Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
onedrive.bat.exe

Overview

General Information

Sample Name:onedrive.bat.exe
Analysis ID:829696
MD5:c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1:f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA256:73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Queries the installation date of Windows
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Enables debug privileges

Classification

  • System is w10x64native
  • onedrive.bat.exe (PID: 4720 cmdline: C:\Users\user\Desktop\onedrive.bat.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 6244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: onedrive.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: onedrive.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbUGP source: onedrive.bat.exe
Source: Binary string: powershell.pdb source: onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000003.103961663238.0000000002954000.00000004.00000020.00020000.00000000.sdmp, onedrive.bat.exe, 00000002.00000002.105188091472.000000000295D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: onedrive.bat.exe, 00000002.00000003.103961663238.0000000002954000.00000004.00000020.00020000.00000000.sdmp, onedrive.bat.exe, 00000002.00000002.105188091472.000000000295D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6LR
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
Source: onedrive.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048C5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Management.Automation.dllv+ vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\000004B0\\OriginalFilename vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000000.103939392812.0000000000564000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Management.Automation.dllv+ vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000048A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\000004B0\\OriginalFilename vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105188091472.00000000028B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs onedrive.bat.exe
Source: onedrive.bat.exe, 00000002.00000002.105194211165.00000000049F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs onedrive.bat.exe
Source: onedrive.bat.exeBinary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe
Source: C:\Users\user\Desktop\onedrive.bat.exeSection loaded: edgegdi.dll
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_047DEBC8
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_047DEBB8
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CB81B8
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CB81B1
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CF6D18
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFEAC8
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CF9150
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFEABD
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE7DA8
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE2478
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE8ED0
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE5E90
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE4678
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE3C60
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EEB240
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EE3218
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07F00040
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07F0ED92
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07F052C0
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07F052B8
Source: onedrive.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\onedrive.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\onedrive.bat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
Source: unknownProcess created: C:\Users\user\Desktop\onedrive.bat.exe C:\Users\user\Desktop\onedrive.bat.exe
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\onedrive.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77F10CF0-3DB5-4966-B520-B7C54FD35ED6}\InProcServer32
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6244:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6244:120:WilError_03
Source: onedrive.bat.exeJoe Sandbox Cloud Basic: Detection: clean Score: 6Perma Link
Source: C:\Users\user\Desktop\onedrive.bat.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tw0strn3.bud.ps1Jump to behavior
Source: classification engineClassification label: clean5.winEXE@2/2@0/0
Source: C:\Users\user\Desktop\onedrive.bat.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: onedrive.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: onedrive.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbUGP source: onedrive.bat.exe
Source: Binary string: powershell.pdb source: onedrive.bat.exe
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CB3798 push esi; retf 0007h
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CB3787 push ebx; retf 0007h
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CB57B0 push esp; retf 0007h
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CB3C10 push edi; retf 0007h
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFDA58 push 0807CA01h; retn 076Ah
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFE659 push es; retf 0007h
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFE8FD push 00000007h; ret
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFF589 push cs; retf 0007h
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CF7380 push 00000007h; ret
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CF9022 push eax; retf
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07EEAA6A push 8B059113h; iretd
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\onedrive.bat.exeWindow / User API: threadDelayed 7690
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\onedrive.bat.exeMemory allocated: page read and write | page guard
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\onedrive.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDate
Source: C:\Users\user\Desktop\onedrive.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\onedrive.bat.exeCode function: 2_2_07CFDE0C CreateNamedPipeW,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
DLL Side-Loading
2
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
Process Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
2
Process Injection
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager22
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 829696 Sample: onedrive.bat.exe Startdate: 19/03/2023 Architecture: WINDOWS Score: 0 5 onedrive.bat.exe 8 2->5         started        process3 7 conhost.exe 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
onedrive.bat.exe0%VirustotalBrowse
onedrive.bat.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://aka.ms/pscore6LRonedrive.bat.exe, 00000002.00000002.105194211165.00000000048D3000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    https://aka.ms/pscore6lBonedrive.bat.exe, 00000002.00000002.105194211165.00000000048F1000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameonedrive.bat.exe, 00000002.00000002.105194211165.00000000048D3000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        No contacted IP infos
        Joe Sandbox Version:37.0.0 Beryl
        Analysis ID:829696
        Start date and time:2023-03-19 00:09:28 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 26s
        Hypervisor based Inspection enabled:false
        Report type:light
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:onedrive.bat.exe
        Detection:CLEAN
        Classification:clean5.winEXE@2/2@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe
        • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, ctldl.windowsupdate.com, wdcp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\onedrive.bat.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Reputation:high, very likely benign file
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Users\user\Desktop\onedrive.bat.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Reputation:high, very likely benign file
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        File type:PE32 executable (console) Intel 80386, for MS Windows
        Entropy (8bit):5.502549953174867
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:onedrive.bat.exe
        File size:433152
        MD5:c32ca4acfcc635ec1ea6ed8a34df5fac
        SHA1:f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
        SHA256:73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
        SHA512:6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
        SSDEEP:6144:MF45pGVc4sqEoWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:95pGVcwW2KXzJ4pdd3klnnWosPhnzq
        TLSH:B5947C8367D45295EC3FC431DC3745610622BCBDDBD09BDB99C8B6390A702D09A3EA6B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......".z.fg..fg..fg..x5..dg..o...lg..r...eg..r...}g..fg...g..r...cg..r...og..r...ng..r...gg..r...gg..Richfg.........................
        Icon Hash:14ec98b2b8e4d600
        Entrypoint:0x40afc0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
        Time Stamp:0x30F12F73 [Mon Jan 8 14:51:31 1996 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:10
        OS Version Minor:0
        File Version Major:10
        File Version Minor:0
        Subsystem Version Major:10
        Subsystem Version Minor:0
        Import Hash:194427a488ed1dd0a91731658b071667
        Instruction
        call 00007F70DC413925h
        jmp 00007F70DC412FAEh
        jmp dword ptr [004121F4h]
        cmp ecx, dword ptr [00411368h]
        jne 00007F70DC4131D5h
        retn 0000h
        jmp 00007F70DC41339Bh
        int3
        int3
        mov edi, edi
        push ebp
        mov ebp, esp
        push esi
        mov esi, 004113A4h
        push esi
        call dword ptr [004120E8h]
        mov ecx, dword ptr [00411360h]
        mov eax, dword ptr [ebp+08h]
        inc ecx
        mov dword ptr [00411360h], ecx
        push esi
        mov dword ptr [eax], ecx
        mov eax, dword ptr fs:[0000002Ch]
        mov ecx, dword ptr [004116DCh]
        mov ecx, dword ptr [eax+ecx*4]
        mov eax, dword ptr [00411360h]
        mov dword ptr [ecx+00000004h], eax
        call dword ptr [00412078h]
        push 004113A8h
        call dword ptr [00412070h]
        pop esi
        pop ebp
        ret
        mov edi, edi
        push ebp
        mov ebp, esp
        push esi
        push edi
        mov edi, 004113A4h
        push edi
        call dword ptr [004120E8h]
        mov esi, dword ptr [ebp+08h]
        cmp dword ptr [esi], 00000000h
        jne 00007F70DC4131E1h
        or dword ptr [esi], FFFFFFFFh
        jmp 00007F70DC4131FBh
        push 00000000h
        call 00007F70DC413202h
        pop ecx
        jmp 00007F70DC4131BEh
        cmp dword ptr [esi], FFFFFFFFh
        je 00007F70DC4131C3h
        mov eax, dword ptr fs:[0000002Ch]
        mov ecx, dword ptr [004116DCh]
        mov ecx, dword ptr [eax+ecx*4]
        mov eax, dword ptr [00411360h]
        mov dword ptr [ecx+00000004h], eax
        push edi
        call dword ptr [00412078h]
        pop edi
        pop esi
        Programming Language:
        • [IMP] VS2008 build 21022
        • [IMP] VS2008 SP1 build 30729
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x122080xb4.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x57d88.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6b0000x127c.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x49000x54.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x16940x18.text
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x15e80xac.text
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x120000x204.idata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xf35c0xf400False0.457367443647541data5.675599809360563IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .data0x110000x9380x400False0.439453125data4.3874403980662935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0x120000xcd80xe00False0.44614955357142855data5.292395568542356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x130000x57d880x57e00False0.3494065611664296data5.3056762942545195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x6b0000x127c0x1400False0.7013671875data6.257290188908493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        MUI0x6acb00xd8dataEnglishUnited States
        RT_ICON0x13c480x2fbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
        RT_ICON0x16c080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
        RT_ICON0x1ae300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
        RT_ICON0x1d3d80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States
        RT_ICON0x1ee400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
        RT_ICON0x1fee80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
        RT_ICON0x208700x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States
        RT_ICON0x20f280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
        RT_ICON0x214080x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States
        RT_ICON0x21a700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States
        RT_ICON0x21d580x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States
        RT_ICON0x21f400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States
        RT_ICON0x220680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States
        RT_ICON0x22f100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States
        RT_ICON0x237b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States
        RT_ICON0x23e800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States
        RT_ICON0x243e80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States
        RT_ICON0x664100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
        RT_ICON0x689b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
        RT_ICON0x69a600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
        RT_ICON0x6a3e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
        RT_GROUP_ICON0x213900x76dataEnglishUnited States
        RT_GROUP_ICON0x6a8500xbcdataEnglishUnited States
        RT_VERSION0x6a9100x39cOpenPGP Secret KeyEnglishUnited States
        RT_MANIFEST0x135a00x6a3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
        DLLImport
        msvcrt.dll_onexit, __dllonexit, _unlock, _lock, _initterm, __setusermatherr, __p__fmode, _cexit, _exit, exit, __set_app_type, __wgetmainargs, ?terminate@@YAXXZ, __p__commode, ??1type_info@@UAE@XZ, _controlfp, _XcptFilter, _except_handler4_common, memcmp, _vsnwprintf, _wcsicmp, _wcsnicmp, bsearch, fclose, _wfopen, _itow_s, wcstoul, wcschr, __uncaught_exception, memmove, memcpy, _CxxThrowException, ?what@exception@@UBEPBDXZ, ??1exception@@UAE@XZ, ??0exception@@QAE@ABV0@@Z, ??0exception@@QAE@ABQBDH@Z, ??0exception@@QAE@ABQBD@Z, _callnewh, malloc, wcsncmp, wcsrchr, free, _purecall, ??3@YAXPAX@Z, memcpy_s, ??_V@YAXPAX@Z, __CxxFrameHandler3, _amsg_exit, memset
        ATL.DLL
        KERNEL32.dllCreateFileMappingW, FreeLibrary, LoadResource, FindResourceExW, UnmapViewOfFile, GetVersionExW, GetLocaleInfoW, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, SearchPathW, MapViewOfFile, GetTickCount, GetSystemTimeAsFileTime, LoadLibraryExW, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, GetModuleFileNameW, ReleaseSRWLockExclusive, Sleep, IsWow64Process, SetConsoleTitleW, GetFileType, VerifyVersionInfoW, GetProcAddress, GetModuleHandleW, GetCurrentThreadId, GetModuleHandleExW, GetStartupInfoW, VerSetConditionMask, FindFirstFileW, SetErrorMode, LocalFree, CompareStringW, WriteConsoleW, SetLastError, GetLastError, GetCurrentProcess, GetStdHandle, WriteFile, FormatMessageW, ExpandEnvironmentStringsW, GetFileAttributesW, CreateFileW, FindClose, SetThreadUILanguage, AcquireSRWLockExclusive, CloseHandle
        OLEAUT32.dllSysAllocString, SafeArrayPutElement, VariantClear, SafeArrayCreate, SysFreeString, SysStringLen
        ADVAPI32.dllRegOpenKeyExW, RegEnumKeyExW, RegQueryValueExW, RegCloseKey, RegGetValueW
        OLE32.dllCoUninitialize, CoInitializeEx, CoInitialize, PropVariantClear, CoTaskMemAlloc, CoCreateInstance
        USER32.dllLoadStringW
        mscoree.dllCorBindToRuntimeEx
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

        Click to jump to process

        Target ID:2
        Start time:00:11:22
        Start date:19/03/2023
        Path:C:\Users\user\Desktop\onedrive.bat.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\onedrive.bat.exe
        Imagebase:0x500000
        File size:433152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:moderate

        Target ID:3
        Start time:00:11:22
        Start date:19/03/2023
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff744690000
        File size:875008 bytes
        MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        No disassembly