruction
pushad
mov esi, 00440000h
lea edi, dword ptr [esi-0003F000h]
push edi
mov ebp, esp
lea ebx, dword ptr [esp-00003E80h]
xor eax, eax
push eax
cmp esp, ebx
jne 00007FB7A4DE200Dh
inc esi
inc esi
push ebx
push 0006D8A7h
push edi
add ebx, 04h
push ebx
push 0002F1BEh
push esi
add ebx, 04h
push ebx
push eax
mov dword ptr [ebx], 00020003h
nop
nop
nop
nop
nop
push ebp
push edi
push esi
push ebx
sub esp, 7Ch
mov edx, dword ptr [esp+00000090h]
mov dword ptr [esp+74h], 00000000h
mov byte ptr [esp+73h], 00000000h
mov ebp, dword ptr [esp+0000009Ch]
lea eax, dword ptr [edx+04h]
mov dword ptr [esp+78h], eax
mov eax, 00000001h
movzx ecx, byte ptr [edx+02h]
mov ebx, eax
shl ebx, cl
mov ecx, ebx
dec ecx
mov dword ptr [esp+6Ch], ecx
movzx ecx, byte ptr [edx+01h]
shl eax, cl
dec eax
mov dword ptr [esp+68h], eax
mov eax, dword ptr [esp+000000A8h]
movzx esi, byte ptr [edx]
mov dword ptr [ebp+00h], 00000000h
mov dword ptr [esp+60h], 00000000h
mov dword ptr [eax], 00000000h
mov eax, 00000300h
mov dword ptr [esp+64h], esi
mov dword ptr [esp+5Ch], 00000001h
mov dword ptr [esp+58h], 00000001h
mov dword ptr [esp+54h], 00000001h
Programming Language:
  • [ASM] VS2003 (.NET) build 3077
  • [ C ] VS2003 (.NET) build 3077
  • [C++] VS2003 (.NET) build 3077
  • [RES] VS2003 (.NET) build 3077
  • [LNK] VS2003 (.NET) build 3077
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x70f480x2c4.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xf48.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x3f0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x400000x300000x2fe008fd849d73afa247cc44004a1f134999eFalse0.9946760770234987ARC archive data, packed7.99710590131113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x700000x20000x1400818b939a8639fcd6b3849565b7aaf41cFalse0.3603515625data3.992876329118283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x7020c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.32355595667870035
RT_MENU0x6bab00x2c8dataEnglishUnited States1.0154494382022472
RT_DIALOG0x6bd780xe8dataEnglishUnited States1.0474137931034482
RT_ACCELERATOR0x6be600x48dataEnglishUnited States1.1527777777777777
RT_GROUP_ICON0x70ab80x14dataEnglishUnited States1.15
RT_VERSION0x70ad00x250dataEnglishUnited States0.49155405405405406
RT_MANIFEST0x70d240x221XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5486238532110091
DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
ADVAPI32.dllRegCloseKey
COMCTL32.dll
comdlg32.dllGetOpenFileNameA
GDI32.dllBitBlt
ole32.dllCoInitialize
OLEAUT32.dllOleLoadPicture
SHELL32.dllDragFinish
USER32.dllGetDC
VERSION.dllVerQueryValueA
WINMM.dllmixerOpen
WSOCK32.dllWSACleanup
Language of compilation systemCountry where language is spokenMap
EnglishUnited States