Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
onedrive.bat.exe

Overview

General Information

Sample Name:onedrive.bat.exe
Analysis ID:829696
MD5:c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1:f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA256:73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
Errors
  • Corrupt sample or wrongly selected analyzer. Details: C000007B

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Uses 32bit PE files
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w7x64
  • onedrive.bat.exe (PID: 2948 cmdline: C:\Users\user\Desktop\onedrive.bat.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: onedrive.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: onedrive.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbUGP source: onedrive.bat.exe
Source: Binary string: powershell.pdb source: onedrive.bat.exe
Source: onedrive.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: onedrive.bat.exe, 00000001.00000000.890072128.0000000000D14000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe
Source: onedrive.bat.exeBinary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe
Source: onedrive.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: onedrive.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbUGP source: onedrive.bat.exe
Source: Binary string: powershell.pdb source: onedrive.bat.exe
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
No Mitre Att&ck techniques found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
onedrive.bat.exe0%ReversingLabs
onedrive.bat.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:37.0.0 Beryl
Analysis ID:829696
Start date and time:2023-03-19 00:07:03 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 1m 53s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample file name:onedrive.bat.exe
Detection:CLEAN
Classification:clean1.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Unable to launch sample, stop analysis
  • Corrupt sample or wrongly selected analyzer. Details: C000007B
  • Exclude process from analysis (whitelisted): dllhost.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):5.502549953174867
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:onedrive.bat.exe
File size:433152
MD5:c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1:f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA256:73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA512:6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
SSDEEP:6144:MF45pGVc4sqEoWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:95pGVcwW2KXzJ4pdd3klnnWosPhnzq
TLSH:B5947C8367D45295EC3FC431DC3745610622BCBDDBD09BDB99C8B6390A702D09A3EA6B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......".z.fg..fg..fg..x5..dg..o...lg..r...eg..r...}g..fg...g..r...cg..r...og..r...ng..r...gg..r...gg..Richfg.........................
Icon Hash:14ec98b2b8e4d600
Entrypoint:0x40afc0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x30F12F73 [Mon Jan 8 14:51:31 1996 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:194427a488ed1dd0a91731658b071667
Instruction
call 00007F92052BB895h
jmp 00007F92052BAF1Eh
jmp dword ptr [004121F4h]
cmp ecx, dword ptr [00411368h]
jne 00007F92052BB145h
retn 0000h
jmp 00007F92052BB30Bh
int3
int3
mov edi, edi
push ebp
mov ebp, esp
push esi
mov esi, 004113A4h
push esi
call dword ptr [004120E8h]
mov ecx, dword ptr [00411360h]
mov eax, dword ptr [ebp+08h]
inc ecx
mov dword ptr [00411360h], ecx
push esi
mov dword ptr [eax], ecx
mov eax, dword ptr fs:[0000002Ch]
mov ecx, dword ptr [004116DCh]
mov ecx, dword ptr [eax+ecx*4]
mov eax, dword ptr [00411360h]
mov dword ptr [ecx+00000004h], eax
call dword ptr [00412078h]
push 004113A8h
call dword ptr [00412070h]
pop esi
pop ebp
ret
mov edi, edi
push ebp
mov ebp, esp
push esi
push edi
mov edi, 004113A4h
push edi
call dword ptr [004120E8h]
mov esi, dword ptr [ebp+08h]
cmp dword ptr [esi], 00000000h
jne 00007F92052BB151h
or dword ptr [esi], FFFFFFFFh
jmp 00007F92052BB16Bh
push 00000000h
call 00007F92052BB172h
pop ecx
jmp 00007F92052BB12Eh
cmp dword ptr [esi], FFFFFFFFh
je 00007F92052BB133h
mov eax, dword ptr fs:[0000002Ch]
mov ecx, dword ptr [004116DCh]
mov ecx, dword ptr [eax+ecx*4]
mov eax, dword ptr [00411360h]
mov dword ptr [ecx+00000004h], eax
push edi
call dword ptr [00412078h]
pop edi
pop esi
Programming Language:
  • [IMP] VS2008 build 21022
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x122080xb4.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x57d88.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6b0000x127c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x49000x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x16940x18.text
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x15e80xac.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x120000x204.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf35c0xf400False0.457367443647541data5.675599809360563IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x110000x9380x400False0.439453125data4.3874403980662935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x120000xcd80xe00False0.44614955357142855data5.292395568542356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x130000x57d880x57e00False0.3494065611664296data5.3056762942545195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6b0000x127c0x1400False0.7013671875data6.257290188908493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
MUI0x6acb00xd8dataEnglishUnited States
RT_ICON0x13c480x2fbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
RT_ICON0x16c080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
RT_ICON0x1ae300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
RT_ICON0x1d3d80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States
RT_ICON0x1ee400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
RT_ICON0x1fee80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
RT_ICON0x208700x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States
RT_ICON0x20f280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
RT_ICON0x214080x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States
RT_ICON0x21a700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States
RT_ICON0x21d580x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States
RT_ICON0x21f400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States
RT_ICON0x220680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States
RT_ICON0x22f100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States
RT_ICON0x237b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States
RT_ICON0x23e800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States
RT_ICON0x243e80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States
RT_ICON0x664100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
RT_ICON0x689b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
RT_ICON0x69a600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
RT_ICON0x6a3e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
RT_GROUP_ICON0x213900x76dataEnglishUnited States
RT_GROUP_ICON0x6a8500xbcdataEnglishUnited States
RT_VERSION0x6a9100x39cOpenPGP Secret KeyEnglishUnited States
RT_MANIFEST0x135a00x6a3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
DLLImport
msvcrt.dll_onexit, __dllonexit, _unlock, _lock, _initterm, __setusermatherr, __p__fmode, _cexit, _exit, exit, __set_app_type, __wgetmainargs, ?terminate@@YAXXZ, __p__commode, ??1type_info@@UAE@XZ, _controlfp, _XcptFilter, _except_handler4_common, memcmp, _vsnwprintf, _wcsicmp, _wcsnicmp, bsearch, fclose, _wfopen, _itow_s, wcstoul, wcschr, __uncaught_exception, memmove, memcpy, _CxxThrowException, ?what@exception@@UBEPBDXZ, ??1exception@@UAE@XZ, ??0exception@@QAE@ABV0@@Z, ??0exception@@QAE@ABQBDH@Z, ??0exception@@QAE@ABQBD@Z, _callnewh, malloc, wcsncmp, wcsrchr, free, _purecall, ??3@YAXPAX@Z, memcpy_s, ??_V@YAXPAX@Z, __CxxFrameHandler3, _amsg_exit, memset
ATL.DLL
KERNEL32.dllCreateFileMappingW, FreeLibrary, LoadResource, FindResourceExW, UnmapViewOfFile, GetVersionExW, GetLocaleInfoW, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, SearchPathW, MapViewOfFile, GetTickCount, GetSystemTimeAsFileTime, LoadLibraryExW, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, GetModuleFileNameW, ReleaseSRWLockExclusive, Sleep, IsWow64Process, SetConsoleTitleW, GetFileType, VerifyVersionInfoW, GetProcAddress, GetModuleHandleW, GetCurrentThreadId, GetModuleHandleExW, GetStartupInfoW, VerSetConditionMask, FindFirstFileW, SetErrorMode, LocalFree, CompareStringW, WriteConsoleW, SetLastError, GetLastError, GetCurrentProcess, GetStdHandle, WriteFile, FormatMessageW, ExpandEnvironmentStringsW, GetFileAttributesW, CreateFileW, FindClose, SetThreadUILanguage, AcquireSRWLockExclusive, CloseHandle
OLEAUT32.dllSysAllocString, SafeArrayPutElement, VariantClear, SafeArrayCreate, SysFreeString, SysStringLen
ADVAPI32.dllRegOpenKeyExW, RegEnumKeyExW, RegQueryValueExW, RegCloseKey, RegGetValueW
OLE32.dllCoUninitialize, CoInitializeEx, CoInitialize, PropVariantClear, CoTaskMemAlloc, CoCreateInstance
USER32.dllLoadStringW
mscoree.dllCorBindToRuntimeEx
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

Click to jump to process

Click to jump to process

Target ID:1
Start time:00:07:12
Start date:19/03/2023
Path:C:\Users\user\Desktop\onedrive.bat.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\onedrive.bat.exe
Imagebase:0xcb0000
File size:433152 bytes
MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

No disassembly