Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ReleaseNote.txt

Overview

General Information

Sample Name:ReleaseNote.txt
Analysis ID:612090
MD5:9527efe3316bd902a538e546aa87b5f3
SHA1:8aa6d090fd11e50653377fb2ca4645588107f4a5
SHA256:2f1b6c52d11f13ec5abea7413c0f74d3a290f85b898d847ce7a22bcea2944924

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Queries the volume information (name, serial number etc) of a device
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

  • System is w10x64
  • notepad.exe (PID: 6068 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\ReleaseNote.txt MD5: BB9A06B8F2DD9D24C77F389D7B2B58D2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com/
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com/knowledgebase
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com/knowledgebase/articles/524951
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com/knowledgebase/articles/607686
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com/knowledgebase/articles/615714
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://support.displaylink.com/knowledgebase/articles/630820
Source: notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtString found in binary or memory: http://www.displaylink.com/downloads/corporate
Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
Source: C:\Windows\System32\notepad.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: clean1.winTXT@1/0@0/0
Source: ReleaseNote.txtJoe Sandbox Cloud Basic: Detection: clean Score: 2Perma Link
Source: C:\Windows\System32\notepad.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\ReleaseNote.txt VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
Query Registry
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://support.displaylink.com/notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
    high
    http://support.displaylink.com/knowledgebase/articles/630820notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
      high
      http://support.displaylink.com/knowledgebase/articles/607686notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
        high
        http://www.displaylink.com/downloads/corporatenotepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
          high
          http://support.displaylink.comnotepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
            high
            http://support.displaylink.com/knowledgebase/articles/524951notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
              high
              http://support.displaylink.com/knowledgebasenotepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
                high
                http://support.displaylink.com/knowledgebase/articles/615714notepad.exe, 00000000.00000002.521579307.0000020B953CD000.00000004.00000020.00020000.00000000.sdmp, ReleaseNote.txtfalse
                  high
                  No contacted IP infos
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:612090
                  Start date and time: 20/04/202215:02:222022-04-20 15:02:22 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 4m 38s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:ReleaseNote.txt
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:24
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:CLEAN
                  Classification:clean1.winTXT@1/0@0/0
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .txt
                  • Adjust boot time
                  • Enable AMSI
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 40.112.88.60
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, ris-prod.trafficmanager.net, sls.update.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:ASCII text, with CRLF line terminators
                  Entropy (8bit):5.166963992178568
                  TrID:
                    File name:ReleaseNote.txt
                    File size:8290
                    MD5:9527efe3316bd902a538e546aa87b5f3
                    SHA1:8aa6d090fd11e50653377fb2ca4645588107f4a5
                    SHA256:2f1b6c52d11f13ec5abea7413c0f74d3a290f85b898d847ce7a22bcea2944924
                    SHA512:bea11889ee45aac34e4e72c0b318d97f60d4ba466980534a0d79568f579e8de1e12bedb8981669e5850b0a78dc6d04928716841c9c2970a8a6b5b93828bbaf39
                    SSDEEP:192:FTjnjMDLDBQ4o1KtazJLwuqSb6Nc31iNY:FTUDLN+YtK1KcIC
                    TLSH:EE0293A9AD12B6182576C143755F1383FF7E827992AB478E3408911C77073AAC3BF4AD
                    File Content Preview:=============================================================================..=============================================================================..DisplayLink Software Release: External Release Note..Software Package: DisplayLink Graphics..Soft
                    Icon Hash:74f4e4e4e4e4e4e4
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:15:03:34
                    Start date:20/04/2022
                    Path:C:\Windows\System32\notepad.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\ReleaseNote.txt
                    Imagebase:0x7ff639e70000
                    File size:245760 bytes
                    MD5 hash:BB9A06B8F2DD9D24C77F389D7B2B58D2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    No disassembly