Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
norm01_upx.exe

Overview

General Information

Sample name:norm01_upx.exe
Analysis ID:1592450
MD5:72cccc6d4340e5d47bc309acb435015b
SHA1:976264bd86b01349002f1266f76b472d0e460ff3
SHA256:22c0c945d15f026c0b2e7766f70cf64c451560d3940adde0d8fc31ac448c967a
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

AI detected suspicious sample
Detected non-DNS traffic on DNS port
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • norm01_upx.exe (PID: 7344 cmdline: "C:\Users\user\Desktop\norm01_upx.exe" MD5: 72CCCC6D4340E5D47BC309ACB435015B)
    • conhost.exe (PID: 7352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.1% probability
Source: norm01_upx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: global trafficTCP traffic: 192.168.2.4:60844 -> 162.159.36.2:53
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: classification engineClassification label: sus22.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7352:120:WilError_03
Source: C:\Users\user\Desktop\norm01_upx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\norm01_upx.exe "C:\Users\user\Desktop\norm01_upx.exe"
Source: C:\Users\user\Desktop\norm01_upx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\norm01_upx.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\norm01_upx.exeSection loaded: libgcc_s_seh-1.dllJump to behavior
Source: C:\Users\user\Desktop\norm01_upx.exeSection loaded: libstdc++-6.dllJump to behavior
Source: norm01_upx.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: norm01_upx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: norm01_upx.exeStatic PE information: section name: UPX2
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Software Packing
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1592450 Sample: norm01_upx.exe Startdate: 16/01/2025 Architecture: WINDOWS Score: 22 10 AI detected suspicious sample 2->10 6 norm01_upx.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1592450
Start date and time:2025-01-16 06:42:15 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 41s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:norm01_upx.exe
Detection:SUS
Classification:sus22.winEXE@2/0@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.947015326740686
TrID:
  • Win64 Executable Console (202006/5) 81.26%
  • UPX compressed Win32 Executable (30571/9) 12.30%
  • Win64 Executable (generic) (12005/4) 4.83%
  • Generic Win/DOS Executable (2004/3) 0.81%
  • DOS Executable Generic (2002/1) 0.81%
File name:norm01_upx.exe
File size:58'287 bytes
MD5:72cccc6d4340e5d47bc309acb435015b
SHA1:976264bd86b01349002f1266f76b472d0e460ff3
SHA256:22c0c945d15f026c0b2e7766f70cf64c451560d3940adde0d8fc31ac448c967a
SHA512:f7067e85f3bb6bbca220ed511af717a5f56380d119c8876af51ca5913cfe2b7f821ca087d3d5ba86ff9ac3a6502a8cc2f1afe8abb679a5c614c352176b8d9995
SSDEEP:1536:Vx6V4Qkwfs13BzUlmEPHbxe+yIS7TUcWGo9Kdze4B1PK:Vx6VffW3BzUlLxbgdze4B1PK
TLSH:AC4350D07AE85C86EA68577D4196D222263DFAE087534B435A307A324F13EC27DC372E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...DLYg..........&....*.`.......@.......P.....@..........................................`... ............................
Icon Hash:90cececece8e8eb0
Entrypoint:0x14001a380
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x67594C44 [Wed Dec 11 08:24:36 2024 UTC]
TLS Callbacks:0x4001a5e0, 0x1
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:13481171c20f76fa96fc0e8f73152e78
Instruction
push ebx
push esi
push edi
push ebp
dec eax
lea esi, dword ptr [FFFFAC9Ah]
dec eax
lea edi, dword ptr [esi-00014025h]
push edi
xor ebx, ebx
xor ecx, ecx
dec eax
or ebp, FFFFFFFFh
call 00007FCB7D37C015h
add ebx, ebx
je 00007FCB7D37BFC4h
rep ret
mov ebx, dword ptr [esi]
dec eax
sub esi, FFFFFFFCh
adc ebx, ebx
mov dl, byte ptr [esi]
rep ret
dec eax
lea eax, dword ptr [edi+ebp]
cmp ecx, 05h
mov dl, byte ptr [eax]
jbe 00007FCB7D37BFE3h
dec eax
cmp ebp, FFFFFFFCh
jnbe 00007FCB7D37BFDDh
sub ecx, 04h
mov edx, dword ptr [eax]
dec eax
add eax, 04h
sub ecx, 04h
mov dword ptr [edi], edx
dec eax
lea edi, dword ptr [edi+04h]
jnc 00007FCB7D37BFB1h
add ecx, 04h
mov dl, byte ptr [eax]
je 00007FCB7D37BFD2h
dec eax
inc eax
mov byte ptr [edi], dl
sub ecx, 01h
mov dl, byte ptr [eax]
dec eax
lea edi, dword ptr [edi+01h]
jne 00007FCB7D37BFB2h
rep ret
cld
inc ecx
pop ebx
jmp 00007FCB7D37BFCAh
dec eax
inc esi
mov byte ptr [edi], dl
dec eax
inc edi
mov dl, byte ptr [esi]
add ebx, ebx
jne 00007FCB7D37BFCCh
mov ebx, dword ptr [esi]
dec eax
sub esi, FFFFFFFCh
adc ebx, ebx
mov dl, byte ptr [esi]
jc 00007FCB7D37BFA8h
lea eax, dword ptr [ecx+01h]
inc ecx
call ebx
adc eax, eax
add ebx, ebx
jne 00007FCB7D37BFCCh
mov ebx, dword ptr [esi]
dec eax
sub esi, FFFFFFFCh
adc ebx, ebx
mov dl, byte ptr [esi]
jnc 00007FCB7D37BFADh
sub eax, 03h
jc 00007FCB7D37BFD5h
shl eax, 08h
movzx edx, dl
or eax, edx
dec eax
inc esi
xor eax, FFFFFFFFh
je 00007FCB7D37BFFCh
dec eax
arpl ax, bp
lea eax, dword ptr [ecx+01h]
inc ecx
call ebx
adc ecx, ecx
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1b0000x15cUPX2
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0000x48cUPX0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b15c0x14UPX2
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1a6080x28UPX1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x140000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x150000x60000x5800941ebcda3d22abdcc3340e0e86d1a383False0.9695933948863636data7.83922180402185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX20x1b0000x10000x200a623955948e8afc09ad155cec4aecd8bFalse0.427734375data2.97686195953879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
libgcc_s_seh-1.dll_Unwind_Resume
libstdc++-6.dll__cxa_throw
msvcrt.dllexit
TimestampSource PortDest PortSource IPDest IP
Jan 16, 2025 06:43:54.992803097 CET6084453192.168.2.4162.159.36.2
Jan 16, 2025 06:43:54.997631073 CET5360844162.159.36.2192.168.2.4
Jan 16, 2025 06:43:54.997701883 CET6084453192.168.2.4162.159.36.2
Jan 16, 2025 06:43:55.002542973 CET5360844162.159.36.2192.168.2.4
Jan 16, 2025 06:43:55.468314886 CET6084453192.168.2.4162.159.36.2
Jan 16, 2025 06:43:55.473406076 CET5360844162.159.36.2192.168.2.4
Jan 16, 2025 06:43:55.473460913 CET6084453192.168.2.4162.159.36.2
TimestampSource PortDest PortSource IPDest IP
Jan 16, 2025 06:43:54.992259979 CET5365248162.159.36.2192.168.2.4
Jan 16, 2025 06:43:55.660686970 CET53529161.1.1.1192.168.2.4

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:00:43:09
Start date:16/01/2025
Path:C:\Users\user\Desktop\norm01_upx.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\norm01_upx.exe"
Imagebase:0x7ff7d4420000
File size:58'287 bytes
MD5 hash:72CCCC6D4340E5D47BC309ACB435015B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:00:43:09
Start date:16/01/2025
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly