Windows
Analysis Report
BSN100357-HHGBM100002525.exe
Overview
General Information
Detection
ResolverRAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected ResolverRAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses threadpools to delay analysis
Classification
- System is w10x64
BSN100357-HHGBM100002525.exe (PID: 6716 cmdline:
"C:\Users\ user\Deskt op\BSN1003 57-HHGBM10 0002525.ex e" MD5: 6FF95E302E8374E4E1023FBEC625F44B) InstallUtil.exe (PID: 7460 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Ins tallUtil.e xe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57) chrome.exe (PID: 7592 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --di sable-fre --no-defau lt-browser -check --n o-first-ru n --no-san dbox --all ow-no-sand box-job -- disable-gp u --mute-a udio --dis able-audio --user-da ta-dir="C: \Users\use r\AppData\ Local\Temp \aznorh3w. y1u" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7808 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --no-sandb ox --mute- audio --us er-data-di r="C:\User s\user\App Data\Local \Temp\azno rh3w.y1u" --no-pre-r ead-main-d ll --field -trial-han dle=2424,i ,167665314 0025807003 1,17892965 2888246815 17,262144 --variatio ns-seed-ve rsion --mo jo-platfor m-channel- handle=240 0 /prefetc h:3 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8188 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\aznorh3w .y1u" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=7 --t ime-ticks- at-unix-ep och=-17503 3058913369 2 --launch -time-tick s=14456629 3 --field- trial-hand le=2424,i, 1676653140 0258070031 ,178929652 8882468151 7,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=3792 /prefetch :1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8048 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\aznorh3w .y1u" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=5 --t ime-ticks- at-unix-ep och=-17503 3058913369 2 --launch -time-tick s=14421994 4 --field- trial-hand le=2424,i, 1676653140 0258070031 ,178929652 8882468151 7,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=3272 /prefetch :1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7608 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=crashpa d-handler --user-dat a-dir=C:\U sers\user\ AppData\Lo cal\Temp\a znorh3w.y1 u /prefetc h:4 --moni tor-self-a nnotation= ptype=cras hpad-handl er --datab ase=C:\Use rs\user\Ap pData\Loca l\Temp\azn orh3w.y1u\ Crashpad - -metrics-d ir=C:\User s\user\App Data\Local \Temp\azno rh3w.y1u - -url=https ://clients 2.google.c om/cr/repo rt --annot ation=chan nel= --ann otation=pl at=Win64 - -annotatio n=prod=Chr ome --anno tation=ver =134.0.699 8.36 --ini tial-clien t-data=0x1 04,0x108,0 x10c,0x100 ,0x84,0x7f f8eb2d4f38 ,0x7ff8eb2 d4f44,0x7f f8eb2d4f50 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 1560 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\aznorh3w .y1u" --ex tension-pr ocess --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=8 --t ime-ticks- at-unix-ep och=-17503 3058913369 2 --launch -time-tick s=14457798 7 --field- trial-hand le=2424,i, 1676653140 0258070031 ,178929652 8882468151 7,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=3856 /prefetch :2 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7308 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\aznorh3w .y1u" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=9 --t ime-ticks- at-unix-ep och=-17503 3058913369 2 --launch -time-tick s=14461067 6 --field- trial-hand le=2424,i, 1676653140 0258070031 ,178929652 8882468151 7,262144 - -variation s-seed-ver sion --moj o-platform -channel-h andle=4176 /prefetch :1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7800 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=gpu-pro cess --no- sandbox -- user-data- dir="C:\Us ers\user\A ppData\Loc al\Temp\az norh3w.y1u " --no-pre -read-main -dll --gpu -preferenc es=UAAAAAA AAADgAAAEA AAAAAAAAAA AAAAAAABgA AAAAAAAAAA AAAAAAAAAA AACAAAAAAA AAAAAAAAAA AAAAAAAABA AAAAAAAAAE AAAAAAAAAA IAAAAAAAAA AgAAAAAAAA A --use-gl =angle --u se-angle=s wiftshader -webgl --f ield-trial -handle=24 24,i,16766 5314002580 70031,1789 2965288824 681517,262 144 --vari ations-see d-version --mojo-pla tform-chan nel-handle =2420 /pre fetch:2 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 7920 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= storage.mo jom.Storag eService - -lang=en-G B --servic e-sandbox- type=servi ce --no-sa ndbox --mu te-audio - -user-data -dir="C:\U sers\user\ AppData\Lo cal\Temp\a znorh3w.y1 u" --no-pr e-read-mai n-dll --fi eld-trial- handle=242 4,i,167665 3140025807 0031,17892 9652888246 81517,2621 44 --varia tions-seed -version - -mojo-plat form-chann el-handle= 2540 /pref etch:8 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 8044 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\aznorh3w .y1u" --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=24 -- time-ticks -at-unix-e poch=-1750 3305891336 92 --launc h-time-tic ks=1497731 76 --field -trial-han dle=2424,i ,167665314 0025807003 1,17892965 2888246815 17,262144 --variatio ns-seed-ve rsion --mo jo-platfor m-channel- handle=551 6 /prefetc h:1 MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5020 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=rendere r --user-d ata-dir="C :\Users\us er\AppData \Local\Tem p\aznorh3w .y1u" --ex tension-pr ocess --en able-dinos aur-easter -egg-alt-i mages --no -pre-read- main-dll - -no-sandbo x --disabl e-gpu-comp ositing -- video-capt ure-use-gp u-memory-b uffer --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=48 -- time-ticks -at-unix-e poch=-1750 3305891336 92 --launc h-time-tic ks=1652623 86 --field -trial-han dle=2424,i ,167665314 0025807003 1,17892965 2888246815 17,262144 --variatio ns-seed-ve rsion --mo jo-platfor m-channel- handle=557 6 /prefetc h:2 MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
## Malware Analysis Summary
The sample BSN100357-HHGBM100002525.exe is a .NET-based information stealer identified as ResolverRAT that employs process injection and browser manipulation techniques for credential harvesting.
### Initial Access
The malware executes as BSN100357-HHGBM100002525.exe (PID 6716) from the user's Desktop directory, initiating the infection chain.
### Evasion Techniques
The malware implements multiple anti-analysis measures:
- Sandbox detection by checking for SBIEDLL.DLL and other dynamic analysis indicators
- Anti-VM techniques to evade virtualized analysis environments
- Uses the legitimate InstallUtil.exe process as a host for malicious activities to appear benign
### Payload Execution and Staging
BSN100357-HHGBM100002525.exe spawns InstallUtil.exe (PID 7460) and injects malicious PE files into it. The injected InstallUtil.exe process then performs thread injection into multiple Chrome browser processes, creating a complex execution chain that obscures the malware's activities. The malware contains large array initializations and unpacker functionality, suggesting it dynamically loads additional components at runtime.
### Data Theft
The injected InstallUtil.exe process conducts extensive credential harvesting:
- Browser data theft targeting Chrome cookies, login credentials, and web data
- Bitcoin wallet information extraction from registry keys
- Putty/WinSCP session and password harvesting
- Microsoft Outlook mail credential theft through registry access
### Network Activity
InstallUtil.exe establishes TCP communication with the command and control server at 91.92.120.101:65535, indicating active data exfiltration or remote control capabilities.
### Process Relationships
The execution flow follows: BSN100357-HHGBM100002525.exe InstallUtil.exe (injected) Chrome processes (thread injection). The malware launches Chrome with specific parameters including a custom user data directory and disabled security features to facilitate data extraction.
### MITRE ATT&CK TTPs
- T1055 - Process Injection (PE injection into InstallUtil.exe and thread injection into Chrome)
- T1055.002 - Portable Executable Injection
- T1555.003 - Credentials from Web Browsers
- T1539 - Steal Web Session Cookies
- T1012 - Query Registry (credential harvesting)
- T1071.001 - Application Layer Protocol: Web Protocols (C2 communication)
- T1497 - Virtualization/Sandbox Evasion
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Perez Diego (@darkquassar), oscd.community: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Neural Call Log Analysis: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_067EFC30 | |
Source: | Code function: | 0_2_067EFC27 | |
Source: | Code function: | 0_2_06C3F7FD | |
Source: | Code function: | 0_2_06C3FBD9 | |
Source: | Code function: | 0_2_06C3F808 |
Source: | Memory has grown: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |