Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report


General Information

Sample Name:file.exe
Analysis ID:753425


Range:0 - 100


Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)


  • System is w10x64
  • file.exe (PID: 6084 cmdline: C:\Users\user\Desktop\file.exe MD5: 2ED741014B8CDAFD91A740432A3CFFA1)
    • is-QPTG8.tmp (PID: 6080 cmdline: "C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp" /SL4 $40228 "C:\Users\user\Desktop\file.exe" 1252960 51712 MD5: 85B94E72C3F2D2B5464E2AAF3C9E242A)
      • PrintFolders.exe (PID: 4532 cmdline: "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" MD5: 2ABBE052537A4C836AFE8DBAC888F131)
        • uywwtiNQ.exe (PID: 6120 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 1336 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "PrintFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 1760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 3416 cmdline: taskkill /im "PrintFolders.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["", "", "", ""]}
00000002.00000002.325696039.0000000001660000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000002.00000002.326103420.00000000033A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      00000002.00000002.325006522.0000000000400000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
        2.2.PrintFolders.exe.400000.1.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          2.2.PrintFolders.exe.400000.1.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            2.2.PrintFolders.exe.33a0000.3.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              2.2.PrintFolders.exe.33a0000.3.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                Source: Reputation: Label: malware
                Source: h