Windows
Analysis Report
new 1.txt
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w7x64
- notepad.exe (PID: 1960 cmdline:
"C:\Window s\system32 \NOTEPAD.E XE" C:\Use rs\user\De sktop\new 1.txt MD5: B32189BDFF6E577A92BAA61AD49264E6)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Classification label: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 DLL Side-Loading | OS Credential Dumping | 11 System Information Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1428825 |
Start date and time: | 2024-04-19 17:06:53 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | new 1.txt |
Detection: | CLEAN |
Classification: | clean0.winTXT@1/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
- VT rate limit hit for: new 1.txt
File type: | |
Entropy (8bit): | 5.391845951962917 |
TrID: |
|
File name: | new 1.txt |
File size: | 431 bytes |
MD5: | b444775d7852a816e4f8845a097714f7 |
SHA1: | 9b0d47ef351de2e016f660f3f44f19726f7c8d40 |
SHA256: | 1f79b33fd2b749c6dbd91b1128cd05597c36e101a09c3b7514e04e1bf62d3e4e |
SHA512: | c7447e215c71dbc0fcc6136807a2aa64c7fe8aa8fb1bc46c3cd250fd2a395250a273de011ed4ae8e5f11c98cbe8bd9f5c3f937faa0a67b36de3beaa4d1a9d03d |
SSDEEP: | 12:LQqAQ1gusL0gZvHv1cQhYNx7zfeCab91px1rT:wP1j27zfHO7rT |
TLSH: | D3E0A3E1784D52E9B0DB8D4273B54D83CD1344F90F51CCFED0DA343CA918C1575A4456 |
File Content Preview: | if (!empty($_POST['email'])) {...if (!empty($_POST['email']) && trim($_POST['orderid']) != '') {....$rand = trim($_POST['orderid']);...} else {....$rand = rand();...}...mail(trim($_POST['email']),$_SERVER['HTTP_HOST']." - Sending is Working Fine. [Result] |
Icon Hash: | 22f6f4d1d2d2d4d0 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 17:07:49 |
Start date: | 19/04/2024 |
Path: | C:\Windows\System32\notepad.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff6e0000 |
File size: | 193'536 bytes |
MD5 hash: | B32189BDFF6E577A92BAA61AD49264E6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |