Edit tour
Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
AI detected suspicious sample
Drops PE files with a suspicious file extension
Machine Learning detection for sample
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- file.exe (PID: 2504 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: DB7B43084F7A44E3290774E36D49CE41) - cmd.exe (PID: 1368 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Su nset Sunse t.bat & Su nset.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4584 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 3428 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 2872 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 824 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 2008 cmdline:
findstr /I "avastui avgui bdse rvicehost nswscsvc s ophoshealt h" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 2688 cmdline:
cmd /c md 182349 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 5752 cmdline:
findstr /V "RefundAl ienConserv ativeChapt ers" Coral MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6640 cmdline:
cmd /c cop y /b ..\Ca use + ..\S hopper + . .\Edges + ..\Zinc + ..\Correla tion + ..\ Wearing + ..\Provisi on + ..\Re s l MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Beginners.pif (PID: 7092 cmdline:
Beginners. pif l MD5: 18CE19B57F43CE0A5AF149C96AECC685) - cmd.exe (PID: 1900 cmdline:
cmd /k ech o [Interne tShortcut] > "C:\Use rs\user\Ap pData\Roam ing\Micros oft\Window s\Start Me nu\Program s\Startup\ TradeHub.u rl" & echo URL="C:\U sers\user\ AppData\Lo cal\TradeO ptimize Dy namics\Tra deHub.js" >> "C:\Use rs\user\Ap pData\Roam ing\Micros oft\Window s\Start Me nu\Program s\Startup\ TradeHub.u rl" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 5996 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- wscript.exe (PID: 2416 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\TradeOp timize Dyn amics\Trad eHub.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - TradeHub.scr (PID: 1460 cmdline:
"C:\Users\ user\AppDa ta\Local\T radeOptimi ze Dynamic s\TradeHub .scr" "C:\ Users\user \AppData\L ocal\Trade Optimize D ynamics\z" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Max Altgelt (Nextron Systems): |
Source: | Author: Christopher Peacock @securepeacock, SCYTHE @scythe_io: |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B | |
Source: | Code function: | 10_2_00114005 | |
Source: | Code function: | 10_2_0011494A | |
Source: | Code function: | 10_2_00113CE2 | |
Source: | Code function: | 10_2_0011C2FF | |
Source: | Code function: | 10_2_0011CD14 | |
Source: | Code function: | 10_2_0011CD9F | |
Source: | Code function: | 10_2_0011F5D8 | |
Source: | Code function: | 10_2_0011F735 | |
Source: | Code function: | 10_2_0011FA36 | |
Source: | Code function: | 15_2_00DC4005 | |
Source: | Code function: | 15_2_00DC494A | |
Source: | Code function: | 15_2_00DCC2FF | |
Source: | Code function: | 15_2_00DCCD9F | |
Source: | Code function: | 15_2_00DCCD14 | |
Source: | Code function: | 15_2_00DCF5D8 | |
Source: | Code function: | 15_2_00DCF735 | |
Source: | Code function: | 15_2_00DCFA36 | |
Source: | Code function: | 15_2_00DC3CE2 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 10_2_001229BA |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 10_2_00124830 | |
Source: | Code function: | 15_2_00DD4830 |
Source: | Code function: | 10_2_00124632 |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 10_2_0013D164 | |
Source: | Code function: | 15_2_00DED164 |
System Summary |
---|
Source: | COM Object queried: | Jump to behavior |
Source: | Code function: | 10_2_00114254 |
Source: | Code function: | 10_2_00108F2E |
Source: | Code function: | 0_2_00403883 | |
Source: | Code function: | 10_2_00115778 | |
Source: | Code function: | 15_2_00DC5778 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB | |
Source: | Code function: | 10_2_000BB020 | |
Source: | Code function: | 10_2_000B94E0 | |
Source: | Code function: | 10_2_000B9C80 | |
Source: | Code function: | 10_2_000D23F5 | |
Source: | Code function: | 10_2_00138400 | |
Source: | Code function: | 10_2_000E6502 | |
Source: | Code function: | 10_2_000E265E | |
Source: | Code function: | 10_2_000BE6F0 | |
Source: | Code function: | 10_2_000D282A | |
Source: | Code function: | 10_2_000E89BF | |
Source: | Code function: | 10_2_00130A3A | |
Source: | Code function: | 10_2_000E6A74 | |
Source: | Code function: | 10_2_000C0BE0 | |
Source: | Code function: | 10_2_000DCD51 | |
Source: | Code function: | 10_2_0010EDB2 | |
Source: | Code function: | 10_2_00118E44 | |
Source: | Code function: | 10_2_00130EB7 | |
Source: | Code function: | 10_2_000E6FE6 | |
Source: | Code function: | 10_2_000D33B7 | |
Source: | Code function: | 10_2_000DF409 | |
Source: | Code function: | 10_2_000CD45D | |
Source: | Code function: | 10_2_000CF628 | |
Source: | Code function: | 10_2_000B1663 | |
Source: | Code function: | 10_2_000BF6A0 | |
Source: | Code function: | 10_2_000D16B4 | |
Source: | Code function: | 10_2_000D78C3 | |
Source: | Code function: | 10_2_000D1BA8 | |
Source: | Code function: | 10_2_000DDBA5 | |
Source: | Code function: | 10_2_000E9CE5 | |
Source: | Code function: | 10_2_000CDD28 | |
Source: | Code function: | 10_2_000D1FC0 | |
Source: | Code function: | 10_2_000DBFD6 | |
Source: | Code function: | 15_2_00D6B020 | |
Source: | Code function: | 15_2_00D694E0 | |
Source: | Code function: | 15_2_00D69C80 | |
Source: | Code function: | 15_2_00D823F5 | |
Source: | Code function: | 15_2_00DE8400 | |
Source: | Code function: | 15_2_00D96502 | |
Source: | Code function: | 15_2_00D6E6F0 | |
Source: | Code function: | 15_2_00D9265E | |
Source: | Code function: | 15_2_00D8282A | |
Source: | Code function: | 15_2_00D989BF | |
Source: | Code function: | 15_2_00D96A74 | |
Source: | Code function: | 15_2_00DE0A3A | |
Source: | Code function: | 15_2_00D70BE0 | |
Source: | Code function: | 15_2_00DBEDB2 | |
Source: | Code function: | 15_2_00D8CD51 | |
Source: | Code function: | 15_2_00DE0EB7 | |
Source: | Code function: | 15_2_00DC8E44 | |
Source: | Code function: | 15_2_00D96FE6 | |
Source: | Code function: | 15_2_00D833B7 | |
Source: | Code function: | 15_2_00D7D45D | |
Source: | Code function: | 15_2_00D8F409 | |
Source: | Code function: | 15_2_00D816B4 | |
Source: | Code function: | 15_2_00D6F6A0 | |
Source: | Code function: | 15_2_00D61663 | |
Source: | Code function: | 15_2_00D7F628 | |
Source: | Code function: | 15_2_00D878C3 | |
Source: | Code function: | 15_2_00D81BA8 | |
Source: | Code function: | 15_2_00D8DBA5 | |
Source: | Code function: | 15_2_00D99CE5 | |
Source: | Code function: | 15_2_00D7DD28 | |
Source: | Code function: | 15_2_00D8BFD6 | |
Source: | Code function: | 15_2_00D81FC0 |
Source: | Dropped File: | ||
Source: | Dropped File: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 10_2_0011A6AD |
Source: | Code function: | 10_2_00108DE9 | |
Source: | Code function: | 10_2_00109399 | |
Source: | Code function: | 15_2_00DB8DE9 | |
Source: | Code function: | 15_2_00DB9399 |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 10_2_00114148 |
Source: | Code function: | 0_2_004024FB |
Source: | Code function: | 10_2_0011443D |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |