Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Harbor Freight Department.png

Overview

General Information

Sample name:Harbor Freight Department.png
Analysis ID:1522668
MD5:eeadcea0a9e132e58ee1f1cafaeb4889
SHA1:66da94f5b8241db5f310d2ad7b8458809487c58e
SHA256:b130965087b4af0207c893a68aa5beebe1120816a1ab6d195d74f4c26156b9cc
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w7x64
  • mspaint.exe (PID: 3428 cmdline: mspaint.exe "C:\Users\user\Desktop\Harbor Freight Department.png" MD5: E97295DE2A9FDE547FEAB4FE41DF16CA)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Harbor Freight Department.pngVirustotal: Detection: 17%Perma Link
Source: C:\Windows\SysWOW64\mspaint.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: classification engineClassification label: mal48.winPNG@1/0@0/0
Source: C:\Windows\SysWOW64\mspaint.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Harbor Freight Department.pngVirustotal: Detection: 17%
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: wiatrace.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: uiribbonres.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exe TID: 3484Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\mspaint.exeQueries volume information: C:\Users\user\Desktop\Harbor Freight Department.png VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Harbor Freight Department.png17%ReversingLabsDocument.Trojan.Heuristic
Harbor Freight Department.png18%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522668
Start date and time:2024-09-30 15:04:32 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Harbor Freight Department.png
Detection:MAL
Classification:mal48.winPNG@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .png
  • Close Viewer
  • Exclude process from analysis (whitelisted): WMIADAP.exe, svchost.exe
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
09:05:19API Interceptor270x Sleep call for process: mspaint.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:Microsoft Word 2007+
Entropy (8bit):7.859227008516367
TrID:
  • Word Microsoft Office Open XML Format document (49504/1) 58.23%
  • Word Microsoft Office Open XML Format document (27504/1) 32.35%
  • ZIP compressed archive (8000/1) 9.41%
File name:Harbor Freight Department.png
File size:47'139 bytes
MD5:eeadcea0a9e132e58ee1f1cafaeb4889
SHA1:66da94f5b8241db5f310d2ad7b8458809487c58e
SHA256:b130965087b4af0207c893a68aa5beebe1120816a1ab6d195d74f4c26156b9cc
SHA512:f84fa54d9a5912bc4d24ae6d9e24ceaa5e2c4f5ceac7d7ffc47c96d995f95313109c1b5c355fe6a564a0e025d2278d77d8fece79d78b77fbfdce29891e02a039
SSDEEP:768:ujG8KW01p82Wfn3G0TyhUUQUGhQuhbSGNQQN/qlRN+CwknxllNCM19YSgpCr:B8QWfW0Tym5UGhQAblNQ6Snw2BrsZW
TLSH:6923F23FFF34B825C51A5D3F98EE1ABBF658AB49C129DB0F1823C048961035D47099B9
File Content Preview:PK..........!..{.6....[.......[Content_Types].xml ...(.........................................................................................................................................................................................................
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:09:05:19
Start date:30/09/2024
Path:C:\Windows\SysWOW64\mspaint.exe
Wow64 process (32bit):true
Commandline:mspaint.exe "C:\Users\user\Desktop\Harbor Freight Department.png"
Imagebase:0x550000
File size:6'376'960 bytes
MD5 hash:E97295DE2A9FDE547FEAB4FE41DF16CA
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

No disassembly