Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
powershell.exe

Overview

General Information

Sample Name:powershell.exe
Analysis ID:668013
MD5:c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1:f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA256:73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Queries the installation date of Windows
Detected potential crypto function
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • powershell.exe (PID: 6928 cmdline: "C:\Users\user\Desktop\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 6936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: powershell.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: powershell.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbUGP source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACD76F malloc,ExpandEnvironmentStringsW,FindFirstFileW,FindClose,free,
Source: powershell.exe, 00000000.00000002.708092999.0000000003582000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000000.00000002.712431385.0000000005611000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: powershell.exe, 00000000.00000002.712749418.000000000565C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs powershell.exe
Source: powershell.exe, 00000000.00000002.712431385.0000000005611000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs powershell.exe
Source: powershell.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: powershell.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: powershell.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: powershell.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00AC96A0
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACA0E0
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_07C394D8
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_07C394D8
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_07C3E1E0
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_07C3E1F0
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_07C30040
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_07C3001B
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACA3B0 FormatMessageW,GetLastError,FormatMessageW,??_V@YAXPAX@Z,LocalFree,??_V@YAXPAX@Z,LocalFree,??_V@YAXPAX@Z,LocalFree,
Source: powershell.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: unknownProcess created: C:\Users\user\Desktop\powershell.exe "C:\Users\user\Desktop\powershell.exe"
Source: C:\Users\user\Desktop\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77F10CF0-3DB5-4966-B520-B7C54FD35ED6}\InProcServer32
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6936:120:WilError_01
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACEB31 FindResourceExW,LoadResource,
Source: C:\Users\user\Desktop\powershell.exeFile created: C:\Users\user\Documents\20220718Jump to behavior
Source: C:\Users\user\Desktop\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vyke4on2.1v5.ps1Jump to behavior
Source: classification engineClassification label: clean6.winEXE@2/2@0/0
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACD283 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z,__EH_prolog3,RegGetValueW,memset,RegGetValueW,SetConsoleTitleW,free,CoCreateInstance,CoCreateInstance,??_V@YAXPAX@Z,free,free,#30,free,free,#30,free,free,
Source: C:\Users\user\Desktop\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: powershell.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: powershell.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbUGP source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00AD02A8 push edi; retf
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACB80D push ecx; ret
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00AC33BA push eax; retn 0000h
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACB3CC push ecx; ret
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\powershell.exeWindow / User API: threadDelayed 9014
Source: C:\Users\user\Desktop\powershell.exe TID: 5836Thread sleep time: -11068046444225724s >= -30000s
Source: C:\Users\user\Desktop\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\powershell.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACD76F malloc,ExpandEnvironmentStringsW,FindFirstFileW,FindClose,free,
Source: C:\Users\user\Desktop\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\powershell.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACB4F0 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACB17C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\powershell.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Users\user\Desktop\powershell.exeCode function: GetLocaleInfoW,wcsncmp,
Source: C:\Users\user\Desktop\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDate
Source: C:\Users\user\Desktop\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACE80D memset,GetVersionExW,GetVersionExW,
Source: C:\Users\user\Desktop\powershell.exeCode function: 0_2_00ACB715 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials34
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 668013 Sample: powershell.exe Startdate: 18/07/2022 Architecture: WINDOWS Score: 6 5 powershell.exe 16 2->5         started        process3 7 conhost.exe 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
powershell.exe0%VirustotalBrowse
powershell.exe0%MetadefenderBrowse
powershell.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.712431385.0000000005611000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    No contacted IP infos
    Joe Sandbox Version:35.0.0 Citrine
    Analysis ID:668013
    Start date and time: 18/07/202208:42:442022-07-18 08:42:44 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 7m 49s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:powershell.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:CLEAN
    Classification:clean6.winEXE@2/2@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 6.8% (good quality ratio 5.9%)
    • Quality average: 62.8%
    • Quality standard deviation: 35.3%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Adjust boot time
    • Enable AMSI
    • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 23.211.6.115, 40.125.122.176, 20.54.89.106, 20.223.24.244, 52.152.110.14, 52.242.101.226
    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, e12564.dspb.akamaiedge.net, licensing.mp.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    08:44:27API Interceptor38x Sleep call for process: powershell.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\powershell.exe
    File Type:very short file (no magic)
    Category:dropped
    Size (bytes):1
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:U:U
    MD5:C4CA4238A0B923820DCC509A6F75849B
    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
    Malicious:false
    Reputation:high, very likely benign file
    Preview:1
    Process:C:\Users\user\Desktop\powershell.exe
    File Type:very short file (no magic)
    Category:dropped
    Size (bytes):1
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:U:U
    MD5:C4CA4238A0B923820DCC509A6F75849B
    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
    Malicious:false
    Reputation:high, very likely benign file
    Preview:1
    File type:PE32 executable (console) Intel 80386, for MS Windows
    Entropy (8bit):5.502549953174867
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:powershell.exe
    File size:433152
    MD5:c32ca4acfcc635ec1ea6ed8a34df5fac
    SHA1:f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
    SHA256:73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
    SHA512:6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
    SSDEEP:6144:MF45pGVc4sqEoWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:95pGVcwW2KXzJ4pdd3klnnWosPhnzq
    TLSH:B5947C8367D45295EC3FC431DC3745610622BCBDDBD09BDB99C8B6390A702D09A3EA6B
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......".z.fg..fg..fg..x5..dg..o...lg..r...eg..r...}g..fg...g..r...cg..r...og..r...ng..r...gg..r...gg..Richfg.........................
    Icon Hash:14ec98b2b8e4d600
    Entrypoint:0x40afc0
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
    Time Stamp:0x30F12F73 [Mon Jan 8 14:51:31 1996 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:10
    OS Version Minor:0
    File Version Major:10
    File Version Minor:0
    Subsystem Version Major:10
    Subsystem Version Minor:0
    Import Hash:194427a488ed1dd0a91731658b071667
    Instruction
    call 00007FE154B40CC5h
    jmp 00007FE154B4034Eh
    jmp dword ptr [004121F4h]
    cmp ecx, dword ptr [00411368h]
    jne 00007FE154B40575h
    retn 0000h
    jmp 00007FE154B4073Bh
    int3
    int3
    mov edi, edi
    push ebp
    mov ebp, esp
    push esi
    mov esi, 004113A4h
    push esi
    call dword ptr [004120E8h]
    mov ecx, dword ptr [00411360h]
    mov eax, dword ptr [ebp+08h]
    inc ecx
    mov dword ptr [00411360h], ecx
    push esi
    mov dword ptr [eax], ecx
    mov eax, dword ptr fs:[0000002Ch]
    mov ecx, dword ptr [004116DCh]
    mov ecx, dword ptr [eax+ecx*4]
    mov eax, dword ptr [00411360h]
    mov dword ptr [ecx+00000004h], eax
    call dword ptr [00412078h]
    push 004113A8h
    call dword ptr [00412070h]
    pop esi
    pop ebp
    ret
    mov edi, edi
    push ebp
    mov ebp, esp
    push esi
    push edi
    mov edi, 004113A4h
    push edi
    call dword ptr [004120E8h]
    mov esi, dword ptr [ebp+08h]
    cmp dword ptr [esi], 00000000h
    jne 00007FE154B40581h
    or dword ptr [esi], FFFFFFFFh
    jmp 00007FE154B4059Bh
    push 00000000h
    call 00007FE154B405A2h
    pop ecx
    jmp 00007FE154B4055Eh
    cmp dword ptr [esi], FFFFFFFFh
    je 00007FE154B40563h
    mov eax, dword ptr fs:[0000002Ch]
    mov ecx, dword ptr [004116DCh]
    mov ecx, dword ptr [eax+ecx*4]
    mov eax, dword ptr [00411360h]
    mov dword ptr [ecx+00000004h], eax
    push edi
    call dword ptr [00412078h]
    pop edi
    pop esi
    Programming Language:
    • [IMP] VS2008 build 21022
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x122080xb4.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x57d88.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6b0000x127c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x49000x54.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x16940x18.text
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x15e80xac.text
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x120000x204.idata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xf35c0xf400False0.457367443647541data5.675599809360563IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x110000x9380x400False0.439453125data4.3874403980662935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .idata0x120000xcd80xe00False0.44614955357142855data5.292395568542356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x130000x57d880x57e00False0.3494065611664296data5.3056762942545195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x6b0000x127c0x1400False0.7013671875data6.257290188908493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    MUI0x6acb00xd8dataEnglishUnited States
    RT_ICON0x13c480x2fbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_ICON0x16c080x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
    RT_ICON0x1ae300x25a8dataEnglishUnited States
    RT_ICON0x1d3d80x1a68dataEnglishUnited States
    RT_ICON0x1ee400x10a8dataEnglishUnited States
    RT_ICON0x1fee80x988dataEnglishUnited States
    RT_ICON0x208700x6b8dataEnglishUnited States
    RT_ICON0x20f280x468GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_ICON0x214080x668dataEnglishUnited States
    RT_ICON0x21a700x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2296940798, next used block 15239304EnglishUnited States
    RT_ICON0x21d580x1e8dataEnglishUnited States
    RT_ICON0x21f400x128GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_ICON0x220680xea8dataEnglishUnited States
    RT_ICON0x22f100x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 14019316, next used block 14479096EnglishUnited States
    RT_ICON0x237b80x6c8dataEnglishUnited States
    RT_ICON0x23e800x568GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_ICON0x243e80x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 0, next used block 0EnglishUnited States
    RT_ICON0x664100x25a8dataEnglishUnited States
    RT_ICON0x689b80x10a8dataEnglishUnited States
    RT_ICON0x69a600x988dataEnglishUnited States
    RT_ICON0x6a3e80x468GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_GROUP_ICON0x213900x76dataEnglishUnited States
    RT_GROUP_ICON0x6a8500xbcdataEnglishUnited States
    RT_VERSION0x6a9100x39cdataEnglishUnited States
    RT_MANIFEST0x135a00x6a3XML 1.0 document textEnglishUnited States
    DLLImport
    msvcrt.dll_onexit, __dllonexit, _unlock, _lock, _initterm, __setusermatherr, __p__fmode, _cexit, _exit, exit, __set_app_type, __wgetmainargs, ?terminate@@YAXXZ, __p__commode, ??1type_info@@UAE@XZ, _controlfp, _XcptFilter, _except_handler4_common, memcmp, _vsnwprintf, _wcsicmp, _wcsnicmp, bsearch, fclose, _wfopen, _itow_s, wcstoul, wcschr, __uncaught_exception, memmove, memcpy, _CxxThrowException, ?what@exception@@UBEPBDXZ, ??1exception@@UAE@XZ, ??0exception@@QAE@ABV0@@Z, ??0exception@@QAE@ABQBDH@Z, ??0exception@@QAE@ABQBD@Z, _callnewh, malloc, wcsncmp, wcsrchr, free, _purecall, ??3@YAXPAX@Z, memcpy_s, ??_V@YAXPAX@Z, __CxxFrameHandler3, _amsg_exit, memset
    ATL.DLL
    KERNEL32.dllCreateFileMappingW, FreeLibrary, LoadResource, FindResourceExW, UnmapViewOfFile, GetVersionExW, GetLocaleInfoW, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, SearchPathW, MapViewOfFile, GetTickCount, GetSystemTimeAsFileTime, LoadLibraryExW, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, GetModuleFileNameW, ReleaseSRWLockExclusive, Sleep, IsWow64Process, SetConsoleTitleW, GetFileType, VerifyVersionInfoW, GetProcAddress, GetModuleHandleW, GetCurrentThreadId, GetModuleHandleExW, GetStartupInfoW, VerSetConditionMask, FindFirstFileW, SetErrorMode, LocalFree, CompareStringW, WriteConsoleW, SetLastError, GetLastError, GetCurrentProcess, GetStdHandle, WriteFile, FormatMessageW, ExpandEnvironmentStringsW, GetFileAttributesW, CreateFileW, FindClose, SetThreadUILanguage, AcquireSRWLockExclusive, CloseHandle
    OLEAUT32.dllSysAllocString, SafeArrayPutElement, VariantClear, SafeArrayCreate, SysFreeString, SysStringLen
    ADVAPI32.dllRegOpenKeyExW, RegEnumKeyExW, RegQueryValueExW, RegCloseKey, RegGetValueW
    OLE32.dllCoUninitialize, CoInitializeEx, CoInitialize, PropVariantClear, CoTaskMemAlloc, CoCreateInstance
    USER32.dllLoadStringW
    mscoree.dllCorBindToRuntimeEx
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Target ID:0
    Start time:08:43:59
    Start date:18/07/2022
    Path:C:\Users\user\Desktop\powershell.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\powershell.exe"
    Imagebase:0xac0000
    File size:433152 bytes
    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:.Net C# or VB.NET
    Reputation:moderate

    Target ID:1
    Start time:08:43:59
    Start date:18/07/2022
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff77f440000
    File size:625664 bytes
    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly