Windows Analysis Report
Scan.exe

Overview

General Information

Sample name: Scan.exe
Analysis ID: 1431280
MD5: 42832db85ef430c08794a3b8125c6739
SHA1: a9e8838247edac1e67a61406839b1c05821735f9
SHA256: 5a351a6f459836b952ae45a564add378ddad3b6b725e7b63f831b84f679c3818
Tags: exe
Infos:

Detection

Score: 76
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Found potential dummy code loops (likely to delay analysis)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: Scan.exe ReversingLabs: Detection: 13%

Exploits

barindex
Source: Yara match File source: 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Scan.exe PID: 2380, type: MEMORYSTR
Source: Scan.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Scan.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F3C2D9 0_2_00007FF848F3C2D9
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F3F2E9 0_2_00007FF848F3F2E9
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F32130 0_2_00007FF848F32130
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F34B08 0_2_00007FF848F34B08
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F453D8 0_2_00007FF848F453D8
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F39690 0_2_00007FF848F39690
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F39698 0_2_00007FF848F39698
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F31099 0_2_00007FF848F31099
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F3C761 0_2_00007FF848F3C761
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F44C19 0_2_00007FF848F44C19
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F45431 0_2_00007FF848F45431
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF848F40C8A 0_2_00007FF848F40C8A
Source: Scan.exe Static PE information: No import functions for PE file found
Source: Scan.exe, 00000000.00000000.1978205571.00000123279D8000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameAracewed: vs Scan.exe
Source: Scan.exe Binary or memory string: OriginalFilenameAracewed: vs Scan.exe
Source: classification engine Classification label: mal76.expl.evad.winEXE@2/0@0/0
Source: C:\Users\user\Desktop\Scan.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5020:120:WilError_03
Source: Scan.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Scan.exe Static file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
Source: C:\Users\user\Desktop\Scan.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Scan.exe ReversingLabs: Detection: 13%
Source: C:\Users\user\Desktop\Scan.exe File read: C:\Users\user\Desktop\Scan.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Scan.exe "C:\Users\user\Desktop\Scan.exe"
Source: C:\Users\user\Desktop\Scan.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Scan.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll Jump to behavior
Source: Scan.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Scan.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Scan.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Scan.exe Static PE information: 0xC318C86A [Thu Sep 21 01:01:30 2073 UTC]
Source: C:\Users\user\Desktop\Scan.exe Code function: 0_2_00007FF84900026B push esp; retf 4810h 0_2_00007FF849000312
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: Scan.exe PID: 2380, type: MEMORYSTR
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: WINE_GET_UNIX_FILE_NAME
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\Scan.exe Memory allocated: 12327EA0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Memory allocated: 12341740000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Window / User API: threadDelayed 1628 Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Window / User API: threadDelayed 8343 Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe TID: 2520 Thread sleep count: 1628 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe TID: 2520 Thread sleep time: -1628000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe TID: 2788 Thread sleep count: 8343 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe TID: 2788 Thread sleep time: -8343000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe System information queried: CurrentTimeZoneInformation Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: VMware
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmware
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: VMWARE
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: VMware SVGA II

Anti Debugging

barindex
Source: C:\Users\user\Desktop\Scan.exe Process Stats: CPU usage > 42% for more than 60s
Source: C:\Users\user\Desktop\Scan.exe Process token adjusted: Debug Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Scan.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Scan.exe, setPercentGroupSeparatorDefaultMemberAttribute.cs Reference to suspicious API methods: ((DigitShapesCollapsed)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(WriteWaiterSignaledAction14(UseUserOverrideFunc7.AnsiCodePageSTAThreadAttribute)), WriteWaiterSignaledAction14(UseUserOverrideFunc7.setNumberDecimalSeparatorWriteHalfLittleEndian)), typeof(DigitShapesCollapsed)))("Address", out var _)
Source: Scan.exe, setPercentGroupSeparatorDefaultMemberAttribute.cs Reference to suspicious API methods: ((DigitShapesCollapsed)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(WriteWaiterSignaledAction14(UseUserOverrideFunc7.AnsiCodePageSTAThreadAttribute)), WriteWaiterSignaledAction14(UseUserOverrideFunc7.setNumberDecimalSeparatorWriteHalfLittleEndian)), typeof(DigitShapesCollapsed)))("Address", out var _)
Source: Scan.exe, setPercentGroupSeparatorDefaultMemberAttribute.cs Reference to suspicious API methods: VirtualProtect(procAddress, (uint)array.Length, 64u, out var EnsureSufficientExecutionStackgetFullyQualifiedName)
Source: C:\Users\user\Desktop\Scan.exe Queries volume information: C:\Users\user\Desktop\Scan.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Scan.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
No contacted IP infos