Loading ...

Play interactive tourEdit tour

Analysis Report 2019-06-20 15_43_57-Google Reports.png

Overview

General Information

Joe Sandbox Version:26.0.0 Aquamarine
Analysis ID:151563
Start date:12.07.2019
Start time:10:38:50
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 1m 47s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:2019-06-20 15_43_57-Google Reports.png
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.winPNG@0/0@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Unable to launch sample, stop analysis
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe
Errors:
  • Nothing to analyse, Joe Sandbox has not found any analysis process or sample
  • Corrupt sample or wrongly selected analyzer. Details: 80040153

Detection

StrategyScoreRangeReportingWhitelistedDetection
Threshold00 - 100falseunknown

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold40 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample is a picture (JPEG, PNG, GIF etc), nothing to analyze



Mitre Att&ck Matrix

No Mitre Att&ck techniques found

Signature Overview

Click to jump to signature section


System Summary:

barindex
Classification labelShow sources
Source: classification engineClassification label: unknown0.winPNG@0/0@0/0

Malware Analysis System Evasion:

barindex
Program does not show much activity (idle)Show sources
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging:

barindex
Program does not show much activity (idle)Show sources
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Simulations

Behavior and APIs

No simulations

Antivirus and Machine Learning Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Created / dropped Files

No created / dropped files found

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

Static File Info

General

File type:PNG image data, 1008 x 339, 8-bit/color RGB, non-interlaced
Entropy (8bit):7.979454384664104
TrID:
  • Portable Network Graphics (16016/1) 100.00%
File name:2019-06-20 15_43_57-Google Reports.png
File size:100380
MD5:296cd9e485bdf01bb5f81aee824fdf17
SHA1:3ffe128b47507c04337d151fc19bc071f09ca03a
SHA256:b849a448d7389f82fe223639f70d51938a143dbdf0656510c508512ebb4b48e0
SHA512:482e9b71f745ef2c65eac928fcab1d4c75f6d2717058fd8c91b51c4581eb45908a6939acf1827b4a39a6d4139c5040fe8b6f7b6d6d86dd209ef6cfec07249e0c
SSDEEP:3072:MAOrr6vWcrCFPYKqETiTgsoQLU/4kggA8:M1r+ucrCTIY/4jgl
File Content Preview:.PNG........IHDR.......S......*p0....sRGB.........gAMA......a.....pHYs..........o.d....tEXtSoftware.Greenshot^U......IDATx^.....I.c...M.&...f..E..->d2..........;.+.............|..?..........|............|..?......_...........7....*......z..|...q[.'.<.\.".

File Icon

Icon Hash:74f0f0e4c6d6e0e4

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

Disassembly

Reset < >