Windows
Analysis Report
IdleScheduleEventAction.exe
Overview
General Information
Detection
Score: | 2 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
- IdleScheduleEventAction.exe (PID: 6408 cmdline:
"C:\Users\ user\Deskt op\IdleSch eduleEvent Action.exe " MD5: 1ED391E2331503D76E6EA51B3F51C2C8)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 22 Virtualization/Sandbox Evasion | OS Credential Dumping | 22 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543855 |
Start date and time: | 2024-10-28 15:06:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 39s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | IdleScheduleEventAction.exe |
Detection: | CLEAN |
Classification: | clean2.winEXE@1/0@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- VT rate limit hit for: IdleScheduleEventAction.exe
File type: | |
Entropy (8bit): | 4.764941878021418 |
TrID: |
|
File name: | IdleScheduleEventAction.exe |
File size: | 131'584 bytes |
MD5: | 1ed391e2331503d76e6ea51b3f51c2c8 |
SHA1: | 057ff605c6e668a8d3c6cfcfe6de55a34803df2c |
SHA256: | 8ebf6900fc6c59e517e52f49a2fa803e9197164dca32c957f7210795f3a0f99c |
SHA512: | 1eeb66cca4c70af28fd5645aabc1f94d9626866b3c287938588c74247860456714124c0cbbceedd8f9df8f5fe5e31329d444d5a204e35254aea1a37052a2b4f7 |
SSDEEP: | 768:538H/rA/rkJxxFTz7U/++1Bwz9Sbh9Sb:E0Dkjk+bzC |
TLSH: | 8ED3D7439AEC3CD6C038A3B077BB93D4C72EEC559292C28E96D00295D9BE55739237D8 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&..!b..rb..rb..rk.%rh..r.$.sa..r.$.sh..r.$.sx..r.$.sd..r...sg..rb..r...rw#.sf..rw#Irc..rb.!rc..rw#.sc..rRichb..r............... |
Icon Hash: | 17170f6d2b2d2d13 |
Entrypoint: | 0x140004588 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x670E06D9 [Tue Oct 15 06:08:25 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | e2fecaf87c317f0afd6c1d6c86b58a73 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FCBC8ADB264h |
dec eax |
add esp, 28h |
jmp 00007FCBC8ADACCFh |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
xor ecx, ecx |
call dword ptr [00001AC3h] |
dec eax |
mov ecx, ebx |
call dword ptr [00001AB2h] |
call dword ptr [00001A4Ch] |
dec eax |
mov ecx, eax |
mov edx, C0000409h |
dec eax |
add esp, 20h |
pop ebx |
dec eax |
jmp dword ptr [00001AA8h] |
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
sub esp, 38h |
mov ecx, 00000017h |
call dword ptr [00001A9Ch] |
test eax, eax |
je 00007FCBC8ADAE59h |
mov ecx, 00000002h |
int 29h |
dec eax |
lea ecx, dword ptr [00005FDAh] |
call 00007FCBC8ADAEFEh |
dec eax |
mov eax, dword ptr [esp+38h] |
dec eax |
mov dword ptr [000060C1h], eax |
dec eax |
lea eax, dword ptr [esp+38h] |
dec eax |
add eax, 08h |
dec eax |
mov dword ptr [00006051h], eax |
dec eax |
mov eax, dword ptr [000060AAh] |
dec eax |
mov dword ptr [00005F1Bh], eax |
dec eax |
mov eax, dword ptr [esp+40h] |
dec eax |
mov dword ptr [0000601Fh], eax |
mov dword ptr [00005EF5h], C0000409h |
mov dword ptr [00005EEFh], 00000001h |
mov dword ptr [00005EF9h], 00000001h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8544 | 0xdc | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x17260 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xb000 | 0x558 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x24000 | 0x12c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x6fd0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x6e90 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x6000 | 0x330 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x4522 | 0x4600 | e344e7439344776b1b69ea4aeb28c439 | False | 0.5496651785714286 | data | 6.179134537174801 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x6000 | 0x358a | 0x3600 | e19527312dd7c4ad7e1dae1d4c5246d6 | False | 0.35836226851851855 | data | 4.324117014302598 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0xb68 | 0x600 | 5d2b845f4ba4846827756282a802cf7b | False | 0.24348958333333334 | data | 3.8792422169168144 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xb000 | 0x558 | 0x600 | 488bb90fedab2d176eece8acbf8148d6 | False | 0.4453125 | data | 3.9146737210148808 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x17260 | 0x17400 | b46ee5ec481f6c91c84a0c0bd72168cb | False | 0.11879410282258064 | data | 4.022370063392844 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x24000 | 0x12c | 0x200 | 90097ea77003e2805f0d17845046e4fb | False | 0.505859375 | data | 3.8942214034765867 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xc570 | 0x115a | PNG image data, 256 x 256, 8-bit colormap, non-interlaced | English | United States | 0.33340837460603334 |
RT_ICON | 0xd6d0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | English | United States | 0.09408315565031983 |
RT_ICON | 0xe578 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.11507220216606498 |
RT_ICON | 0xee20 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | English | United States | 0.12427745664739884 |
RT_ICON | 0xf388 | 0x90b | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.791792656587473 |
RT_ICON | 0xfc98 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.03235710911667454 |
RT_ICON | 0x13ec0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.04595435684647303 |
RT_ICON | 0x16468 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.075046904315197 |
RT_ICON | 0x17510 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.15070921985815602 |
RT_ICON | 0x17a00 | 0x115a | PNG image data, 256 x 256, 8-bit colormap, non-interlaced | English | United States | 0.33340837460603334 |
RT_ICON | 0x18b60 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | English | United States | 0.09408315565031983 |
RT_ICON | 0x19a08 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.11507220216606498 |
RT_ICON | 0x1a2b0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | English | United States | 0.12427745664739884 |
RT_ICON | 0x1a818 | 0x90b | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.791792656587473 |
RT_ICON | 0x1b128 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.03235710911667454 |
RT_ICON | 0x1f350 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.04595435684647303 |
RT_ICON | 0x218f8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.075046904315197 |
RT_ICON | 0x229a0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.15070921985815602 |
RT_MENU | 0x22e90 | 0x4a | data | English | United States | 0.8648648648648649 |
RT_DIALOG | 0x22ef0 | 0x170 | data | English | United States | 0.5407608695652174 |
RT_STRING | 0x23060 | 0x7c | data | English | United States | 0.6774193548387096 |
RT_ACCELERATOR | 0x22ee0 | 0x10 | data | English | United States | 1.25 |
RT_GROUP_ICON | 0x17978 | 0x84 | data | English | United States | 0.6590909090909091 |
RT_GROUP_ICON | 0x22e08 | 0x84 | data | English | United States | 0.6515151515151515 |
RT_MANIFEST | 0x230e0 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | SetPriorityClass, GetCurrentProcess, SetProcessInformation, GetProcessId, K32EmptyWorkingSet, Sleep, CloseHandle, MultiByteToWideChar, FormatMessageW, LocalFree, WideCharToMultiByte, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlCaptureContext |
MSVCP140.dll | ??0?$basic_ios@_WU?$char_traits@_W@std@@@std@@IEAA@XZ, ??0?$basic_iostream@_WU?$char_traits@_W@std@@@std@@QEAA@PEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@@Z, ??1?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAGXZ, ?xsgetn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JPEA_W_J@Z, ?xsputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JPEB_W_J@Z, ?sync@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ??1?$basic_iostream@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ?_Xlength_error@std@@YAXPEBD@Z, ?uncaught_exception@std@@YA_NXZ, ?setbuf@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAAPEAV12@PEA_W_J@Z, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ??0?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAA@XZ |
RPCRT4.dll | RpcBindingFromStringBindingW, RpcStringBindingComposeW, RpcBindingFree, NdrClientCall3, NdrServerCallAll, NdrServerCall2, RpcStringFreeW |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | __std_exception_copy, __std_exception_destroy, __std_terminate, __C_specific_handler, _CxxThrowException, memset, __current_exception_context, __current_exception, memcpy, memmove |
api-ms-win-crt-runtime-l1-1-0.dll | _crt_atexit, terminate, _cexit, _register_onexit_function, _initialize_onexit_table, _c_exit, exit, _initterm_e, _initterm, _get_wide_winmain_command_line, _initialize_wide_environment, _configure_wide_argv, _set_app_type, _seh_filter_exe, _invalid_parameter_noinfo_noreturn, _register_thread_local_exe_atexit_callback, _exit |
api-ms-win-crt-heap-l1-1-0.dll | free, _callnewh, _set_new_mode, malloc |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-stdio-l1-1-0.dll | _set_fmode, __p__commode |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Target ID: | 0 |
Start time: | 10:07:07 |
Start date: | 28/10/2024 |
Path: | C:\Users\user\Desktop\IdleScheduleEventAction.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee700000 |
File size: | 131'584 bytes |
MD5 hash: | 1ED391E2331503D76E6EA51B3F51C2C8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |