Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ScreenConnect.ClientService.exe

Overview

General Information

Sample name:ScreenConnect.ClientService.exe
Analysis ID:1542347
MD5:7b4e1d1fda0c30fa647e4673c9b69095
SHA1:0dee6877d1000006a6bd1d0c18dbe571a2e45f5f
SHA256:420d3f1a29a4b76d9a90b4d209379152cb2161c9d4e753be40d3f66d18fc310e
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Detected potential unwanted application
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 84.6% probability
Source: ScreenConnect.ClientService.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ScreenConnect.ClientService.exeStatic PE information: certificate valid
Source: ScreenConnect.ClientService.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://ocsp.digicert.com0
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: ScreenConnect.ClientService.exeString found in binary or memory: http://www.digicert.com/CPS0

System Summary

barindex
Source: ScreenConnect.ClientService.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
Source: ScreenConnect.ClientService.exe, 00000000.00000000.2116498994.00000000002D6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs ScreenConnect.ClientService.exe
Source: ScreenConnect.ClientService.exeBinary or memory string: OriginalFilename vs ScreenConnect.ClientService.exe
Source: ScreenConnect.ClientService.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.logJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeMutant created: NULL
Source: ScreenConnect.ClientService.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: ScreenConnect.ClientService.exeStatic PE information: certificate valid
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ScreenConnect.ClientService.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: ScreenConnect.ClientService.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe
Source: ScreenConnect.ClientService.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ScreenConnect.ClientService.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ScreenConnect.ClientService.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ScreenConnect.ClientService.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ScreenConnect.ClientService.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeMemory allocated: 1540000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeMemory allocated: 2F00000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeMemory allocated: 4F00000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exe TID: 3576Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ScreenConnect.ClientService.exeMemory allocated: page read and write | page guardJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ScreenConnect.ClientService.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1542347
Start date and time:2024-10-25 20:04:52 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:ScreenConnect.ClientService.exe
Detection:MAL
Classification:mal48.winEXE@1/1@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
  • Execution Graph export aborted for target ScreenConnect.ClientService.exe, PID 2820 because it is empty
  • VT rate limit hit for: ScreenConnect.ClientService.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\ScreenConnect.ClientService.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):42
Entropy (8bit):4.0050635535766075
Encrypted:false
SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
MD5:84CFDB4B995B1DBF543B26B86C863ADC
SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.505232472804977
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:ScreenConnect.ClientService.exe
File size:95'520 bytes
MD5:7b4e1d1fda0c30fa647e4673c9b69095
SHA1:0dee6877d1000006a6bd1d0c18dbe571a2e45f5f
SHA256:420d3f1a29a4b76d9a90b4d209379152cb2161c9d4e753be40d3f66d18fc310e
SHA512:9d31c2efcd76311c5d52d3f72aca89d4897db3433cb89197b4863950559f9233d081676e9912f0d0d3f81c5e82ad188f27c68dc3b669917cbc5b522707677a02
SSDEEP:1536:cg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgIU0HMY7uDx2L:FhbNDxZGXfdHrX7rAc6myJkgIU0HDRL
TLSH:72935A13B5C28872D473093158E0DAB49A3FF9615E61DEAB3798022A4F342C1BE75E77
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF..qF..qF......qF......qF......qF.<.B..qF.<.E..qF.<.C..qF......qF..#...qF..qG..qF.2.O..qF.2....qF.2.D..qF.Rich.qF........
Icon Hash:00928e8e8686b000
Entrypoint:0x40217f
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6377E6AD [Fri Nov 18 20:10:21 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:5f510e22d141c137199e2ff4021a57be
Signature Valid:true
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 17/08/2022 02:00:00 16/08/2025 01:59:59
Subject Chain
  • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
Version:3
Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
Serial:0B9360051BCCF66642998998D5BA97CE
Instruction
call 00007FEA00F2FFB0h
jmp 00007FEA00F2F81Fh
retn 0000h
push ebp
mov ebp, esp
push 00000000h
call dword ptr [0040D0B0h]
push dword ptr [ebp+08h]
call dword ptr [0040D0ACh]
push C0000409h
call dword ptr [0040D0B4h]
push eax
call dword ptr [0040D0B8h]
pop ebp
ret
push ebp
mov ebp, esp
sub esp, 00000324h
push 00000017h
call dword ptr [0040D0BCh]
test eax, eax
je 00007FEA00F2F9A7h
push 00000002h
pop ecx
int 29h
mov dword ptr [00414998h], eax
mov dword ptr [00414994h], ecx
mov dword ptr [00414990h], edx
mov dword ptr [0041498Ch], ebx
mov dword ptr [00414988h], esi
mov dword ptr [00414984h], edi
mov word ptr [004149B0h], ss
mov word ptr [004149A4h], cs
mov word ptr [00414980h], ds
mov word ptr [0041497Ch], es
mov word ptr [00414978h], fs
mov word ptr [00414974h], gs
pushfd
pop dword ptr [004149A8h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [0041499Ch], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [004149A0h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [004149ACh], eax
mov eax, dword ptr [ebp-00000324h]
mov dword ptr [004148E8h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
  • [IMP] VS2008 build 21022
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x12e700x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x450.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x14c000x2920
IMAGE_DIRECTORY_ENTRY_BASERELOC0x170000xfc0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x121600x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x120a00x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xd0000x188.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xbf3a0xc0004903141203ee15a88e0ec583d004b2e1False0.6032918294270834data6.576560633933191IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xd0000x66f20x6800d7ff5c28f3b91b07d0d4a0084e0c4027False0.41710486778846156data4.804608720286551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x140000x12840xa00c1c9bc79d0134b5bbd10e2601a2f323eFalse0.166015625data2.1434314299622814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x160000x4500x6001f2a69900adabf8c2ed3a8784561c07fFalse0.365234375data4.693743025738022IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x170000xfc00x1000b8d6010afa6ab836c37551e6072726feFalse0.777587890625data6.512317090870992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x160a00x22cdata0.4910071942446043
RT_MANIFEST0x162cc0x184XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5979381443298969
DLLImport
mscoree.dllCorBindToRuntimeEx
SHLWAPI.dllStrCatW, PathFindFileNameW, StrCpyW, PathRemoveExtensionW
KERNEL32.dllSetEvent, CloseHandle, LoadLibraryW, DecodePointer, GetProcAddress, GetLastError, GetCurrentProcessId, GetModuleHandleW, SetStdHandle, Sleep, CreateEventW, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, GetCommandLineW, GetStringTypeW, FlushFileBuffers, GetConsoleCP, GetConsoleMode, SetFilePointerEx, WriteConsoleW, DeleteCriticalSection, RtlUnwind, GetFileType, GetProcessHeap, FreeEnvironmentStringsW, IsDebuggerPresent, OutputDebugStringW, RaiseException, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, CreateFileW, SetLastError, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameA, MultiByteToWideChar, WideCharToMultiByte, GetStdHandle, WriteFile, GetACP, HeapFree, HeapSize, HeapReAlloc, LCMapStringW, HeapAlloc, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetEnvironmentStringsW
ADVAPI32.dllRegisterServiceCtrlHandlerExW, CreateServiceW, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, SetServiceStatus, RegSetValueExW, StartServiceW, RegCreateKeyW, StartServiceCtrlDispatcherW, OpenServiceW, RegOpenKeyW
OLEAUT32.dllVariantInit, SysFreeString, SysAllocString, SafeArrayPutElement, SafeArrayCreateVector, VariantClear
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:14:05:43
Start date:25/10/2024
Path:C:\Users\user\Desktop\ScreenConnect.ClientService.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\ScreenConnect.ClientService.exe"
Imagebase:0x2c0000
File size:95'520 bytes
MD5 hash:7B4E1D1FDA0C30FA647E4673C9B69095
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.2117482203.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_11dd000_ScreenConnect.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cff47136568dca7cf546c20b06cd5fbaaabda0226fa2aa78343819fe5abf00ed
    • Instruction ID: 4a9f9177ab032f5cdb597db698dcd7784d33ab8bea61c70b54641ffa738b204a
    • Opcode Fuzzy Hash: cff47136568dca7cf546c20b06cd5fbaaabda0226fa2aa78343819fe5abf00ed
    • Instruction Fuzzy Hash: 7401F7714043409AEB184E69ED80B67BF98DFC13A4F18C01AEE480A1C2C7B99845C6B2
    Memory Dump Source
    • Source File: 00000000.00000002.2117482203.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_11dd000_ScreenConnect.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7e27a865f074534867690e1df68165d2adc4a23d2efcdc94f2e02d2c8329096f
    • Instruction ID: 84d7e472701f845051f60cb00f4ec48e58bb837a0ed747e9e08918c231746480
    • Opcode Fuzzy Hash: 7e27a865f074534867690e1df68165d2adc4a23d2efcdc94f2e02d2c8329096f
    • Instruction Fuzzy Hash: CF01527140E3C05FE7164B259C94B52BFA4DF52224F1981DBD9888F1D3C3695844C772