Windows
Analysis Report
js8call-2.2.0-win32.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Allocates memory in foreign processes
Writes to foreign memory regions
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64_ra
js8call-2.2.0-win32.exe (PID: 7136 cmdline:
"C:\Users\ user\Deskt op\js8call -2.2.0-win 32.exe" MD5: EAE3CF1BF43009C0284E8FB9AFBD6C09) js8call.exe (PID: 5756 cmdline:
"C:\Progra m Files (x 86)\js8cal l\bin\js8c all.exe" MD5: 41049A9AC0653172195373AC01B05F68) js8.exe (PID: 1228 cmdline:
"C:\Progra m Files (x 86)\js8cal l\bin\js8" -s JS8Cal l -w 1 -m 3 -e "C:\P rogram Fil es (x86)\j s8call\bin " -a C:\Us ers\user\A ppData\Loc al\JS8Call -t C:\Use rs\user\Ap pData\Loca l\Temp\JS8 Call MD5: 5ADCEEEB7315860CA5FD5C718994DBEE) conhost.exe (PID: 2660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No yara matches
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Static PE information: |
Source: | Window detected: |