Windows
Analysis Report
conhost.exe
Overview
General Information
Detection
CryptOne, SystemBC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected CryptOne packer
Yara detected SystemBC
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Found evasive API chain (may stop execution after checking a module file name)
Creates job files (autostart)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality to record screenshots
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Extensive use of GetProcAddress (often used to hide API calls)
Tries to load missing DLLs
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Classification
- System is w10x64
conhost.exe (PID: 3648 cmdline:
C:\Users\u ser\Deskto p\conhost. exe MD5: 8C9DCA7A1D21E402C885D50AF18737D1)
conhost.exe (PID: 3924 cmdline:
C:\Users\u ser\Deskto p\conhost. exe start MD5: 8C9DCA7A1D21E402C885D50AF18737D1)
- cleanup
{"HOST1": "207.148.1.174", "HOST2": "146.70.53.169", "PORT1": "443", "TOR": ""}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
EXT_MAL_SystemBC_Mar22_1 | Detects unpacked SystemBC module as used by Emotet in March 2022 | Thomas Barabosch, Deutsche Telekom Security |
| |
JoeSecurity_SystemBC | Yara detected SystemBC | Joe Security | ||
MALWARE_Win_EXEPWSH_DLAgent | Detects SystemBC | ditekSHen |
| |
EXT_MAL_SystemBC_Mar22_1 | Detects unpacked SystemBC module as used by Emotet in March 2022 | Thomas Barabosch, Deutsche Telekom Security |
| |
JoeSecurity_SystemBC | Yara detected SystemBC | Joe Security | ||
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
EXT_MAL_SystemBC_Mar22_1 | Detects unpacked SystemBC module as used by Emotet in March 2022 | Thomas Barabosch, Deutsche Telekom Security |
| |
JoeSecurity_SystemBC | Yara detected SystemBC | Joe Security | ||
MALWARE_Win_EXEPWSH_DLAgent | Detects SystemBC | ditekSHen |
| |
EXT_MAL_SystemBC_Mar22_1 | Detects unpacked SystemBC module as used by Emotet in March 2022 | Thomas Barabosch, Deutsche Telekom Security |
| |
JoeSecurity_SystemBC | Yara detected SystemBC | Joe Security | ||
Click to see the 7 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | IP Address: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: |