Loading ...

Play interactive tourEdit tour

Analysis Report mandiant_ioc_finder.exe.sha

Overview

General Information

Joe Sandbox Version:28.0.0 Lapis Lazuli
Analysis ID:208469
Start date:14.02.2020
Start time:16:09:04
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 2s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:mandiant_ioc_finder.exe.sha
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown0.winSHA@0/0@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Unable to launch sample, stop analysis
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe
Errors:
  • Nothing to analyse, Joe Sandbox has not found any analysis process or sample
  • Corrupt sample or wrongly selected analyzer. Details: 80040153

Detection

StrategyScoreRangeReportingWhitelistedDetection
Threshold00 - 100falseunknown

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Mitre Att&ck Matrix

No Mitre Att&ck techniques found

Signature Overview

Click to jump to signature section


System Summary:

barindex
Classification labelShow sources
Source: classification engineClassification label: unknown0.winSHA@0/0@0/0

Malware Configuration

No configs have been found

Simulations

Behavior and APIs

No simulations

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
mandiant_ioc_finder.exe.sha0%VirustotalBrowse
mandiant_ioc_finder.exe.sha0%MetadefenderBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Sigma Overview

No Sigma rule has matched

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Created / dropped Files

No created / dropped files found

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

Static File Info

General

File type:ASCII text
Entropy (8bit):4.487300847078026
TrID:
    File name:mandiant_ioc_finder.exe.sha
    File size:66
    MD5:78bf05216546b3dd097fe91fc3729338
    SHA1:9a4fc8a8caf950367414a3455fc2aebd82052e8a
    SHA256:66cbd820cfaf4a83babb4914f7f771ecfffc714c4f428736e7fabff00d6cfd95
    SHA512:31f9ca338535cc1b4972f5f128fe92798767668eb9bc687ebd1181ada54fdcd25498714f36faee992db19cf350bf8a45e48496a84d82620cf435f2f8a58114df
    SSDEEP:3:CaNFQEiDclQUP8VgaAkdKn:C8FRgclpPsgaAUK
    File Content Preview:520b901184af0185ac739ef9735d785d5dece024 mandiant_ioc_finder.exe.

    File Icon

    Icon Hash:74f0e4e4e4e4e0e4

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    System Behavior

    Disassembly

    Reset < >