Windows Analysis Report
Open.EXE

Overview

General Information

Sample name: Open.EXE
Analysis ID: 1430718
MD5: 71b721a82f1db2747fad1df78e11f2ec
SHA1: 2239279c93ec64d077550d1f7072385d9b9763f3
SHA256: 7f79087dfc16b2b7fdb31c0d15f39fc35eeafe3542a4c81f007d51b8086aecf9
Infos:

Detection

Score: 25
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Opens network shares
Binary contains a suspicious time stamp
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Found evasive API chain checking for process token information
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses Microsoft's Enhanced Cryptographic Provider

Classification

Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9830EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA, 0_2_00007FF73F9830EC
Source: Open.EXE Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: wextract.pdb source: Open.EXE
Source: Binary string: wextract.pdbGCTL source: Open.EXE
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F98204C FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 0_2_00007FF73F98204C
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F982C54 GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle, 0_2_00007FF73F982C54
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F981C0C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx, 0_2_00007FF73F981C0C
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9866C4 0_2_00007FF73F9866C4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9840C4 0_2_00007FF73F9840C4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F986CA4 0_2_00007FF73F986CA4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F982DB4 0_2_00007FF73F982DB4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F981D28 0_2_00007FF73F981D28
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F985D90 0_2_00007FF73F985D90
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F981C0C 0_2_00007FF73F981C0C
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F983530 0_2_00007FF73F983530
Source: Open.EXE Static PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, Windows 2000/XP setup, 165 bytes, 1 file, at 0x2c +A "Open.cmd", ID 756, number 1, 1 datablock, 0x1503 compression
Source: Open.EXE Binary or memory string: OriginalFilename vs Open.EXE
Source: Open.EXE, 00000000.00000000.1654646480.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameWEXTRACT.EXE D vs Open.EXE
Source: Open.EXE, 00000000.00000000.1654646480.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs Open.EXE
Source: Open.EXE Binary or memory string: OriginalFilenameWEXTRACT.EXE D vs Open.EXE
Source: Open.EXE Binary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs Open.EXE
Source: classification engine Classification label: sus25.spyw.winEXE@5/1@0/0
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F986CA4 GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA, 0_2_00007FF73F986CA4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F981C0C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx, 0_2_00007FF73F981C0C
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9866C4 LocalAlloc,LocalFree,lstrcmpA,LocalFree,GetTempPathA,GetDriveTypeA,GetFileAttributesA,GetDiskFreeSpaceA,MulDiv,GetWindowsDirectoryA,GetFileAttributesA,CreateDirectoryA,SetFileAttributesA,GetWindowsDirectoryA, 0_2_00007FF73F9866C4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F987AC8 FindResourceA,LoadResource,DialogBoxIndirectParamA,FreeResource, 0_2_00007FF73F987AC8
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3760:120:WilError_03
Source: C:\Users\user\Desktop\Open.EXE File created: C:\Users\user\AppData\Local\Temp\IXP000.TMP Jump to behavior
Source: Open.EXE Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Open.EXE Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: unknown Process created: C:\Users\user\Desktop\Open.EXE "C:\Users\user\Desktop\Open.EXE"
Source: C:\Users\user\Desktop\Open.EXE Process created: C:\Windows\System32\cmd.exe cmd /c \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Open.cmd
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: C:\Users\user\Desktop\Open.EXE Process created: C:\Windows\System32\cmd.exe cmd /c \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Open.cmd Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: cabinet.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: feclient.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Section loaded: advpack.dll Jump to behavior
Source: Open.EXE Static PE information: Image base 0x140000000 > 0x60000000
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Open.EXE Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Open.EXE Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: Open.EXE
Source: Binary string: wextract.pdbGCTL source: Open.EXE
Source: Open.EXE Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Open.EXE Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Open.EXE Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Open.EXE Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Open.EXE Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: Open.EXE Static PE information: 0xAE1BC4F8 [Tue Jul 25 12:18:00 2062 UTC]
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9830EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA, 0_2_00007FF73F9830EC
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F981684 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA, 0_2_00007FF73F981684
Source: C:\Users\user\Desktop\Open.EXE Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0 Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0 Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0 Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Registry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0 Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Open.EXE Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F98204C FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 0_2_00007FF73F98204C
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9864E4 GetSystemInfo,CreateDirectoryA,RemoveDirectoryA, 0_2_00007FF73F9864E4
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9830EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA, 0_2_00007FF73F9830EC
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F988790 SetUnhandledExceptionFilter, 0_2_00007FF73F988790
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F988494 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00007FF73F988494
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F9811CC LoadLibraryA,GetProcAddress,AllocateAndInitializeSid,FreeSid,FreeLibrary, 0_2_00007FF73F9811CC
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F988964 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter, 0_2_00007FF73F988964
Source: C:\Users\user\Desktop\Open.EXE Code function: 0_2_00007FF73F982C54 GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle, 0_2_00007FF73F982C54

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\cmd.exe File opened: \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\ Jump to behavior
No contacted IP infos