Windows
Analysis Report
nEnq-0023HHHDDJKSS1000025.pif.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
nEnq-0023HHHDDJKSS1000025.pif.exe (PID: 892 cmdline:
"C:\Users\ user\Deskt op\nEnq-00 23HHHDDJKS S1000025.p if.exe" MD5: 09BB5446AD9055B9A1CB449DB99A7302) RegAsm.exe (PID: 7724 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) chrome.exe (PID: 7864 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --di sable-fre --no-defau lt-browser -check --n o-first-ru n --no-san dbox --all ow-no-sand box-job -- disable-gp u --mute-a udio --dis able-audio --user-da ta-dir="C: \Users\use r\AppData\ Local\Temp \ijysk4js. yew" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8080 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --no-sandb ox --mute- audio --us er-data-di r="C:\User s\user\App Data\Local \Temp\ijys k4js.yew" --no-pre-r ead-main-d ll --field -trial-han dle=2120,i ,175475874 1578942583 1,18257902 3599426243 57,262144 --variatio ns-seed-ve rsion --mo jo-platfor m-channel- handle=239 6 /prefetc h:3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7880 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=crashpa d-handler --user-dat a-dir=C:\U sers\user\ AppData\Lo cal\Temp\i jysk4js.ye w /prefetc h:4 --moni tor-self-a nnotation= ptype=cras hpad-handl er --datab ase=C:\Use rs\user\Ap pData\Loca l\Temp\ijy sk4js.yew\ Crashpad - -metrics-d ir=C:\User s\user\App Data\Local \Temp\ijys k4js.yew - -url=https ://clients 2.google.c om/cr/repo rt --annot ation=chan nel= --ann otation=pl at=Win64 - -annotatio n=prod=Chr ome --anno tation=ver =134.0.699 8.36 --ini tial-clien t-data=0x1 08,0x10c,0 x110,0xe4, 0x114,0x7f fc9d1b4f38 ,0x7ffc9d1 b4f44,0x7f fc9d1b4f50 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8056 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=gpu-pro cess --no- sandbox -- user-data- dir="C:\Us ers\user\A ppData\Loc al\Temp\ij ysk4js.yew " --no-pre -read-main -dll --gpu -preferenc es=UAAAAAA AAADgAAAEA AAAAAAAAAA AAAAAAABgA AAAAAAAAAA AAAAAAAAAA AACAAAAAAA AAAAAAAAAA AAAAAAAABA AAAAAAAAAE AAAAAAAAAA IAAAAAAAAA AgAAAAAAAA A --use-gl =angle --u se-angle=s wiftshader -webgl --f ield-trial -handle=21 20,i,17547 5874157894 25831,1825 7902359942 624357,262 144 --vari ations-see d-version --mojo-pla tform-chan nel-handle =2116 /pre fetch:2 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5900 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\ijysk4js .yew" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=24 -- time-ticks -at-unix-e poch=-1747 1897635772 84 --launc h-time-tic ks=1604827 86 --field -trial-han dle=2120,i ,175475874 1578942583 1,18257902 3599426243 57,262144 --variatio ns-seed-ve rsion --mo jo-platfor m-channel- handle=542 8 /prefetc h:1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7184 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\ijysk4js .yew" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=5 --t ime-ticks- at-unix-ep och=-17471 8976357728 4 --launch -time-tick s=15532728 6 --field- trial-hand le=2120,i, 1754758741 5789425831 ,182579023 5994262435 7,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=3088 /prefetch :1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5744 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\ijysk4js .yew" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=9 --t ime-ticks- at-unix-ep och=-17471 8976357728 4 --launch -time-tick s=15578137 5 --field- trial-hand le=2120,i, 1754758741 5789425831 ,182579023 5994262435 7,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=3664 /prefetch :1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 520 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= storage.mo jom.Storag eService - -lang=en-G B --servic e-sandbox- type=servi ce --no-sa ndbox --mu te-audio - -user-data -dir="C:\U sers\user\ AppData\Lo cal\Temp\i jysk4js.ye w" --no-pr e-read-mai n-dll --fi eld-trial- handle=212 0,i,175475 8741578942 5831,18257 9023599426 24357,2621 44 --varia tions-seed -version - -mojo-plat form-chann el-handle= 2468 /pref etch:8 MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
⊘No reasoning have been found
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-05-14T04:31:58.416175+0200 | 2048902 | 1 | A Network Trojan was detected | 192.168.2.4 | 49722 | 91.92.120.101 | 62520 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-05-14T04:31:56.456247+0200 | 2861085 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49722 | 91.92.120.101 | 62520 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Neural Call Log Analysis: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |