ScreenShot
Created | 2023.07.08 14:10 | Machine | s1_win7_x6403 |
Filename | conhost.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | |||
VT API (file) | 33 detected (AIDetectMalware, malicious, high confidence, GenericKD, Vkem, Eldorado, Attribute, HighConfidence, 7Zip, score, Gencbl, CoinMiner, rxdbb, BtcMine, Artemis, ai score=88, Casdet, JX8ESL, unsafe, PossibleThreat, grayware, confidence) | ||
md5 | 197cf1b5f5228af677c04341b43b58f0 | ||
sha256 | cdffe175d69a7b4c7fb9e7fa2aef3f266ce8af7d03d3859ec5b3f82cb72c9797 | ||
ssdeep | 49152:UN5dggyvdBuCn5VuUxZDI1I1WYHl7MPx3fT7W2OgZtjiVaJdV9hy/1cG:UN5dalxn7TDNRl7MPhS2OgZlig9hyNcG | ||
imphash | f6baa5eaa8231d4fe8e922a2e6d240ea | ||
impfuzzy | 96:dZeusdRf+3s4+ycMVTXpZI6sSD+/+RGIXUo/zqr1:HeusdSKwZYSD+/9IXn/er1 |
Network IP location
Signature (30cnts)
Level | Description |
---|---|
danger | File has been identified by 33 AntiVirus engines on VirusTotal as malicious |
watch | A process attempted to delay the analysis task. |
watch | Attempts to create or modify system certificates |
watch | Installs itself for autorun at Windows startup |
watch | Looks for the Windows Idle Time to determine the uptime |
watch | One or more of the buffers contains an embedded PE file |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | Queries for the computername |
info | The executable uses a known packer |
info | Uses Windows APIs to generate a cryptographic key |
Rules (53cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_Trojan_Emotet_2_Zero | Win32 Trojan Emotet | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | Suspicious_Obfuscation_Script_2 | Suspicious obfuscation script (e.g. executable files) | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | Network_Downloader | File Downloader | memory |
watch | schtasks_Zero | task schedule | memory |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
watch | Win32_Trojan_PWS_Net_1_Zero | Win32 Trojan PWS .NET Azorult | binaries (download) |
notice | Code_injection | Code injection with CreateRemoteThread in a remote process | memory |
notice | Create_Service | Create a windows service | memory |
notice | Escalate_priviledges | Escalate priviledges | memory |
notice | Generic_PWS_Memory_Zero | PWS Memory | memory |
notice | KeyLogger | Run a KeyLogger | memory |
notice | local_credential_Steal | Steal credential | memory |
notice | Network_DGA | Communication using DGA | memory |
notice | Network_DNS | Communications use DNS | memory |
notice | Network_FTP | Communications over FTP | memory |
notice | Network_HTTP | Communications over HTTP | memory |
notice | Network_P2P_Win | Communications over P2P network | memory |
notice | Network_TCP_Socket | Communications over RAW Socket | memory |
notice | ScreenShot | Take ScreenShot | memory |
notice | Sniff_Audio | Record Audio | memory |
notice | Str_Win32_Http_API | Match Windows Http API call | memory |
notice | Str_Win32_Internet_API | Match Windows Inet API call | memory |
info | anti_dbg | Checks if being debugged | memory |
info | antisb_threatExpert | Anti-Sandbox checks for ThreatExpert | memory |
info | Check_Dlls | (no description) | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerCheck__RemoteAPI | (no description) | memory |
info | DebuggerException__ConsoleCtrl | (no description) | memory |
info | DebuggerException__SetConsoleCtrl | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | vmdetect_misc | Following Rule is referenced from AlienVault's Yara rule repository.This rule contains additional processes and driver names. | memory |
info | win_hook | Affect hook table | memory |
info | zip_file_format | ZIP file format | binaries (download) |
Network (13cnts) ?
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
PE API
IAT(Import Address Table) Library
COMCTL32.dll
0x41a010 None
SHELL32.dll
0x41a25c SHGetSpecialFolderPathW
0x41a260 ShellExecuteW
0x41a264 SHGetMalloc
0x41a268 SHGetPathFromIDListW
0x41a26c SHBrowseForFolderW
0x41a270 SHGetFileInfoW
0x41a274 ShellExecuteExW
GDI32.dll
0x41a018 CreateCompatibleDC
0x41a01c CreateFontIndirectW
0x41a020 DeleteObject
0x41a024 DeleteDC
0x41a028 GetCurrentObject
0x41a02c StretchBlt
0x41a030 GetDeviceCaps
0x41a034 CreateCompatibleBitmap
0x41a038 SelectObject
0x41a03c SetStretchBltMode
0x41a040 GetObjectW
ADVAPI32.dll
0x41a000 FreeSid
0x41a004 AllocateAndInitializeSid
0x41a008 CheckTokenMembership
USER32.dll
0x41a27c GetWindowLongW
0x41a280 GetMenu
0x41a284 SetWindowPos
0x41a288 GetWindowDC
0x41a28c ReleaseDC
0x41a290 GetDlgItem
0x41a294 GetParent
0x41a298 GetWindowRect
0x41a29c GetClassNameA
0x41a2a0 CreateWindowExW
0x41a2a4 SetTimer
0x41a2a8 GetMessageW
0x41a2ac DispatchMessageW
0x41a2b0 KillTimer
0x41a2b4 DestroyWindow
0x41a2b8 SendMessageW
0x41a2bc EndDialog
0x41a2c0 wsprintfW
0x41a2c4 GetWindowTextW
0x41a2c8 GetWindowTextLengthW
0x41a2cc GetSysColor
0x41a2d0 wsprintfA
0x41a2d4 SetWindowTextW
0x41a2d8 MessageBoxA
0x41a2dc ScreenToClient
0x41a2e0 GetClientRect
0x41a2e4 SetWindowLongW
0x41a2e8 UnhookWindowsHookEx
0x41a2ec SetFocus
0x41a2f0 GetSystemMetrics
0x41a2f4 SystemParametersInfoW
0x41a2f8 ShowWindow
0x41a2fc DrawTextW
0x41a300 GetDC
0x41a304 ClientToScreen
0x41a308 GetWindow
0x41a30c DialogBoxIndirectParamW
0x41a310 DrawIconEx
0x41a314 CallWindowProcW
0x41a318 DefWindowProcW
0x41a31c CallNextHookEx
0x41a320 PtInRect
0x41a324 SetWindowsHookExW
0x41a328 LoadImageW
0x41a32c LoadIconW
0x41a330 MessageBeep
0x41a334 EnableWindow
0x41a338 IsWindow
0x41a33c EnableMenuItem
0x41a340 GetSystemMenu
0x41a344 CreateWindowExA
0x41a348 wvsprintfW
0x41a34c CharUpperW
0x41a350 GetKeyState
0x41a354 CopyImage
ole32.dll
0x41a35c CreateStreamOnHGlobal
0x41a360 CoCreateInstance
0x41a364 CoInitialize
OLEAUT32.dll
0x41a248 VariantClear
0x41a24c SysFreeString
0x41a250 OleLoadPicture
0x41a254 SysAllocString
KERNEL32.dll
0x41a048 GetFileSize
0x41a04c SetFilePointer
0x41a050 ReadFile
0x41a054 WaitForMultipleObjects
0x41a058 GetModuleHandleA
0x41a05c SetFileTime
0x41a060 SetEndOfFile
0x41a064 LeaveCriticalSection
0x41a068 EnterCriticalSection
0x41a06c DeleteCriticalSection
0x41a070 FormatMessageW
0x41a074 lstrcpyW
0x41a078 LocalFree
0x41a07c IsBadReadPtr
0x41a080 GetSystemDirectoryW
0x41a084 GetCurrentThreadId
0x41a088 SuspendThread
0x41a08c TerminateThread
0x41a090 InitializeCriticalSection
0x41a094 ResetEvent
0x41a098 SetEvent
0x41a09c CreateEventW
0x41a0a0 GetVersionExW
0x41a0a4 GetModuleFileNameW
0x41a0a8 GetCurrentProcess
0x41a0ac SetProcessWorkingSetSize
0x41a0b0 SetCurrentDirectoryW
0x41a0b4 GetDriveTypeW
0x41a0b8 CreateFileW
0x41a0bc GetCommandLineW
0x41a0c0 GetStartupInfoW
0x41a0c4 CreateProcessW
0x41a0c8 CreateJobObjectW
0x41a0cc ResumeThread
0x41a0d0 AssignProcessToJobObject
0x41a0d4 CreateIoCompletionPort
0x41a0d8 SetInformationJobObject
0x41a0dc GetQueuedCompletionStatus
0x41a0e0 GetExitCodeProcess
0x41a0e4 CloseHandle
0x41a0e8 SetEnvironmentVariableW
0x41a0ec GetTempPathW
0x41a0f0 GetSystemTimeAsFileTime
0x41a0f4 lstrlenW
0x41a0f8 CompareFileTime
0x41a0fc SetThreadLocale
0x41a100 FindFirstFileW
0x41a104 DeleteFileW
0x41a108 FindNextFileW
0x41a10c FindClose
0x41a110 RemoveDirectoryW
0x41a114 ExpandEnvironmentStringsW
0x41a118 WideCharToMultiByte
0x41a11c VirtualAlloc
0x41a120 GlobalMemoryStatusEx
0x41a124 lstrcmpW
0x41a128 GetEnvironmentVariableW
0x41a12c lstrcmpiW
0x41a130 lstrlenA
0x41a134 GetLocaleInfoW
0x41a138 MultiByteToWideChar
0x41a13c GetUserDefaultUILanguage
0x41a140 GetSystemDefaultUILanguage
0x41a144 GetSystemDefaultLCID
0x41a148 lstrcmpiA
0x41a14c GlobalAlloc
0x41a150 GlobalFree
0x41a154 MulDiv
0x41a158 FindResourceExA
0x41a15c SizeofResource
0x41a160 LoadResource
0x41a164 LockResource
0x41a168 LoadLibraryA
0x41a16c GetProcAddress
0x41a170 GetModuleHandleW
0x41a174 ExitProcess
0x41a178 lstrcatW
0x41a17c GetDiskFreeSpaceExW
0x41a180 SetFileAttributesW
0x41a184 SetLastError
0x41a188 Sleep
0x41a18c GetExitCodeThread
0x41a190 WaitForSingleObject
0x41a194 CreateThread
0x41a198 GetLastError
0x41a19c SystemTimeToFileTime
0x41a1a0 GetLocalTime
0x41a1a4 GetFileAttributesW
0x41a1a8 CreateDirectoryW
0x41a1ac WriteFile
0x41a1b0 GetStdHandle
0x41a1b4 VirtualFree
0x41a1b8 GetStartupInfoA
MSVCRT.dll
0x41a1c0 ??3@YAXPAX@Z
0x41a1c4 ??2@YAPAXI@Z
0x41a1c8 memcmp
0x41a1cc free
0x41a1d0 memcpy
0x41a1d4 _wtol
0x41a1d8 _controlfp
0x41a1dc _except_handler3
0x41a1e0 __set_app_type
0x41a1e4 __p__fmode
0x41a1e8 __p__commode
0x41a1ec _adjust_fdiv
0x41a1f0 __setusermatherr
0x41a1f4 _initterm
0x41a1f8 __getmainargs
0x41a1fc _acmdln
0x41a200 exit
0x41a204 _XcptFilter
0x41a208 _exit
0x41a20c ??1type_info@@UAE@XZ
0x41a210 _onexit
0x41a214 __dllonexit
0x41a218 _CxxThrowException
0x41a21c _beginthreadex
0x41a220 _EH_prolog
0x41a224 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
0x41a228 memset
0x41a22c _wcsnicmp
0x41a230 strncmp
0x41a234 wcsncmp
0x41a238 malloc
0x41a23c memmove
0x41a240 _purecall
EAT(Export Address Table) is none
COMCTL32.dll
0x41a010 None
SHELL32.dll
0x41a25c SHGetSpecialFolderPathW
0x41a260 ShellExecuteW
0x41a264 SHGetMalloc
0x41a268 SHGetPathFromIDListW
0x41a26c SHBrowseForFolderW
0x41a270 SHGetFileInfoW
0x41a274 ShellExecuteExW
GDI32.dll
0x41a018 CreateCompatibleDC
0x41a01c CreateFontIndirectW
0x41a020 DeleteObject
0x41a024 DeleteDC
0x41a028 GetCurrentObject
0x41a02c StretchBlt
0x41a030 GetDeviceCaps
0x41a034 CreateCompatibleBitmap
0x41a038 SelectObject
0x41a03c SetStretchBltMode
0x41a040 GetObjectW
ADVAPI32.dll
0x41a000 FreeSid
0x41a004 AllocateAndInitializeSid
0x41a008 CheckTokenMembership
USER32.dll
0x41a27c GetWindowLongW
0x41a280 GetMenu
0x41a284 SetWindowPos
0x41a288 GetWindowDC
0x41a28c ReleaseDC
0x41a290 GetDlgItem
0x41a294 GetParent
0x41a298 GetWindowRect
0x41a29c GetClassNameA
0x41a2a0 CreateWindowExW
0x41a2a4 SetTimer
0x41a2a8 GetMessageW
0x41a2ac DispatchMessageW
0x41a2b0 KillTimer
0x41a2b4 DestroyWindow
0x41a2b8 SendMessageW
0x41a2bc EndDialog
0x41a2c0 wsprintfW
0x41a2c4 GetWindowTextW
0x41a2c8 GetWindowTextLengthW
0x41a2cc GetSysColor
0x41a2d0 wsprintfA
0x41a2d4 SetWindowTextW
0x41a2d8 MessageBoxA
0x41a2dc ScreenToClient
0x41a2e0 GetClientRect
0x41a2e4 SetWindowLongW
0x41a2e8 UnhookWindowsHookEx
0x41a2ec SetFocus
0x41a2f0 GetSystemMetrics
0x41a2f4 SystemParametersInfoW
0x41a2f8 ShowWindow
0x41a2fc DrawTextW
0x41a300 GetDC
0x41a304 ClientToScreen
0x41a308 GetWindow
0x41a30c DialogBoxIndirectParamW
0x41a310 DrawIconEx
0x41a314 CallWindowProcW
0x41a318 DefWindowProcW
0x41a31c CallNextHookEx
0x41a320 PtInRect
0x41a324 SetWindowsHookExW
0x41a328 LoadImageW
0x41a32c LoadIconW
0x41a330 MessageBeep
0x41a334 EnableWindow
0x41a338 IsWindow
0x41a33c EnableMenuItem
0x41a340 GetSystemMenu
0x41a344 CreateWindowExA
0x41a348 wvsprintfW
0x41a34c CharUpperW
0x41a350 GetKeyState
0x41a354 CopyImage
ole32.dll
0x41a35c CreateStreamOnHGlobal
0x41a360 CoCreateInstance
0x41a364 CoInitialize
OLEAUT32.dll
0x41a248 VariantClear
0x41a24c SysFreeString
0x41a250 OleLoadPicture
0x41a254 SysAllocString
KERNEL32.dll
0x41a048 GetFileSize
0x41a04c SetFilePointer
0x41a050 ReadFile
0x41a054 WaitForMultipleObjects
0x41a058 GetModuleHandleA
0x41a05c SetFileTime
0x41a060 SetEndOfFile
0x41a064 LeaveCriticalSection
0x41a068 EnterCriticalSection
0x41a06c DeleteCriticalSection
0x41a070 FormatMessageW
0x41a074 lstrcpyW
0x41a078 LocalFree
0x41a07c IsBadReadPtr
0x41a080 GetSystemDirectoryW
0x41a084 GetCurrentThreadId
0x41a088 SuspendThread
0x41a08c TerminateThread
0x41a090 InitializeCriticalSection
0x41a094 ResetEvent
0x41a098 SetEvent
0x41a09c CreateEventW
0x41a0a0 GetVersionExW
0x41a0a4 GetModuleFileNameW
0x41a0a8 GetCurrentProcess
0x41a0ac SetProcessWorkingSetSize
0x41a0b0 SetCurrentDirectoryW
0x41a0b4 GetDriveTypeW
0x41a0b8 CreateFileW
0x41a0bc GetCommandLineW
0x41a0c0 GetStartupInfoW
0x41a0c4 CreateProcessW
0x41a0c8 CreateJobObjectW
0x41a0cc ResumeThread
0x41a0d0 AssignProcessToJobObject
0x41a0d4 CreateIoCompletionPort
0x41a0d8 SetInformationJobObject
0x41a0dc GetQueuedCompletionStatus
0x41a0e0 GetExitCodeProcess
0x41a0e4 CloseHandle
0x41a0e8 SetEnvironmentVariableW
0x41a0ec GetTempPathW
0x41a0f0 GetSystemTimeAsFileTime
0x41a0f4 lstrlenW
0x41a0f8 CompareFileTime
0x41a0fc SetThreadLocale
0x41a100 FindFirstFileW
0x41a104 DeleteFileW
0x41a108 FindNextFileW
0x41a10c FindClose
0x41a110 RemoveDirectoryW
0x41a114 ExpandEnvironmentStringsW
0x41a118 WideCharToMultiByte
0x41a11c VirtualAlloc
0x41a120 GlobalMemoryStatusEx
0x41a124 lstrcmpW
0x41a128 GetEnvironmentVariableW
0x41a12c lstrcmpiW
0x41a130 lstrlenA
0x41a134 GetLocaleInfoW
0x41a138 MultiByteToWideChar
0x41a13c GetUserDefaultUILanguage
0x41a140 GetSystemDefaultUILanguage
0x41a144 GetSystemDefaultLCID
0x41a148 lstrcmpiA
0x41a14c GlobalAlloc
0x41a150 GlobalFree
0x41a154 MulDiv
0x41a158 FindResourceExA
0x41a15c SizeofResource
0x41a160 LoadResource
0x41a164 LockResource
0x41a168 LoadLibraryA
0x41a16c GetProcAddress
0x41a170 GetModuleHandleW
0x41a174 ExitProcess
0x41a178 lstrcatW
0x41a17c GetDiskFreeSpaceExW
0x41a180 SetFileAttributesW
0x41a184 SetLastError
0x41a188 Sleep
0x41a18c GetExitCodeThread
0x41a190 WaitForSingleObject
0x41a194 CreateThread
0x41a198 GetLastError
0x41a19c SystemTimeToFileTime
0x41a1a0 GetLocalTime
0x41a1a4 GetFileAttributesW
0x41a1a8 CreateDirectoryW
0x41a1ac WriteFile
0x41a1b0 GetStdHandle
0x41a1b4 VirtualFree
0x41a1b8 GetStartupInfoA
MSVCRT.dll
0x41a1c0 ??3@YAXPAX@Z
0x41a1c4 ??2@YAPAXI@Z
0x41a1c8 memcmp
0x41a1cc free
0x41a1d0 memcpy
0x41a1d4 _wtol
0x41a1d8 _controlfp
0x41a1dc _except_handler3
0x41a1e0 __set_app_type
0x41a1e4 __p__fmode
0x41a1e8 __p__commode
0x41a1ec _adjust_fdiv
0x41a1f0 __setusermatherr
0x41a1f4 _initterm
0x41a1f8 __getmainargs
0x41a1fc _acmdln
0x41a200 exit
0x41a204 _XcptFilter
0x41a208 _exit
0x41a20c ??1type_info@@UAE@XZ
0x41a210 _onexit
0x41a214 __dllonexit
0x41a218 _CxxThrowException
0x41a21c _beginthreadex
0x41a220 _EH_prolog
0x41a224 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
0x41a228 memset
0x41a22c _wcsnicmp
0x41a230 strncmp
0x41a234 wcsncmp
0x41a238 malloc
0x41a23c memmove
0x41a240 _purecall
EAT(Export Address Table) is none