Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new 1.txt

Overview

General Information

Sample name:new 1.txt
Analysis ID:1428825
MD5:b444775d7852a816e4f8845a097714f7
SHA1:9b0d47ef351de2e016f660f3f44f19726f7c8d40
SHA256:1f79b33fd2b749c6dbd91b1128cd05597c36e101a09c3b7514e04e1bf62d3e4e

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Queries the volume information (name, serial number etc) of a device

Classification

  • System is w7x64
  • notepad.exe (PID: 1960 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\new 1.txt MD5: B32189BDFF6E577A92BAA61AD49264E6)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: classification engineClassification label: clean0.winTXT@1/0@0/0
Source: C:\Windows\System32\notepad.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\notepad.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\new 1.txt VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping11
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
new 1.txt0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428825
Start date and time:2024-04-19 17:06:53 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:new 1.txt
Detection:CLEAN
Classification:clean0.winTXT@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .txt
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
  • VT rate limit hit for: new 1.txt
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:exported SGML document, ASCII text, with CRLF line terminators
Entropy (8bit):5.391845951962917
TrID:
  • 669 Tracker Module (2002/1) 100.00%
File name:new 1.txt
File size:431 bytes
MD5:b444775d7852a816e4f8845a097714f7
SHA1:9b0d47ef351de2e016f660f3f44f19726f7c8d40
SHA256:1f79b33fd2b749c6dbd91b1128cd05597c36e101a09c3b7514e04e1bf62d3e4e
SHA512:c7447e215c71dbc0fcc6136807a2aa64c7fe8aa8fb1bc46c3cd250fd2a395250a273de011ed4ae8e5f11c98cbe8bd9f5c3f937faa0a67b36de3beaa4d1a9d03d
SSDEEP:12:LQqAQ1gusL0gZvHv1cQhYNx7zfeCab91px1rT:wP1j27zfHO7rT
TLSH:D3E0A3E1784D52E9B0DB8D4273B54D83CD1344F90F51CCFED0DA343CA918C1575A4456
File Content Preview:if (!empty($_POST['email'])) {...if (!empty($_POST['email']) && trim($_POST['orderid']) != '') {....$rand = trim($_POST['orderid']);...} else {....$rand = rand();...}...mail(trim($_POST['email']),$_SERVER['HTTP_HOST']." - Sending is Working Fine. [Result]
Icon Hash:22f6f4d1d2d2d4d0
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:17:07:49
Start date:19/04/2024
Path:C:\Windows\System32\notepad.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\new 1.txt
Imagebase:0xff6e0000
File size:193'536 bytes
MD5 hash:B32189BDFF6E577A92BAA61AD49264E6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:false

No disassembly