Windows
Analysis Report
https://support.kraftcpas.com/sc.exe
Overview
Detection
ScreenConnect Tool
Score: | 76 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Allocates memory in foreign processes
Deletes keys which are related to windows safe boot (disables safe mode boot)
Enables network access during safeboot for specific services
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected ScreenConnect Tool
Classification
- System is w10x64_ra
chrome.exe (PID: 6532 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6712 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2052 --fi eld-trial- handle=198 8,i,628722 9998002529 323,694694 1583868105 719,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 7224 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= chrome.moj om.UtilRea dIcon --la ng=en-US - -service-s andbox-typ e=icon_rea der --mojo -platform- channel-ha ndle=5268 --field-tr ial-handle =1988,i,62 8722999800 2529323,69 4694158386 8105719,26 2144 --dis able-featu res=Optimi zationGuid eModelDown loading,Op timization Hints,Opti mizationHi ntsFetchin g,Optimiza tionTarget Prediction /prefetch :8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 7876 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= chrome.moj om.UtilRea dIcon --la ng=en-US - -service-s andbox-typ e=icon_rea der --mojo -platform- channel-ha ndle=4092 --field-tr ial-handle =1988,i,62 8722999800 2529323,69 4694158386 8105719,26 2144 --dis able-featu res=Optimi zationGuid eModelDown loading,Op timization Hints,Opti mizationHi ntsFetchin g,Optimiza tionTarget Prediction /prefetch :8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) sc.exe (PID: 8128 cmdline:
"C:\Users\ user\Downl oads\sc.ex e" MD5: B50C9263DEB4012C20E2506BBE0D2FB9) msiexec.exe (PID: 4132 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\AppData\ Local\Temp \ScreenCon nect\1f384 5d5d6df5de d\setup.ms i" MD5: 9D09DC1EDA745A5F87553048E57620CF)
chrome.exe (PID: 6936 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://suppo rt.kraftcp as.com/sc. exe" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
msiexec.exe (PID: 4396 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) msiexec.exe (PID: 7228 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 61F318B 17FAAF4499 342BE750C3 161F6 C MD5: 9D09DC1EDA745A5F87553048E57620CF) rundll32.exe (PID: 7244 cmdline:
rundll32.e xe "C:\Use rs\user\Ap pData\Loca l\Temp\MSI 87E3.tmp", zzzzInvoke ManagedCus tomActionO utOfProc S fxCA_53432 96 1 Scree nConnect.I nstallerAc tions!Scre enConnect. ClientInst allerActio ns.FixupSe rviceArgum ents MD5: 889B99C52A60DD49227C5E485A016679) msiexec.exe (PID: 7200 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 4A824D9 8542748AC8 5E9A056CE1 B5C93 MD5: 9D09DC1EDA745A5F87553048E57620CF) msiexec.exe (PID: 3612 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 76571A3 C8D810D706 65DBE199B3 E4E4C E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF) msiexec.exe (PID: 2628 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng C205AAD 155A7D2F3A EB53A3BCBE A8A19 E Gl obal\MSI00 00 MD5: 9D09DC1EDA745A5F87553048E57620CF) rundll32.exe (PID: 688 cmdline:
rundll32.e xe "C:\Win dows\Insta ller\MSIC9 06.tmp",zz zzInvokeMa nagedCusto mActionOut OfProc Sfx CA_5359968 12 Screen Connect.In stallerAct ions!Scree nConnect.C lientInsta llerAction s.FixupSer viceArgume nts MD5: 889B99C52A60DD49227C5E485A016679)
ScreenConnect.ClientService.exe (PID: 1088 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (1f38 45d5d6df5d ed)\Screen Connect.Cl ientServic e.exe" "?e =Access&y= Guest&h=kf tit2.kraft cpas.com&p =8041&s=83 5eb257-db3 4-4ce9-856 8-a0d17d9f 150a&k=BgI AAACkAABSU 0ExAAgAAAE AAQAdxBFc7 kDjCF00RBf %2fnSmccUZ 40PT%2fMPV LE8e7zBL9V %2fmsKIm67 oy%2ft8Av3 PeBa%2b8a4 w2PzvaXpb8 fUdIvHdrHM Qj8645KXLU Fx%2ffToi9 RswLjivimR 9oXBd8K8lA MpLEtqn4rt dn12OsHpoZ %2bUSeLyNq D%2bqzSjLZ SSfRvwn0eG xTHpJBQbYn aTunIAHaXx xs45cIM2uE Fe1hBedCK4 hKbtCT6b%2 fFVUG6xOh% 2fC9OIRO6M qDWDNGF9jh jk6QspOAE4 NxGP4dTHd1 eXtvxUPJZF unm%2fU5nT btrWNK32xE 9of98%2fbT uFLGIMNhuy ZFVio0CLwA Ik5NVo%2bL MP%2f9jnQH IWl&c=Outs ideKraft&c =&c=&c=&c= &c=&c=&c=" MD5: 89D3D099B6D8731BD1B7F5A68B5BF17C) ScreenConnect.WindowsClient.exe (PID: 304 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (1f38 45d5d6df5d ed)\Screen Connect.Wi ndowsClien t.exe" "Ru nRole" "c4 ec8d85-e3d c-4c97-858 8-e3159350 bf27" "Use r" MD5: 19E093BC974D1ED6399F50B7FA3BE1F8) ScreenConnect.WindowsClient.exe (PID: 1176 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (1f38 45d5d6df5d ed)\Screen Connect.Wi ndowsClien t.exe" "Ru nRole" "8e fc418e-e48 b-4494-8e5 8-8dbafeec 5d32" "Sys tem" MD5: 19E093BC974D1ED6399F50B7FA3BE1F8) ScreenConnect.ClientSetup.exe (PID: 2784 cmdline:
"C:\Window s\TEMP\Scr eenConnect \23.8.5.87 07\ScreenC onnect.Cli entSetup.e xe" MD5: D8FFEB7053270F96D65CC934EC2458C9) msiexec.exe (PID: 2292 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Windows\S ystemTemp\ ScreenConn ect\24.3.7 .9067\1f38 45d5d6df5d ed\ScreenC onnect.Cli entSetup.m si" MD5: 9D09DC1EDA745A5F87553048E57620CF)
ScreenConnect.ClientService.exe (PID: 5696 cmdline:
"C:\Progra m Files (x 86)\Screen Connect Cl ient (1f38 45d5d6df5d ed)\Screen Connect.Cl ientServic e.exe" "?e =Access&y= Guest&h=kf tit2.kraft cpas.com&p =8041&s=83 5eb257-db3 4-4ce9-856 8-a0d17d9f 150a&k=BgI AAACkAABSU 0ExAAgAAAE AAQAdxBFc7 kDjCF00RBf %2fnSmccUZ 40PT%2fMPV LE8e7zBL9V %2fmsKIm67 oy%2ft8Av3 PeBa%2b8a4 w2PzvaXpb8 fUdIvHdrHM Qj8645KXLU Fx%2ffToi9 RswLjivimR 9oXBd8K8lA MpLEtqn4rt dn12OsHpoZ %2bUSeLyNq D%2bqzSjLZ SSfRvwn0eG xTHpJBQbYn aTunIAHaXx xs45cIM2uE Fe1hBedCK4 hKbtCT6b%2 fFVUG6xOh% 2fC9OIRO6M qDWDNGF9jh jk6QspOAE4 NxGP4dTHd1 eXtvxUPJZF unm%2fU5nT btrWNK32xE 9of98%2fbT uFLGIMNhuy ZFVio0CLwA Ik5NVo%2bL MP%2f9jnQH IWl&v=AQAA ANCMnd8BFd ERjHoAwE%2 fCl%2bsBAA AA6hOeZzRi 30awChR5w% 2b4wgAAAAA ACAAAAAAAQ ZgAAAAEAAC AAAAC3Q5YV tXedXRBx4w JROHFnCdsQ sEf7XIe0wl 0WnFCByAAA AAAOgAAAAA IAACAAAAAw %2br0ZRKwq ygT3OCXrer yD2ZZRbTaF kwLZtWb4ez q7%2fKAEAA DENwQEyG29 MsXa91sVvk 6mp7ykaecx tdAgjpzT0z vytZaIQAdG PWej4263JK xpUCs3ouCq W6eF8RLhva INhyStlfuO LjpxP6g3ON rSW0tmbnGw S8BWoQyfKK K7MOnnLKws 51U5RVCxyE WcRalMZS0C YNFAq9Ol6h Y6ZeN5gyIM cwWmUnGT9X 0ZFRLXLq5n %2brTfXhE6 jmQSU%2bwR 6HgzMtTVUU 5s%2ffGkoL 29aMaxLF05 PeSim2rAv2 6RLKBMT2vO K9BxExrqMb %2fHOfIU09 WaslOMmafg 4QuA%2ficL QHSjdJygwG IeW59S%2bE DVKtZ2cznW SkO6wVzjjW ppR3HQpGss Qh7WLVaWIY 4xvdOOF93Y SklNVxekvj cwLNotNuAQ O3hbUMWyVm hzQtEjaT15 wombyXcPdd 6ug3YDOPih AVBKjm9vQf 7PRIG9wBJp k8iIazmAmq w0qp215Bit 6%2bVHpuEn fAvO9PDrJM EYYkOkhp50 Z28QDNg2EX 3C71D9jNqH kffmmNRDg3 ZPLQ5OffHq Ap5I8OxxRD T5smb6HxtL fJSu%2b3E4 kSHskxQ8LC YAX41xse6v Dflcm9a3MF cW5W1b4Cfq V5Cb5HQrrj 5L1AkLMb4D Du4js8FlnA uX6Mm1ykac VEzhBmnL%2 fS0p4k2lyT SDm3rjdgry HUtJWjxvQR UpZ4ilemvr kk3JjgW6N2 jg7iyz1nSY vvMq9zddZY uY4ot04tNT 7K%2f1TGJV oUi55hvskg ySjBJR%2bi 9%2b%2bNwV pY27PN9D%2 bt3HJV7eyg c9tfmGl42J nJnn4fTa1D uNVxY679n% 2foNuUWlZZ 50Lxn9mvIa %2fiN4COmg h26wwi5fP% 2bF3Xbl%2b CtGw8Vv8BP 90XIA1L2g7 v647J7FZIG J1IO9cd7Eo 0A4ourxd5E CTRl%2b7om lWqWgU2q8t ZPtf9Yfhi7 DWr7d%2f57 mVjTYSx4Re gwivOYZLlX 2zq90Ealrf bXFGmd%2fl meDVnDJDtW vKeyItiLWZ tHO%2baL1S Rvm520BuBX 6OqLrI2Ljp QMlvM14WB4 Xq1m%2bTS% 2fqzBtHbdS bqRRFeGrf% 2fwSmY1rAx 0C%2f5Ai%2 bBqluPvuMm ehgDZvGOco ZBRPpvDQCa b0YOh5BrL9 oBhnnvPcZt AMLIY3tM0o yC97wdm4%2 flDXd5pEfW FQHgzA0veP DdltBHO80U GGlLzRSMGM u%2fk8dU3p 7gzyjszsSA Hff2%2blFm geA8G3ktOo Zxibq2SBTh 6rzziLBDm3 xnH2ffXucT vAUIZMbc8Z oKar2w7ajj dqxCY%2b5r O4Cg4Abl05 WcakIg%2b5 Z7tTIEkHVs 0aWOiXST4j 3ZGImCI%2b HHMqbc%2fp m%2baDuqPz k34GSxrAVz 3jBqSKWfQ3 ORPmipuTkT X8t4lkABZ0 Rh1cIOFQFk Dc079%2b%2 f%2fM1VZCs 08YtxWgOjB QaaBm8XV%2 bpqFItUfbt iQU%2fh%2f qm1k%2bMmj Cu1yTPjOEn 3r1rfmpbj3 MB94Nenif5 JHHEr3S7Wc akhJPL1bNL ejOwEMcwe1 PAIQNACe51 lkUKanqi3p Cqb31I1Wag ld%2bIfbkQ v5GxpgFZGW DucLQVQ0Ph qmQdI3bRFW htqQ4IbxQB aIVzJEAAAA BAS4NE4Kud pNu3IQ8jGW