Analysis Report
Overview
General Information |
|---|
| Joe Sandbox Version: | 20.0.0 |
| Analysis ID: | 450586 |
| Start time: | 10:50:59 |
| Joe Sandbox Product: | Cloud |
| Start date: | 05.12.2017 |
| Overall analysis duration: | 0h 4m 9s |
| Hypervisor based Inspection enabled: | false |
| Report type: | full |
| Sample file name: | uRL6wUtNbn.exe |
| Cookbook file name: | default.jbs |
| Analysis system description: | Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43) |
| Number of analysed new started processes analysed: | 6 |
| Number of new started drivers analysed: | 0 |
| Number of existing processes analysed: | 0 |
| Number of existing drivers analysed: | 0 |
| Number of injected processes analysed: | 0 |
| Technologies |
|
| Detection: | MAL |
| Classification: | mal48.winEXE@1/0@0/0 |
| HCA Information: |
|
| EGA Information: |
|
| HDC Information: |
|
| Cookbook Comments: |
|
| Warnings: | Show All
|
Detection |
|---|
| Strategy | Score | Range | Reporting | Detection | |
|---|---|---|---|---|---|
| Threshold | 48 | 0 - 100 | Report FP / FN | ||
Confidence |
|---|
| Strategy | Score | Range | Further Analysis Required? | Confidence | |
|---|---|---|---|---|---|
| Threshold | 5 | 0 - 5 | false | ||
Classification |
|---|
Signature Overview |
|---|
Click to jump to signature section
AV Detection: |
|---|
| Antivirus detection for submitted file | Show sources | ||
| Source: uRL6wUtNbn.exe | virustotal: | Perma Link | ||
Data Obfuscation: |
|---|
| Uses code obfuscation techniques (call, push, ret) | Show sources | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_00406778 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_0040634B | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_00403194 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_00401078 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_0040606B | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_004017B3 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_00404941 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_00405377 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_00401078 | |
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Code function: | 1_2_004048DC | |
System Summary: |
|---|
| Classification label | Show sources | ||
| Source: classification engine | Classification label: | ||
| PE file has an executable .text section and no other executable section | Show sources | ||
| Source: uRL6wUtNbn.exe | Static PE information: | ||
| Reads software policies | Show sources | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Key opened: | ||
| Sample is known by Antivirus (Virustotal or Metascan) | Show sources | ||
| Source: uRL6wUtNbn.exe | Virustotal: | ||
| PE file has an executable .text section which is very likely to contain packed code (zlib compression ratio < 0.3) | Show sources | ||
| Source: uRL6wUtNbn.exe | Static PE information: | ||
HIPS / PFW / Operating System Protection Evasion: |
|---|
| May try to detect the Windows Explorer process (often used for injection) | Show sources | ||
| Source: uRL6wUtNbn.exe | Binary or memory string: | ||
| Source: uRL6wUtNbn.exe | Binary or memory string: | ||
| Source: uRL6wUtNbn.exe | Binary or memory string: | ||
Anti Debugging: |
|---|
| Checks if the current process is being debugged | Show sources | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Process queried: | ||
| Program does not show much activity (idle) | Show sources | ||
| Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: | ||
Malware Analysis System Evasion: |
|---|
| Contains long sleeps (>= 3 min) | Show sources | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe | Thread delayed: | ||
| May sleep (evasive loops) to hinder dynamic analysis | Show sources | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe TID: 3444 | Thread sleep time: | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe TID: 3436 | Thread sleep time: | ||
| Source: C:\Users\user\Desktop\uRL6wUtNbn.exe TID: 3444 | Thread sleep time: | ||
| Program does not show much activity (idle) | Show sources | ||
| Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: | ||
Simulations |
|---|
Behavior and APIs |
|---|
| Time | Type | Description |
|---|---|---|
| 10:53:18 | API Interceptor | 1x Sleep call for process: uRL6wUtNbn.exe modified from: 30000ms to: 500ms |
Antivirus Detection |
|---|
Initial Sample |
|---|
| Source | Detection | Cloud | Link |
|---|---|---|---|
| 75% | virustotal | Browse |
Dropped Files |
|---|
| No Antivirus matches |
|---|
Domains |
|---|
| No Antivirus matches |
|---|
Yara Overview |
|---|
Initial Sample |
|---|
| No yara matches |
|---|
PCAP (Network Traffic) |
|---|
| No yara matches |
|---|
Dropped Files |
|---|
| No yara matches |
|---|
Memory Dumps |
|---|
| No yara matches |
|---|
Unpacked PEs |
|---|
| No yara matches |
|---|
Joe Sandbox View / Context |
|---|
Screenshot |
|---|
Startup |
|---|
|
Created / dropped Files |
|---|
| No created / dropped files found |
|---|
Contacted Domains/Contacted IPs |
|---|
Static File Info |
|---|
General | |
|---|---|
| File type: | |
| TrID: |
|
| File name: | uRL6wUtNbn.exe |
| File size: | 80384 |
| MD5: | 52540f430c060a7e5753c999891514a1 |
| SHA1: | 041ffae5b7aeb43377ce81b63a9a6ef8ab832d5f |
| SHA256: | 256946520472b89a39e066ff88560a8c1967fd1d46ba888129856046c5a012be |
| SHA512: | 3a437b0ab306a31b0e12d1086a5cdf5bff3c209f376d5833b33b510c06c15ea1612628a23e9a585bd485f3c3dd82a69126235b7cccf3e681af343f36f4750739 |
| File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,v.{B%.{B%.{B%..,%.{B%..:%.{B%Rich.{B%........PE..L......Y.....................b....................@........................ |
File Icon |
|---|
Static PE Info |
|---|
General | |
|---|---|
| Entrypoint: | 0x408bd1 |
| Entrypoint Section: | .text |
| Digitally signed: | false |
| Imagebase: | 0x400000 |
| Subsystem: | windows gui |
| Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED |
| DLL Characteristics: | NO_SEH |
| Time Stamp: | 0x59A1C217 [Sat Aug 26 18:46:47 2017 UTC] |
| TLS Callbacks: | |
| CLR (.Net) Version: | |
| OS Version Major: | 4 |
| OS Version Minor: | 0 |
| File Version Major: | 4 |
| File Version Minor: | 0 |
| Subsystem Version Major: | 4 |
| Subsystem Version Minor: | 0 |
| Import Hash: | 128ba6233557df307ea00583ae9ec636 |
Entrypoint Preview |
|---|
| Instruction |
|---|
| call 00007F526D3FA471h |
| push eax |
| call 00007F526D3FA3F4h |
| jmp dword ptr [0040F048h] |
| jmp dword ptr [0040F028h] |
| jmp dword ptr [0040F04Ch] |
| jmp dword ptr [0040F038h] |
| jmp dword ptr [0040F010h] |
| test dword ptr [esi+edi*8+7589FEFEh], edi |
| and al, 04h |
| jne 00007F526D3FA425h |
| add byte ptr [esi-39h], ah |
| add byte ptr [ebp-77h], al |
| mov dword ptr [eax], F7FF0B00h |
| or byte ptr [esi+7BC78945h], dh |
| shr dword ptr [eax+78h], 45h |
| pop ebx |
| add byte ptr [esi-76h], ah |
| pcmpgtd mm4, mm1 |
| or byte ptr [esp+eax*4+66082FC7h], al |
Data Directories |
|---|
| Name | Virtual Address | Virtual Size | Is in Section |
|---|---|---|---|
| IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf178 | 0xb4 | .rdata |
| IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
|---|---|---|---|---|---|---|---|---|
| .text | 0x1000 | 0xd2e2 | 0xd400 | False | 0.826650943396 | data | 6.53318347591 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
| .rdata | 0xf000 | 0xa0d | 0xc00 | False | 0.438802083333 | data | 4.64008190649 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
| .data | 0x10000 | 0x54e9 | 0x5600 | False | 0.768577398256 | data | 5.53777830882 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
Imports |
|---|
| DLL | Import |
|---|---|
| KERNEL32.DLL | SystemTimeToFileTime, VirtualLock, InitializeCriticalSection, GetAtomNameW, Sleep, GetVersionExA, GetEnvironmentVariableW, GetCPInfo, SetCurrentDirectoryW, GlobalReAlloc, GetCommandLineW, GetOEMCP, GetUserDefaultUILanguage, GetCurrentProcessId, GetProcAddress, SetConsoleCtrlHandler, WriteFile, InterlockedExchangeAdd, CreateThread, GetModuleHandleA, GetPrivateProfileStringW |
| USER32.DLL | GetTopWindow, TranslateAcceleratorW, DrawEdge, WaitForInputIdle, UpdateWindow, GetKeyState, CharLowerBuffW, WindowFromDC, GetWindowRgnBox, GetDlgItemTextW, LoadCursorFromFileW, SetDlgItemInt, wsprintfW, SendMessageW, CopyIcon, MapWindowPoints, GetWindowRgn, AppendMenuW, OemToCharBuffW, DrawStateW, GetNextDlgGroupItem, TrackPopupMenu, IsWindow, ValidateRgn, IsMenu, GetQueueStatus, IsDialogMessageW, ScrollDC, LoadBitmapW, OpenClipboard, GetPropW, GetOpenClipboardWindow |
| SHELL32.DLL | SHGetFileInfoW, DragFinish |
| GDI32.DLL | EndPage, CreateDCW, AngleArc, DeleteObject, SetWindowExtEx, RealizePalette, RectInRegion, CreatePolygonRgn, OffsetWindowOrgEx, SetBitmapDimensionEx, ExtTextOutW, BeginPath, SetPixelV, SelectClipRgn, GetViewportExtEx, GetObjectType, SetColorAdjustment, SelectClipPath |
| ADVAPI32.DLL | CryptReleaseContext, RegDeleteKeyW, RegEnumValueW |
| OLE32.DLL | CLSIDFromString, StringFromGUID2, CreateBindCtx, CoCreateInstance |
| COMDLG32.DLL | GetSaveFileNameW, GetOpenFileNameW, ChooseFontW |
| SHLWAPI.DLL | PathRemoveExtensionW, PathIsUNCW, PathFindExtensionW |
Network Behavior |
|---|
| No network behavior found |
|---|
Code Manipulations |
|---|
Statistics |
|---|
CPU Usage |
|---|
Click to jump to process
Memory Usage |
|---|
Click to jump to process
System Behavior |
|---|
General |
|---|
| Start time: | 10:53:17 |
| Start date: | 05/12/2017 |
| Path: | C:\Users\user\Desktop\uRL6wUtNbn.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x77390000 |
| File size: | 80384 bytes |
| MD5 hash: | 52540F430C060A7E5753C999891514A1 |
| Programmed in: | C, C++ or other language |
| Reputation: | low |
Disassembly |
|---|
Code Analysis |
|---|
Execution Graph |
|---|
| Execution Coverage: | 3.1% |
| Dynamic/Decrypted Code Coverage: | 0% |
| Signature Coverage: | 0% |
| Total number of Nodes: | 8 |
| Total number of Limit Nodes: | 0 |
Graph
Executed Functions |
|---|
Control-flow Graph |
|---|
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Control-flow Graph |
|---|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Control-flow Graph |
|---|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Non-executed Functions |
|---|
Control-flow Graph |
|---|
| C-Code - Quality: 58% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|