Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7.5RabbitFix_V9.exe

Overview

General Information

Sample name:7.5RabbitFix_V9.exe
Analysis ID:1431555
MD5:7ec9e3fc3f9f3cce7c965e09152726a4
SHA1:f03293a7f7e9a1eb072e689d48c88b5f59858029
SHA256:5c06818c78b238c60419fae8f263c931f1982ae311a365bc824e0013229ade7b
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code contains very large strings
Machine Learning detection for sample
Reads the Security eventlog
Reads the System eventlog
Allocates memory with a write watch (potentially for evading sandboxes)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 7.5RabbitFix_V9.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\7.5RabbitFix_V9.exe" MD5: 7EC9E3FC3F9F3CCE7C965E09152726A4)
    • conhost.exe (PID: 760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\7.5RabbitFix_V9.exe, ProcessId: 6256, TargetFilename: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0s0kxo5.nzp.ps1
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 7.5RabbitFix_V9.exeVirustotal: Detection: 7%Perma Link
Source: 7.5RabbitFix_V9.exeJoe Sandbox ML: detected
Source: 7.5RabbitFix_V9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 7.5RabbitFix_V9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 7.5RabbitFix_V9.exe, 00000000.00000002.3263559566.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

System Summary

barindex
Source: 7.5RabbitFix_V9.exe, PS2EXE.csLong String: Length: 12988
Source: 7.5RabbitFix_V9.exe, 00000000.00000002.3263559566.0000000003036000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ,\\StringFileInfo\\000004B0\\OriginalFilename vs 7.5RabbitFix_V9.exe
Source: 7.5RabbitFix_V9.exe, 00000000.00000002.3263559566.0000000002B11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 7.5RabbitFix_V9.exe
Source: 7.5RabbitFix_V9.exe, 00000000.00000002.3263559566.0000000002B8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs 7.5RabbitFix_V9.exe
Source: 7.5RabbitFix_V9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 7.5RabbitFix_V9.exe, PS2EXE.csBase64 encoded string: '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
Source: classification engineClassification label: mal68.evad.winEXE@2/3@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:760:120:WilError_03
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeMutant created: NULL
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0s0kxo5.nzp.ps1Jump to behavior
Source: 7.5RabbitFix_V9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 7.5RabbitFix_V9.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 7.5RabbitFix_V9.exeVirustotal: Detection: 7%
Source: unknownProcess created: C:\Users\user\Desktop\7.5RabbitFix_V9.exe "C:\Users\user\Desktop\7.5RabbitFix_V9.exe"
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: msisip.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: wshext.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 7.5RabbitFix_V9.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 7.5RabbitFix_V9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: 7.5RabbitFix_V9.exe, PS2EXEHostUI.cs.Net Code: Prompt
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeCode function: 0_2_00007FF848F300BD pushad ; iretd 0_2_00007FF848F300C1
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeMemory allocated: F50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeMemory allocated: 1AB10000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeWindow / User API: threadDelayed 414Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeQueries volume information: C:\Users\user\Desktop\7.5RabbitFix_V9.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\7.5RabbitFix_V9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
7.5RabbitFix_V9.exe7%ReversingLabs
7.5RabbitFix_V9.exe7%VirustotalBrowse
7.5RabbitFix_V9.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name7.5RabbitFix_V9.exe, 00000000.00000002.3263559566.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431555
    Start date and time:2024-04-25 12:35:28 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 13s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:7.5RabbitFix_V9.exe
    Detection:MAL
    Classification:mal68.evad.winEXE@2/3@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\7.5RabbitFix_V9.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):60
    Entropy (8bit):4.038920595031593
    Encrypted:false
    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
    MD5:D17FE0A3F47BE24A6453E9EF58C94641
    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
    Malicious:false
    Reputation:high, very likely benign file
    Preview:# PowerShell test file to determine AppLocker lockdown mode
    Process:C:\Users\user\Desktop\7.5RabbitFix_V9.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):60
    Entropy (8bit):4.038920595031593
    Encrypted:false
    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
    MD5:D17FE0A3F47BE24A6453E9EF58C94641
    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
    Malicious:false
    Reputation:high, very likely benign file
    Preview:# PowerShell test file to determine AppLocker lockdown mode
    Process:C:\Users\user\Desktop\7.5RabbitFix_V9.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):80
    Entropy (8bit):4.740634426587137
    Encrypted:false
    SSDEEP:3:ZW3wXyo4lyAVAuKARjglybOYtn:6wXyo4c4AuRglybOWn
    MD5:A078B0C283360520F577EADE16DC553B
    SHA1:80D6AD4A04221A7D79F8D18417ECBA1FC1783F86
    SHA-256:9C4281A1FE270FE934D6754EB18CE4CF2B5A2A56DD61DA1C8F58AA68551FBCA5
    SHA-512:2EC05461C991BD9EAE2F097F3E748AEDD7AB85EA225964A361886E40EDAF1A2A29595FFD9A2F82FBF4C97106F4F7E9642607EDF6155F604470DDA4E3408E4CC4
    Malicious:false
    Reputation:low
    Preview:..(c)2019 LenelS2....Enter timeout value in seconds, press <ENTER> for default:
    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):2.306381189642222
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:7.5RabbitFix_V9.exe
    File size:215'040 bytes
    MD5:7ec9e3fc3f9f3cce7c965e09152726a4
    SHA1:f03293a7f7e9a1eb072e689d48c88b5f59858029
    SHA256:5c06818c78b238c60419fae8f263c931f1982ae311a365bc824e0013229ade7b
    SHA512:188b73dfbfc455e016f22c9fdd38efc299e01a3ace6d63cdb44502c0d0427a3814a035400542b76e750753210d331760ce727778e8daa6da50dd0fe781d7da68
    SSDEEP:1536:guTnxtpihge85PbBVKx38ebscHWch0fp:zTnxvihgb5zTeb9/h0fp
    TLSH:B724311434D8901EF2EABB746FD0D8F54B59FDBA2904982324D43F8B3ABDA179D41239
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....4.]................................. ........@.. ....................................@................................
    Icon Hash:172dda5931961c30
    Entrypoint:0x40d1ee
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x5DF934E0 [Tue Dec 17 20:04:48 2019 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xd1a00x4b.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x290a8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x380000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000xb1f40xb200a440b5a78331a1e486dbff1df13832ddFalse0.34245523174157305data5.017199146332669IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0xe0000x290a80x29200d3ee1bbd3322c240d3daa7746e148714False0.1270006174012158data1.2436605177061357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x380000xc0x2008c800b2c1643b1e8d7af5ba34f56eeafFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xe5180x11aaPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0024325519681556
    RT_ICON0xf6c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.05076600023660239
    RT_ICON0x1fef00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.09667332352322892
    RT_ICON0x293980x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.1255083179297597
    RT_ICON0x2e8200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.11720595181861124
    RT_ICON0x32a480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.17479253112033194
    RT_ICON0x34ff00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.2300656660412758
    RT_ICON0x360980x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.2807377049180328
    RT_ICON0x36a200x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.33156028368794327
    RT_GROUP_ICON0x36e880x84data0.7196969696969697
    RT_VERSION0xe2b00x264data0.46078431372549017
    RT_MANIFEST0x36f100x193XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5732009925558312
    DLLImport
    mscoree.dll_CorExeMain
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:12:36:15
    Start date:25/04/2024
    Path:C:\Users\user\Desktop\7.5RabbitFix_V9.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\7.5RabbitFix_V9.exe"
    Imagebase:0x7e0000
    File size:215'040 bytes
    MD5 hash:7EC9E3FC3F9F3CCE7C965E09152726A4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:12:36:15
    Start date:25/04/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:10.1%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:3
      Total number of Limit Nodes:0
      execution_graph 2197 7ff848f304fa 2198 7ff848f34cc0 GetFileType 2197->2198 2200 7ff848f34d44 2198->2200

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 48 7ff848f34c9c-7ff848f34ca3 49 7ff848f34cae-7ff848f34d42 GetFileType 48->49 50 7ff848f34ca5-7ff848f34cad 48->50 54 7ff848f34d4a-7ff848f34d66 49->54 55 7ff848f34d44 49->55 50->49 55->54
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3265916698.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f30000_7.jbxd
      Similarity
      • API ID: FileType
      • String ID:
      • API String ID: 3081899298-0
      • Opcode ID: ee8f7ed1967f5b52a8282117a837c7114a9108ac26d4485bb29ba71212a2c768
      • Instruction ID: 5da6584b54ff7c682fb3cda11ebdb51fd7fd64685d7a4e853faebb7798af50f8
      • Opcode Fuzzy Hash: ee8f7ed1967f5b52a8282117a837c7114a9108ac26d4485bb29ba71212a2c768
      • Instruction Fuzzy Hash: A331F93090CA4C8FDB59DB98D8457E9BBF0FB66320F00416FC049C3692DB746856CB91
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 56 7ff848f304fa-7ff848f34d05 59 7ff848f34d0d-7ff848f34d42 GetFileType 56->59 60 7ff848f34d4a-7ff848f34d66 59->60 61 7ff848f34d44 59->61 61->60
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3265916698.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f30000_7.jbxd
      Similarity
      • API ID: FileType
      • String ID:
      • API String ID: 3081899298-0
      • Opcode ID: f609ed72685add555825296be1a5b91c58473a10e7a1bd2bdbfe4f5fc157caed
      • Instruction ID: 99c0ab115b1ecc4c7b9bf101fe9f3034d3c1b82ef47da4b4304736087604eb0c
      • Opcode Fuzzy Hash: f609ed72685add555825296be1a5b91c58473a10e7a1bd2bdbfe4f5fc157caed
      • Instruction Fuzzy Hash: B221717090CA0C9FDB58EB98D849BF9BBE0FBA5321F00422ED04AD3651DB756856CB91
      Uniqueness

      Uniqueness Score: -1.00%