Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:22.0.0
Analysis ID:609630
Start time:14:25:30
Joe Sandbox Product:Cloud
Start date:16.07.2018
Overall analysis duration:0h 8m 57s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:ZrfRZCzOXC.exe
Cookbook file name:sysmon.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:1
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
  • GSI enabled (Java)
Analysis stop reason:Timeout
Detection:MAL
Classification:mal72.evad.winEXE@6/3@11/3
EGA Information:
  • Successful, ratio: 33.3%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Correcting counters for adjusted boot time
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Detection

StrategyScoreRangeReportingDetection
Threshold720 - 100Report FP / FNmalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior



Signature Overview

Click to jump to signature section


AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: ZrfRZCzOXC.exevirustotal: Detection: 73%Perma Link

Networking:

barindex
Connects to IPs without corresponding DNS lookupsShow sources
Source: unknownTCP traffic detected without corresponding DNS query: 23.42.27.27
Uses a known web browser user agent for HTTP communicationShow sources
Source: global trafficHTTP traffic detected: GET /ncsi.txt HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like GeckoHost: www.msftncsi.com
Source: global trafficHTTP traffic detected: GET /ncsi.txt HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like GeckoHost: www.msftncsi.com
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /ncsi.txt HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like GeckoHost: www.msftncsi.com
Source: global trafficHTTP traffic detected: GET /ncsi.txt HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like GeckoHost: www.msftncsi.com
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: 8.8.8.8.in-addr.arpa
Urls found in memory or binary dataShow sources
Source: explorer.exe, 00000002.00000000.10291306634.04E6A000.00000004.sdmpString found in binary or memory: file:///C:/
Source: explorer.exe, 00000002.00000000.10291306634.04E6A000.00000004.sdmpString found in binary or memory: file:///C:/:y
Source: explorer.exe, 00000002.00000000.10285365277.02BB0000.00000004.sdmpString found in binary or memory: file:///C:/Program%20Files/AutoIt3/AutoIt3.exe
Source: explorer.exe, 00000002.00000000.10285365277.02BB0000.00000004.sdmpString found in binary or memory: file:///C:/Program%20Files/AutoIt3/AutoIt3.exeZH
Source: explorer.exe, 00000002.00000000.10285365277.02BB0000.00000004.sdmpString found in binary or memory: file:///C:/Program%20Files/AutoIt3/AutoIt3.exeoH
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: file:///C:/Program%20Files/Common%20Files/Adobe/ARM/1.0/AdobeARM.exe
Source: explorer.exe, 00000002.00000000.10291033327.04CFF000.00000004.sdmpString found in binary or memory: file:///C:/Users/user/AppData/Roaming/Microsoft/Internet%20Explorer/Quick%20Launch/User%20Pinn
Source: explorer.exe, 00000002.00000000.10291223183.04DD7000.00000004.sdmpString found in binary or memory: file:///C:/Windows/explorer.exe
Source: explorer.exe, 00000002.00000000.10291223183.04DD7000.00000004.sdmpString found in binary or memory: file:///C:/Windows/explorer.exe%_%
Source: explorer.exe, 00000002.00000000.10283103260.01F86000.00000004.sdmpString found in binary or memory: file:///C:/jbxinitvm.au3
Source: explorer.exe, 00000002.00000000.10283103260.01F86000.00000004.sdmpString found in binary or memory: file:///C:/jbxinitvm.au39
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: file:///C:/jbxinitvm.au3ta
Source: ZrfRZCzOXC.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: ZrfRZCzOXC.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: ZrfRZCzOXC.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: ZrfRZCzOXC.exeString found in binary or memory: http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
Source: ZrfRZCzOXC.exeString found in binary or memory: http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
Source: explorer.exe, 00000002.00000000.10291223183.04DD7000.00000004.sdmpString found in binary or memory: http://java
Source: explorer.exe, 00000002.00000000.10291223183.04DD7000.00000004.sdmpString found in binary or memory: http://java.com
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: http://java.com/
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: http://java.com/5A4
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: http://java.com/F2E
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: http://java.com/fau
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: http://java.com/help
Source: explorer.exe, 00000002.00000000.10290767042.04C90000.00000004.sdmpString found in binary or memory: http://java.com/helphttp://java.com/help
Source: explorer.exe, 00000002.00000000.10285365277.02BB0000.00000004.sdmpString found in binary or memory: http://java.com/http://java.com/
Source: explorer.exe, 00000002.00000000.10291223183.04DD7000.00000004.sdmpString found in binary or memory: http://java.comm
Source: explorer.exe, 00000002.00000000.10291223183.04DD7000.00000004.sdmpString found in binary or memory: http://java.sun.com
Source: ZrfRZCzOXC.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: ZrfRZCzOXC.exeString found in binary or memory: http://ocsp.thawte.com0
Source: ZrfRZCzOXC.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: ZrfRZCzOXC.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: ZrfRZCzOXC.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: explorer.exe, 00000002.00000000.10283123038.01FB0000.00000008.sdmpString found in binary or memory: http://www.%s.comPA
Source: explorer.exe, 00000002.00000000.10290767042.04C90000.00000004.sdmpString found in binary or memory: http://www.ado
Source: ZrfRZCzOXC.exeString found in binary or memory: http://www.example.com/0
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: https://aka.ms/WEF.
Source: explorer.exe, 00000002.00000000.10291539017.05220000.00000008.sdmpString found in binary or memory: https://en.wikipedia.org/wiki/XSLT/Muenchian_grouping
Source: explorer.exe, 00000002.00000000.10281883975.0051C000.00000004.sdmpString found in binary or memory: https://github.com/SwiftOnSecurity/sysmon-config
Source: ZrfRZCzOXC.exeString found in binary or memory: https://secure.comodo.net/CPS0C

System Summary:

barindex
Contains functionality to call native functionsShow sources
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00401B18 CreateFileMappingW,MapViewOfFile,WaitForSingleObject,NtTerminateProcess,1_2_00401B18
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00401BC5 NtFreeVirtualMemory,WaitForSingleObject,NtTerminateProcess,1_2_00401BC5
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00401C19 NtFreeVirtualMemory,WaitForSingleObject,NtTerminateProcess,1_2_00401C19
PE file has an invalid certificateShow sources
Source: ZrfRZCzOXC.exeStatic PE information: invalid certificate
Reads the hosts fileShow sources
Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Sample file is different than original file name gathered from version infoShow sources
Source: ZrfRZCzOXC.exe, 00000001.00000002.10346790896.001D0000.00000008.sdmpBinary or memory string: OriginalFilenameodbcint.dll.muij% vs ZrfRZCzOXC.exe
Tries to load missing DLLsShow sources
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeSection loaded: vdbcbcp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wshtcpip.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exeSection loaded: vdbcbcp.dllJump to behavior
Classification labelShow sources
Source: classification engineClassification label: mal72.evad.winEXE@6/3@11/3
Creates files inside the user directoryShow sources
Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehvJump to behavior
Reads ini filesShow sources
Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Sample is known by AntivirusShow sources
Source: ZrfRZCzOXC.exevirustotal: Detection: 73%
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\ZrfRZCzOXC.exe 'C:\Users\user\Desktop\ZrfRZCzOXC.exe'
Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {353C8FCD-E7D7-4901-A1FC-CC4E5F09B639} S-1-5-21-312302014-279660585-3511680526-1004:computer\user:Interactive:[1]
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start '' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe'
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe'
Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start '' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe'Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe' Jump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72eb61e0-8672-4303-9175-f2e4c68b2e7c}\InProcServer32Jump to behavior
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected

Data Obfuscation:

barindex
PE file contains an invalid checksumShow sources
Source: dtevaaaa.exe.2.drStatic PE information: real checksum: 0x43dfb should be: 0x495b2
Source: ZrfRZCzOXC.exeStatic PE information: real checksum: 0x43dfb should be: 0x495b2
PE file contains sections with non-standard namesShow sources
Source: ZrfRZCzOXC.exeStatic PE information: section name: .xml
Source: dtevaaaa.exe.2.drStatic PE information: section name: .xml
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00403E48 push edi; iretd 1_2_00403E4B
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00405E08 push 024F7F4Bh; iretd 1_2_00405E0D
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_004038C9 push 270B9D80h; ret 1_2_004038FE
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_004046F1 push cs; ret 1_2_004046F2
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00405094 push cs; ret 1_2_004050AE
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00405D40 push 2217E8B9h; ret 1_2_00405D45
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00405141 push cs; ret 1_2_00405142
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00406754 push edx; ret 1_2_00406755
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_0040111E push esp; retf 1_2_00401147
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_0040392D push edx; ret 1_2_0040393C
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_0040513F push edx; ret 1_2_00405140
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00403FC9 push ss; iretd 1_2_00403FD4
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_004037E8 push cs; ret 1_2_004037FA
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_004029FA push eax; ret 1_2_00402A90
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_004045FF push edx; ret 1_2_00404600
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00404981 push cs; ret 1_2_00404982
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeCode function: 1_2_00405B9C push ds; iretd 1_2_00405B9D

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exeJump to dropped file

Boot Survival:

barindex
Creates a start menu entry (Start Menu\Programs\Startup)Show sources
Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chviwehv.lnkJump to behavior
Stores files to the Windows start menu directoryShow sources
Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chviwehv.lnkJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect sandboxes and other dynamic analysis tools (process name or module)Show sources
Source: explorer.exe, 00000002.00000000.10281837375.004ED000.00000004.sdmpBinary or memory string: \\192.168.1.2\ALL\PROCEXP.EXES
Contains capabilities to detect virtual machinesShow sources
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Disk\Enum name: 0Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)Show sources
Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 555Jump to behavior
Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 521Jump to behavior
Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 437Jump to behavior
Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 420Jump to behavior
Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 529Jump to behavior
Queries a list of all running processesShow sources
Source: C:\Windows\explorer.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging:

barindex
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Windows\System32\taskeng.exeSystem information queried: KernelDebuggerInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Benign windows process drops PE filesShow sources
Source: C:\Windows\explorer.exeFile created: dtevaaaa.exe.2.drJump to dropped file
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\explorer.exeNetwork Connect: 23.10.249.17 80Jump to behavior
Maps a DLL or memory area into another processShow sources
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeSection loaded: unknown target pid: 1376 protection: execute and read and writeJump to behavior
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start '' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe'Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe' Jump to behavior
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: explorer.exe, 00000002.00000000.10282089541.00860000.00000002.sdmp, taskeng.exe, 00000003.00000002.10574796883.00E00000.00000002.sdmpBinary or memory string: Progman
Source: explorer.exe, 00000002.00000000.10282089541.00860000.00000002.sdmp, taskeng.exe, 00000003.00000002.10574796883.00E00000.00000002.sdmpBinary or memory string: Program Manager
Source: explorer.exe, 00000002.00000000.10282089541.00860000.00000002.sdmp, taskeng.exe, 00000003.00000002.10574796883.00E00000.00000002.sdmpBinary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000002.00000000.10281837375.004ED000.00000004.sdmpBinary or memory string: Progmanp

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Users\user\Desktop\ZrfRZCzOXC.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exeQueries volume information: C:\ VolumeInformationJump to behavior
Queries the cryptographic machine GUIDShow sources
Source: C:\Windows\System32\taskeng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 609630 Sample: ZrfRZCzOXC.exe Startdate: 16/07/2018 Architecture: WINDOWS Score: 72 24 ukcompany.top 2->24 26 ukcompany.pw 2->26 28 12 other IPs or domains 2->28 36 Multi AV Scanner detection for submitted file 2->36 38 Tries to detect sandboxes and other dynamic analysis tools (process name or module) 2->38 8 ZrfRZCzOXC.exe 2->8         started        11 taskeng.exe 1 2->11         started        signatures3 process4 signatures5 40 Maps a DLL or memory area into another process 8->40 13 explorer.exe 4 4 8->13 injected 18 cmd.exe 11->18         started        process6 dnsIp7 30 a1961.g2.akamai.net 23.10.249.17, 49171, 80 AKAMAI-ASN1US United States 13->30 32 192.168.1.255 unknown unknown 13->32 34 192.168.1.81, 49164, 49168, 49171 unknown unknown 13->34 22 C:\Users\user\AppData\...\dtevaaaa.exe, PE32 13->22 dropped 42 System process connects to network (likely due to code injection or exploit) 13->42 44 Benign windows process drops PE files 13->44 20 dtevaaaa.exe 18->20         started        file8 signatures9 process10

Simulations

Behavior and APIs

TimeTypeDescription
14:26:22API Interceptor602x Sleep call for process: explorer.exe modified
14:26:52Task SchedulerRun new task: Opera scheduled Autoupdate 211371202 path: C:\Windows\system32\cmd.exe s>/c start "" "C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe"
14:30:00API Interceptor3x Sleep call for process: taskeng.exe modified
14:30:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chviwehv.lnk

Antivirus Detection

Initial Sample

SourceDetectionScannerLabelLink
ZrfRZCzOXC.exe74%virustotalBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
a1621.g.akamai.net0%virustotalBrowse
a1363.dscg.akamai.net0%virustotalBrowse
a1961.g2.akamai.net0%virustotalBrowse

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshots

windows-stand

Startup

  • System is w7_1
  • ZrfRZCzOXC.exe (PID: 2872 cmdline: 'C:\Users\user\Desktop\ZrfRZCzOXC.exe' MD5: 2C99759A02CA32D1A7E8AFA09130633F)
    • explorer.exe (PID: 1376 cmdline: C:\Windows\Explorer.EXE MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
  • taskeng.exe (PID: 1916 cmdline: taskeng.exe {353C8FCD-E7D7-4901-A1FC-CC4E5F09B639} S-1-5-21-312302014-279660585-3511680526-1004:computer\user:Interactive:[1] MD5: 4F2659160AFCCA990305816946F69407)
    • cmd.exe (PID: 2520 cmdline: C:\Windows\system32\cmd.exe /c start '' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
      • dtevaaaa.exe (PID: 3044 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe' MD5: 2C99759A02CA32D1A7E8AFA09130633F)
  • cleanup

Created / dropped Files

C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chviwehv.lnk
Process:C:\Windows\explorer.exe
File Type:MS Windows shortcut
Size (bytes):1026
Entropy (8bit):4.423097878654493
Encrypted:false
MD5:F0EA0125513E3E79F55D3D7964374E72
SHA1:98C214D021AAA5638093E52A47ACF73A33943F14
SHA-256:110D2DFD5612584042F3775FC33FE5C88CEF14D040F3796983F5945CDC8382DC
SHA-512:AC61C5EA05A522D3B9B0DA82CE1F42DE388DC16466A509DA026ADB3B3B52D30AAD80EA475D0A900D7566324526BE7A21F8C5A4039E2A7963F877ECE4B84E2CAF
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe
Process:C:\Windows\explorer.exe
File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Size (bytes):242888
Entropy (8bit):3.770967533024012
Encrypted:false
MD5:2C99759A02CA32D1A7E8AFA09130633F
SHA1:DDF98971664EB7B554C86B4AB2E2BA7D469F893C
SHA-256:B65806521AA662BFF2C655C8A7A3B6C8E598D709E35F3390DF880A70C3FDED40
SHA-512:89DF4E78C583F409BEB3DDE03A4E439BA52676DC8ECACD02271D2C30E3FC151C677446652CB7EC7A080C4C00DFC80D63FBDFB369B25DEACE1752D77B93310DCC
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe:Zone.Identifier
Process:C:\Windows\explorer.exe
File Type:ASCII text, with CRLF line terminators
Size (bytes):26
Entropy (8bit):3.9500637564362093
Encrypted:false
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:false
Reputation:low

Contacted Domains/Contacted IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
a1621.g.akamai.net23.10.249.34truefalse0%, virustotal, Browsehigh
a1363.dscg.akamai.net23.10.249.18truefalse0%, virustotal, Browsehigh
a1961.g2.akamai.net23.10.249.17truefalse0%, virustotal, Browsehigh
18.249.10.23.in-addr.arpaunknownunknowntrueunknown
www.msftncsi.comunknownunknownfalsehigh
252.0.0.224.in-addr.arpaunknownunknowntrueunknown
34.249.10.23.in-addr.arpaunknownunknowntrueunknown
17.249.10.23.in-addr.arpaunknownunknowntrueunknown
8.8.8.8.in-addr.arpaunknownunknowntrueunknown
68.72.101.95.in-addr.arpaunknownunknowntrueunknown
ukcompany.topunknownunknowntrueunknown
ukcompany.pwunknownunknowntrueunknown
ukcompany.meunknownunknowntrueunknown

Contacted URLs

NameProcess
http://www.msftncsi.com/ncsi.txtC:\Windows\explorer.exe

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPCountryFlagASNASN NameMalicious
23.10.249.17United States
20940AKAMAI-ASN1USfalse

Private

IP
192.168.1.255
192.168.1.81

Static File Info

General

File type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Entropy (8bit):3.770967533024012
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.92%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Clipper DOS Executable (2020/12) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:ZrfRZCzOXC.exe
File size:242888
MD5:2c99759a02ca32d1a7e8afa09130633f
SHA1:ddf98971664eb7b554c86b4ab2e2ba7d469f893c
SHA256:b65806521aa662bff2c655c8a7a3b6c8e598d709e35f3390df880a70c3fded40
SHA512:89df4e78c583f409beb3dde03a4e439ba52676dc8ecacd02271d2c30e3fc151c677446652cb7ec7a080c4c00dfc80d63fbdfb369b25deace1752d77b93310dcc
File Content Preview:MZ......................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

File Icon

Static PE Info

General

Entrypoint:0x404773
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
Time Stamp:0x56DC0E61 [Sun Mar 6 11:02:57 2016 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:2f71d1b0b8c82759171e7374068065a9

Authenticode Signature

Signature Valid:false
Signature Issuer:CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
Signature Validation Error:No signature was present in the subject
Error Number:-2146762496
Not Before, Not After
  • 5/9/2013 2:00:00 AM 5/9/2028 1:59:59 AM
Subject Chain
  • CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
Version:3
Thumbprint:B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial:2E7C87CC0E934A52FE94FD1CB7CD34AF

Entrypoint Preview

Instruction
push ebp
xor ebp, 6Ah
mov ebp, esp
add esp, FFFFFF9Ch
push 00000011h
push 00423471h
push 00423464h
lea eax, dword ptr [004250E0h]
call dword ptr [eax]
jmp 5B559529h
add byte ptr [eax], al
add byte ptr [edx+11h], ch
push 00423471h
push 00423464h
lea eax, dword ptr [004250E0h]
call dword ptr [eax]
push 00000011h
push 00423471h
push 00423464h
lea eax, dword ptr [004250E0h]
call dword ptr [eax]
jmp 5B5594F9h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push 00000011h
push 00423471h
push 00423464h
lea eax, dword ptr [004250E0h]
call dword ptr [eax]
jmp 5B55ABC9h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push 00000011h
push 00423471h
push 00423464h
lea eax, dword ptr [004250E0h]
call dword ptr [eax]
push 00000011h
push 00423471h
push 00423464h
lea eax, dword ptr [004250E0h]
call dword ptr [eax]
jmp 5B557A17h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x250e80x8c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x280000x1693e.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x396000x1ec8.rsrc
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x250000xe8.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x13000x60.text
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x20e9c0x21000False0.313306403883ump; data3.9974479969IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.itext0x220000x8000x800False0.01123046875ump; data0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x230000x4820x600False0.0703125ump; data0.574709138496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.bss0x240000x10000x0False0ump; empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.idata0x250000x6600x800False0.41015625ump; data4.19350746654IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.tls0x260000x10000x0False0ump; empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.xml0x270000x180x200False0.02734375ump; data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x280000x1693e0x16a00False0.0472634668508ump; data1.84043873219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
TRED0x281000x6000ump; data
RT_ICON0x2e1160x10828ump; data
RT_GROUP_ICON0x2e1000x16ump; MS Windows icon resource - 1 icon

Imports

DLLImport
odbctrac.dllTraceSQLCancel, TraceSQLFetch, TraceSQLBindCol
dbnmpntw.dllConnectionVer, ConnectionError, ConnectionRead, ConnectionClose, ConnectionWrite
user32.dllPeekMessageA, wsprintfW, GetDlgItemTextW, GetMessageW, GetClassInfoW, DialogBoxParamW, CharToOemW, IsIconic, LoadStringW, MessageBoxA, PostMessageW, IsCharLowerA
wtsapi32.dllWTSEnumerateProcessesA, WTSQuerySessionInformationA, WTSOpenServerW, WTSVirtualChannelOpen, WTSVirtualChannelQuery, WTSEnumerateSessionsW, WTSFreeMemory, WTSVirtualChannelPurgeInput, WTSVirtualChannelClose, WTSQueryUserToken, WTSUnRegisterSessionNotification
kernel32.dllCreateFileA, CreateDirectoryW, GetDiskFreeSpaceA, GetCommandLineA, LoadLibraryA, lstrcmpi, CreateSemaphoreA, GetProcAddress, GetFileAttributesA, GetStartupInfoA, GetDriveTypeA, GetFileSize, GetLastError, GetModuleFileNameA, ReadFile, CreateFileMappingA, HeapAlloc, GetLocaleInfoA, CopyFileW, SetCurrentDirectoryW, GetModuleHandleA, QueryDosDeviceA

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Jul 16, 2018 14:26:24.905462027 MESZ5517553192.168.1.818.8.8.8
Jul 16, 2018 14:26:24.916542053 MESZ6547653192.168.1.818.8.8.8
Jul 16, 2018 14:26:24.917490959 MESZ5288253192.168.1.818.8.8.8
Jul 16, 2018 14:26:24.932554960 MESZ53551758.8.8.8192.168.1.81
Jul 16, 2018 14:26:24.940689087 MESZ53654768.8.8.8192.168.1.81
Jul 16, 2018 14:26:24.943067074 MESZ53528828.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.160932064 MESZ4984153192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.206634998 MESZ53498418.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.230596066 MESZ5366753192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.266649008 MESZ53536678.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.386177063 MESZ5174853192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.426289082 MESZ53517488.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.429572105 MESZ5319953192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.466010094 MESZ53531998.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.278844118 MESZ5413453192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.288492918 MESZ5958253192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.302697897 MESZ6294153192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.312007904 MESZ53541348.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.313796997 MESZ53595828.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.327927113 MESZ53629418.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.331676006 MESZ5327153192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.372262955 MESZ53532718.8.8.8192.168.1.81
Jul 16, 2018 14:26:30.408819914 MESZ4916853192.168.1.818.8.8.8
Jul 16, 2018 14:26:30.434210062 MESZ53491688.8.8.8192.168.1.81
Jul 16, 2018 14:26:36.471602917 MESZ6312953192.168.1.818.8.8.8
Jul 16, 2018 14:26:36.496046066 MESZ53631298.8.8.8192.168.1.81
Jul 16, 2018 14:26:57.929929018 MESZ6545753192.168.1.818.8.8.8
Jul 16, 2018 14:26:57.965293884 MESZ53654578.8.8.8192.168.1.81
Jul 16, 2018 14:26:57.984416008 MESZ6206253192.168.1.818.8.8.8
Jul 16, 2018 14:26:58.009413958 MESZ53620628.8.8.8192.168.1.81
Jul 16, 2018 14:26:58.012358904 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:26:58.024348974 MESZ804917123.10.249.17192.168.1.81
Jul 16, 2018 14:26:58.024512053 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:26:58.025387049 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:26:58.036992073 MESZ804917123.10.249.17192.168.1.81
Jul 16, 2018 14:26:58.037357092 MESZ804917123.10.249.17192.168.1.81
Jul 16, 2018 14:26:58.223989964 MESZ4964553192.168.1.818.8.8.8
Jul 16, 2018 14:26:58.255578041 MESZ53496458.8.8.8192.168.1.81
Jul 16, 2018 14:26:58.263539076 MESZ804917123.10.249.17192.168.1.81
Jul 16, 2018 14:26:58.263663054 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:26:59.330351114 MESZ5051253192.168.1.818.8.8.8
Jul 16, 2018 14:26:59.355695009 MESZ53505128.8.8.8192.168.1.81
Jul 16, 2018 14:27:00.549827099 MESZ6322953192.168.1.818.8.8.8
Jul 16, 2018 14:27:00.582915068 MESZ53632298.8.8.8192.168.1.81
Jul 16, 2018 14:27:02.985342026 MESZ5333253192.168.1.818.8.8.8
Jul 16, 2018 14:27:03.011266947 MESZ53533328.8.8.8192.168.1.81
Jul 16, 2018 14:27:14.699872971 MESZ804916423.42.27.27192.168.1.81
Jul 16, 2018 14:27:14.700234890 MESZ4916480192.168.1.8123.42.27.27
Jul 16, 2018 14:27:18.239494085 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:27:18.251550913 MESZ804917123.10.249.17192.168.1.81
Jul 16, 2018 14:27:18.479299068 MESZ804917123.10.249.17192.168.1.81
Jul 16, 2018 14:27:18.479406118 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:28:17.881387949 MESZ4917180192.168.1.8123.10.249.17
Jul 16, 2018 14:28:23.197154045 MESZ5801253192.168.1.818.8.8.8
Jul 16, 2018 14:28:23.221857071 MESZ53580128.8.8.8192.168.1.81

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Jul 16, 2018 14:26:24.905462027 MESZ5517553192.168.1.818.8.8.8
Jul 16, 2018 14:26:24.916542053 MESZ6547653192.168.1.818.8.8.8
Jul 16, 2018 14:26:24.917490959 MESZ5288253192.168.1.818.8.8.8
Jul 16, 2018 14:26:24.932554960 MESZ53551758.8.8.8192.168.1.81
Jul 16, 2018 14:26:24.940689087 MESZ53654768.8.8.8192.168.1.81
Jul 16, 2018 14:26:24.943067074 MESZ53528828.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.160932064 MESZ4984153192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.206634998 MESZ53498418.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.230596066 MESZ5366753192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.266649008 MESZ53536678.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.386177063 MESZ5174853192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.426289082 MESZ53517488.8.8.8192.168.1.81
Jul 16, 2018 14:26:26.429572105 MESZ5319953192.168.1.818.8.8.8
Jul 16, 2018 14:26:26.466010094 MESZ53531998.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.278844118 MESZ5413453192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.288492918 MESZ5958253192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.302697897 MESZ6294153192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.312007904 MESZ53541348.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.313796997 MESZ53595828.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.327927113 MESZ53629418.8.8.8192.168.1.81
Jul 16, 2018 14:26:28.331676006 MESZ5327153192.168.1.818.8.8.8
Jul 16, 2018 14:26:28.372262955 MESZ53532718.8.8.8192.168.1.81
Jul 16, 2018 14:26:30.408819914 MESZ4916853192.168.1.818.8.8.8
Jul 16, 2018 14:26:30.434210062 MESZ53491688.8.8.8192.168.1.81
Jul 16, 2018 14:26:36.471602917 MESZ6312953192.168.1.818.8.8.8
Jul 16, 2018 14:26:36.496046066 MESZ53631298.8.8.8192.168.1.81
Jul 16, 2018 14:26:57.929929018 MESZ6545753192.168.1.818.8.8.8
Jul 16, 2018 14:26:57.965293884 MESZ53654578.8.8.8192.168.1.81
Jul 16, 2018 14:26:57.984416008 MESZ6206253192.168.1.818.8.8.8
Jul 16, 2018 14:26:58.009413958 MESZ53620628.8.8.8192.168.1.81
Jul 16, 2018 14:26:58.223989964 MESZ4964553192.168.1.818.8.8.8
Jul 16, 2018 14:26:58.255578041 MESZ53496458.8.8.8192.168.1.81
Jul 16, 2018 14:26:59.330351114 MESZ5051253192.168.1.818.8.8.8
Jul 16, 2018 14:26:59.355695009 MESZ53505128.8.8.8192.168.1.81
Jul 16, 2018 14:27:00.549827099 MESZ6322953192.168.1.818.8.8.8
Jul 16, 2018 14:27:00.582915068 MESZ53632298.8.8.8192.168.1.81
Jul 16, 2018 14:27:02.985342026 MESZ5333253192.168.1.818.8.8.8
Jul 16, 2018 14:27:03.011266947 MESZ53533328.8.8.8192.168.1.81
Jul 16, 2018 14:28:23.197154045 MESZ5801253192.168.1.818.8.8.8
Jul 16, 2018 14:28:23.221857071 MESZ53580128.8.8.8192.168.1.81

ICMP Packets

TimestampSource IPDest IPChecksumCodeType
Jul 16, 2018 14:26:25.249877930 MESZ192.168.1.2192.168.1.8180ec(Port unreachable)Destination Unreachable
Jul 16, 2018 14:26:26.883707047 MESZ192.168.1.2192.168.1.8180ec(Port unreachable)Destination Unreachable

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Jul 16, 2018 14:26:24.905462027 MESZ192.168.1.818.8.8.80x4d3cStandard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:24.916542053 MESZ192.168.1.818.8.8.80x6dfaStandard query (0)252.0.0.224.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:28.278844118 MESZ192.168.1.818.8.8.80x3744Standard query (0)18.249.10.23.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:28.288492918 MESZ192.168.1.818.8.8.80xa8beStandard query (0)34.249.10.23.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:30.408819914 MESZ192.168.1.818.8.8.80x6106Standard query (0)68.72.101.95.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:57.929929018 MESZ192.168.1.818.8.8.80x90f3Standard query (0)www.msftncsi.comA (IP address)IN (0x0001)
Jul 16, 2018 14:26:57.984416008 MESZ192.168.1.818.8.8.80x4742Standard query (0)www.msftncsi.comA (IP address)IN (0x0001)
Jul 16, 2018 14:26:58.223989964 MESZ192.168.1.818.8.8.80xe650Standard query (0)ukcompany.meA (IP address)IN (0x0001)
Jul 16, 2018 14:26:59.330351114 MESZ192.168.1.818.8.8.80x8237Standard query (0)17.249.10.23.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:27:00.549827099 MESZ192.168.1.818.8.8.80x79ecStandard query (0)ukcompany.pwA (IP address)IN (0x0001)
Jul 16, 2018 14:27:02.985342026 MESZ192.168.1.818.8.8.80xdca4Standard query (0)ukcompany.topA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
Jul 16, 2018 14:26:24.932554960 MESZ8.8.8.8192.168.1.810x4d3cNo error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:24.940689087 MESZ8.8.8.8192.168.1.810x6dfaName error (3)252.0.0.224.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:26.206634998 MESZ8.8.8.8192.168.1.810x7f01No error (0)a1363.dscg.akamai.net23.10.249.18A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.206634998 MESZ8.8.8.8192.168.1.810x7f01No error (0)a1363.dscg.akamai.net23.10.249.25A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.266649008 MESZ8.8.8.8192.168.1.810x288No error (0)a1363.dscg.akamai.net23.10.249.18A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.266649008 MESZ8.8.8.8192.168.1.810x288No error (0)a1363.dscg.akamai.net23.10.249.25A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.426289082 MESZ8.8.8.8192.168.1.810xeebdNo error (0)ctldl.windowsupdate.nsatc.netctldl.windowsupdate.com.edgesuite.netCNAME (Canonical name)IN (0x0001)
Jul 16, 2018 14:26:26.426289082 MESZ8.8.8.8192.168.1.810xeebdNo error (0)a1621.g.akamai.net23.10.249.34A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.426289082 MESZ8.8.8.8192.168.1.810xeebdNo error (0)a1621.g.akamai.net23.10.249.19A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.466010094 MESZ8.8.8.8192.168.1.810x67feNo error (0)ctldl.windowsupdate.nsatc.netctldl.windowsupdate.com.edgesuite.netCNAME (Canonical name)IN (0x0001)
Jul 16, 2018 14:26:26.466010094 MESZ8.8.8.8192.168.1.810x67feNo error (0)a1621.g.akamai.net23.10.249.34A (IP address)IN (0x0001)
Jul 16, 2018 14:26:26.466010094 MESZ8.8.8.8192.168.1.810x67feNo error (0)a1621.g.akamai.net23.10.249.19A (IP address)IN (0x0001)
Jul 16, 2018 14:26:28.312007904 MESZ8.8.8.8192.168.1.810x3744No error (0)18.249.10.23.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:28.313796997 MESZ8.8.8.8192.168.1.810xa8beNo error (0)34.249.10.23.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:28.327927113 MESZ8.8.8.8192.168.1.810x6dc1No error (0)a1363.dscg.akamai.net95.101.72.68A (IP address)IN (0x0001)
Jul 16, 2018 14:26:28.327927113 MESZ8.8.8.8192.168.1.810x6dc1No error (0)a1363.dscg.akamai.net95.101.72.17A (IP address)IN (0x0001)
Jul 16, 2018 14:26:28.372262955 MESZ8.8.8.8192.168.1.810xef49No error (0)a1363.dscg.akamai.net23.10.249.18A (IP address)IN (0x0001)
Jul 16, 2018 14:26:28.372262955 MESZ8.8.8.8192.168.1.810xef49No error (0)a1363.dscg.akamai.net23.10.249.25A (IP address)IN (0x0001)
Jul 16, 2018 14:26:30.434210062 MESZ8.8.8.8192.168.1.810x6106No error (0)68.72.101.95.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:26:57.965293884 MESZ8.8.8.8192.168.1.810x90f3No error (0)www.msftncsi.comwww.msftncsi.com.edgesuite.netCNAME (Canonical name)IN (0x0001)
Jul 16, 2018 14:26:57.965293884 MESZ8.8.8.8192.168.1.810x90f3No error (0)a1961.g2.akamai.net23.10.249.17A (IP address)IN (0x0001)
Jul 16, 2018 14:26:57.965293884 MESZ8.8.8.8192.168.1.810x90f3No error (0)a1961.g2.akamai.net23.10.249.40A (IP address)IN (0x0001)
Jul 16, 2018 14:26:58.009413958 MESZ8.8.8.8192.168.1.810x4742No error (0)www.msftncsi.comwww.msftncsi.com.edgesuite.netCNAME (Canonical name)IN (0x0001)
Jul 16, 2018 14:26:58.009413958 MESZ8.8.8.8192.168.1.810x4742No error (0)a1961.g2.akamai.net23.10.249.17A (IP address)IN (0x0001)
Jul 16, 2018 14:26:58.009413958 MESZ8.8.8.8192.168.1.810x4742No error (0)a1961.g2.akamai.net23.10.249.40A (IP address)IN (0x0001)
Jul 16, 2018 14:26:58.255578041 MESZ8.8.8.8192.168.1.810xe650Name error (3)ukcompany.menonenoneA (IP address)IN (0x0001)
Jul 16, 2018 14:26:59.355695009 MESZ8.8.8.8192.168.1.810x8237No error (0)17.249.10.23.in-addr.arpaPTR (Pointer record)IN (0x0001)
Jul 16, 2018 14:27:03.011266947 MESZ8.8.8.8192.168.1.810xdca4Name error (3)ukcompany.topnonenoneA (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • www.msftncsi.com

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.1.814917123.10.249.1780C:\Windows\explorer.exe
TimestampkBytes transferredDirectionData
Jul 16, 2018 14:26:58.025387049 MESZ19OUTGET /ncsi.txt HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Host: www.msftncsi.com
Jul 16, 2018 14:26:58.037357092 MESZ20INHTTP/1.1 200 OK
Content-Length: 14
Date: Mon, 16 Jul 2018 12:26:58 GMT
Connection: keep-alive
Content-Type: text/plain
Cache-Control: max-age=30, must-revalidate
Data Raw: 4d 69 63 72 6f 73 6f 66 74 20 4e 43 53 49
Data Ascii: Microsoft NCSI
Jul 16, 2018 14:26:58.263539076 MESZ20INHTTP/1.1 200 OK
Content-Length: 14
Date: Mon, 16 Jul 2018 12:26:58 GMT
Connection: keep-alive
Content-Type: text/plain
Cache-Control: max-age=30, must-revalidate
Data Raw: 4d 69 63 72 6f 73 6f 66 74 20 4e 43 53 49
Data Ascii: Microsoft NCSI
Jul 16, 2018 14:27:18.239494085 MESZ21OUTGET /ncsi.txt HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Host: www.msftncsi.com
Jul 16, 2018 14:27:18.251550913 MESZ21INHTTP/1.1 200 OK
Content-Length: 14
Date: Mon, 16 Jul 2018 12:27:18 GMT
Connection: keep-alive
Content-Type: text/plain
Cache-Control: max-age=30, must-revalidate
Data Raw: 4d 69 63 72 6f 73 6f 66 74 20 4e 43 53 49
Data Ascii: Microsoft NCSI
Jul 16, 2018 14:27:18.479299068 MESZ22INHTTP/1.1 200 OK
Content-Length: 14
Date: Mon, 16 Jul 2018 12:27:18 GMT
Connection: keep-alive
Content-Type: text/plain
Cache-Control: max-age=30, must-revalidate
Data Raw: 4d 69 63 72 6f 73 6f 66 74 20 4e 43 53 49
Data Ascii: Microsoft NCSI


Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:14:26:21
Start date:16/07/2018
Path:C:\Users\user\Desktop\ZrfRZCzOXC.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\ZrfRZCzOXC.exe'
Imagebase:0x400000
File size:242888 bytes
MD5 hash:2C99759A02CA32D1A7E8AFA09130633F
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:26:22
Start date:16/07/2018
Path:C:\Windows\explorer.exe
Wow64 process (32bit):false
Commandline:C:\Windows\Explorer.EXE
Imagebase:0x30000
File size:2972672 bytes
MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:30:00
Start date:16/07/2018
Path:C:\Windows\System32\taskeng.exe
Wow64 process (32bit):false
Commandline:taskeng.exe {353C8FCD-E7D7-4901-A1FC-CC4E5F09B639} S-1-5-21-312302014-279660585-3511680526-1004:computer\user:Interactive:[1]
Imagebase:0xdd0000
File size:192000 bytes
MD5 hash:4F2659160AFCCA990305816946F69407
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:30:00
Start date:16/07/2018
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\cmd.exe /c start '' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe'
Imagebase:0x4a060000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:30:01
Start date:16/07/2018
Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\chviwehv\dtevaaaa.exe'
Imagebase:0x400000
File size:242888 bytes
MD5 hash:2C99759A02CA32D1A7E8AFA09130633F
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:4.3%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:100%
    Total number of Nodes:16
    Total number of Limit Nodes:0

    Graph

    execution_graph 936 401bc5 939 401bb6 936->939 937 401c7c WaitForSingleObject NtTerminateProcess 940 401c94 937->940 938 401c5e NtFreeVirtualMemory 938->937 939->936 939->937 939->938 925 401b18 926 401b23 CreateFileMappingW 925->926 927 401c7c WaitForSingleObject NtTerminateProcess 926->927 928 401b3e MapViewOfFile 926->928 930 401c94 927->930 928->927 929 401b52 928->929 929->927 931 401c19 932 401c1a 931->932 933 401c7c WaitForSingleObject NtTerminateProcess 932->933 934 401c5e NtFreeVirtualMemory 932->934 935 401c94 933->935 934->933

    Executed Functions

    Control-flow Graph

    APIs
    • CreateFileMappingW.KERNELBASE(00000000,00000000,08000004,00000000,0000020C,?), ref: 00401B33
    • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000), ref: 00401B47
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00401C84
    • NtTerminateProcess.NTDLL(000000FF,00000000), ref: 00401C8B
    Memory Dump Source
    • Source File: 00000001.00000002.10347099679.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.10347089874.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_400000_ZrfRZCzOXC.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 18 401bc5-401be1 19 401be3-401be9 18->19 20 401c3b-401c49 call 40137b 18->20 21 401c43-401c49 19->21 22 401beb-401bf3 19->22 24 401c4b-401c79 call 4017c5 NtFreeVirtualMemory 20->24 25 401c7c-401cbf WaitForSingleObject NtTerminateProcess call 40121e 20->25 21->24 21->25 26 401bf5 22->26 27 401bb6 22->27 24->25 30 401bf7 26->30 31 401bfc-401bfd 26->31 27->18 35 401bfe-401c38 30->35 31->35 35->20
    APIs
    • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000,?,00000000,?,?,?,?,?), ref: 00401C79
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00401C84
    • NtTerminateProcess.NTDLL(000000FF,00000000), ref: 00401C8B
    Memory Dump Source
    • Source File: 00000001.00000002.10347099679.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.10347089874.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_400000_ZrfRZCzOXC.jbxd

    Control-flow Graph

    APIs
    • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000,?,00000000,?,?,?,?,?), ref: 00401C79
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00401C84
    • NtTerminateProcess.NTDLL(000000FF,00000000), ref: 00401C8B
    Memory Dump Source
    • Source File: 00000001.00000002.10347099679.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.10347089874.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_400000_ZrfRZCzOXC.jbxd

    Non-executed Functions