Windows
Analysis Report
e2mzbWePHw.exe
Overview
General Information
Sample name: | e2mzbWePHw.exerenamed because original name is a hash value |
Original sample name: | 23b25ce90f70ffa0435db8df6a6764f2.exe |
Analysis ID: | 1569819 |
MD5: | 23b25ce90f70ffa0435db8df6a6764f2 |
SHA1: | 72d0c052f26309704f13c090495c3cdea4ed1bf2 |
SHA256: | 9165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Discord Token Stealer, Millenuim RAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Discord Token Stealer
Yara detected Millenuim RAT
Yara detected Telegram RAT
Yara detected Telegram Recon
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Uses the Telegram API (likely for C&C communication)
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Classification
- System is w10x64
e2mzbWePHw.exe (PID: 7308 cmdline:
"C:\Users\ user\Deskt op\e2mzbWe PHw.exe" MD5: 23B25CE90F70FFA0435DB8DF6A6764F2) cmd.exe (PID: 7560 cmdline:
"C:\Window s\System32 \cmd.exe" /C C:\User s\user\App Data\Local \Temp\tmpE D0E.tmp.ba t & Del C: \Users\use r\AppData\ Local\Temp \tmpED0E.t mp.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) chcp.com (PID: 7616 cmdline:
chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32) tasklist.exe (PID: 7632 cmdline:
Tasklist / fi "PID eq 7308" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) find.exe (PID: 7648 cmdline:
find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) timeout.exe (PID: 7676 cmdline:
Timeout /T 1 /Nobrea k MD5: 100065E21CFBBDE57CBA2838921F84D6) tasklist.exe (PID: 7696 cmdline:
Tasklist / fi "PID eq 7308" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) find.exe (PID: 7704 cmdline:
find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) timeout.exe (PID: 7740 cmdline:
Timeout /T 1 /Nobrea k MD5: 100065E21CFBBDE57CBA2838921F84D6) Update.exe (PID: 7760 cmdline:
"C:\Users\ user\AppDa ta\Roaming \GoogleChr omeUpdateL og\Update. exe" MD5: 23B25CE90F70FFA0435DB8DF6A6764F2) cmd.exe (PID: 7960 cmdline:
"C:\Window s\System32 \cmd.exe" /c reg add HKCU\Soft ware\Micro soft\Windo ws\Current Version\Ru n /v Chrom eUpdate /t REG_SZ /d C:\Users\ user\AppDa ta\Roaming \GoogleChr omeUpdateL og\Update. exe /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) reg.exe (PID: 8012 cmdline:
reg add HK CU\Softwar e\Microsof t\Windows\ CurrentVer sion\Run / v ChromeUp date /t RE G_SZ /d C: \Users\use r\AppData\ Roaming\Go ogleChrome UpdateLog\ Update.exe /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
Update.exe (PID: 8172 cmdline:
"C:\Users\ user\AppDa ta\Roaming \GoogleChr omeUpdateL og\Update. exe" MD5: 23B25CE90F70FFA0435DB8DF6A6764F2) cmd.exe (PID: 6988 cmdline:
"C:\Window s\System32 \cmd.exe" /c reg add HKCU\Soft ware\Micro soft\Windo ws\Current Version\Ru n /v Chrom eUpdate /t REG_SZ /d C:\Users\ user\AppDa ta\Roaming \GoogleChr omeUpdateL og\Update. exe /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 5524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) reg.exe (PID: 4920 cmdline:
reg add HK CU\Softwar e\Microsof t\Windows\ CurrentVer sion\Run / v ChromeUp date /t RE G_SZ /d C: \Users\use r\AppData\ Roaming\Go ogleChrome UpdateLog\ Update.exe /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
Update.exe (PID: 6584 cmdline:
"C:\Users\ user\AppDa ta\Roaming \GoogleChr omeUpdateL og\Update. exe" MD5: 23B25CE90F70FFA0435DB8DF6A6764F2)
- cleanup