Windows
Analysis Report
DocuFlex.exe
Overview
General Information
Detection
Score: | 42 |
Range: | 0 - 100 |
Confidence: | 100% |
Compliance
Score: | 64 |
Range: | 0 - 100 |
Signatures
Suricata IDS alerts for network traffic
Joe Sandbox ML detected suspicious sample
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64_ra
DocuFlex.exe (PID: 4040 cmdline:
"C:\Users\ user\Deskt op\DocuFle x.exe" MD5: 134873893D8EAF390FA9779E814C6A3C) dllhost.exe (PID: 2844 cmdline:
C:\Windows \system32\ DllHost.ex e /Process id:{AB8902 B4-09CA-4B B6-B78D-A8 F59079A8D5 } MD5: 08EB78E5BE019DF044C26B14703BD1FA) cmd.exe (PID: 2036 cmdline:
"C:\Window s\System32 \cmd.exe" /c start / b node . MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 6368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) node.exe (PID: 2660 cmdline:
node . MD5: 1CBBF81FC27F911C3E1239DFCFF5E6C6) cmd.exe (PID: 3312 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "cl ipboard.ex e --paste" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) clipboard.exe (PID: 2464 cmdline:
clipboard. exe --past e MD5: BDF7D4CCD2CE8CC7AB6AE80914496799) cmd.exe (PID: 4952 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "cl ipboard.ex e --copy" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) clipboard.exe (PID: 6044 cmdline:
clipboard. exe --copy MD5: BDF7D4CCD2CE8CC7AB6AE80914496799) chrome.exe (PID: 3920 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ne w-window - -user-data -dir=C:\Us ers\user\A ppData\Loc al\PDFInst aller\chro me-profile --start-m aximized - -app=http: //localhos t:56097 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 6756 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --user-dat a-dir="C:\ Users\user \AppData\L ocal\PDFIn staller\ch rome-profi le" --mojo -platform- channel-ha ndle=2184 --field-tr ial-handle =2028,i,53 9489962814 8401723,17 6535493584 50679821,2 62144 /pre fetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) cmd.exe (PID: 2844 cmdline:
"cmd.exe" /c schtask s /create /tn "PDF" /xml "C:\U sers\user\ AppData\Lo cal\PDFIns taller\tas k.xml" /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 5952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) schtasks.exe (PID: 5388 cmdline:
schtasks / create /tn "PDF" /xm l "C:\User s\user\App Data\Local \PDFInstal ler\task.x ml" /f MD5: 48C2FE20575769DE916F48EF0676A965) chrome.exe (PID: 4992 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --hi de-crash-r estore-bub ble --rest ore-last-s ession --n ew-window "? starttt " MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 3976 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2220 --fi eld-trial- handle=194 8,i,118454 3408088591 8371,82695 9041163659 9663,26214 4 /prefetc h:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Florian Roth (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-19T00:35:38.386295+0100 | 2034341 | 1 | A Network Trojan was detected | 192.168.2.16 | 49760 | 188.114.96.3 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Integrated Neural Analysis Model: |
Compliance |
---|
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |