Windows
Analysis Report
2cB42TzofC
Overview
General Information
Sample Name: | 2cB42TzofC (renamed file extension from none to exe) |
Analysis ID: | 565576 |
MD5: | f47ddf38902e6e745ae49168bc55c0fc |
SHA1: | e7cc7bd70b128d63ef1e54345d6b97d8fd02ffb8 |
SHA256: | 0d2ada23e3ed12fff4c0e31377f1f577bcca7694b73545049a36f443d6c83215 |
Tags: | 32exetrojan |
Infos: | |
Errors
|
Detection
PhoenixKeylogger
Score: | 66 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected PhoenixKeylogger
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Execution from Suspicious Folder
Sigma detected: WScript or CScript Dropper
Contains functionality to capture screen (.Net source)
.NET source code references suspicious native API functions
Uses shutdown.exe to shutdown or reboot the system
Sigma detected: Suspicious Remote Thread Created
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
PE file contains sections with non-standard names
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to communicate with device drivers
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Enables debug privileges
AV process strings found (often used to terminate AV products)
File is packed with WinRar
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Sigma detected: Suspicious Outbound SMTP Connections
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found WSH timer for Javascript or VBS script (likely evasive script)
Classification
- System is w10x64
2cB42TzofC.exe (PID: 6400 cmdline:
"C:\Users\ user\Deskt op\2cB42Tz ofC.exe" MD5: F47DDF38902E6E745AE49168BC55C0FC) systems.exe (PID: 2880 cmdline:
"C:\Users\ Public\Dow nloads\sys tems.exe" MD5: 9FBC8CDC78C518EBF6774752EC178B13) explorer.exe (PID: 6304 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 160 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 6040 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 7076 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 6196 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 6496 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 2584 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) explorer.exe (PID: 6824 cmdline:
"C:\Window s\System32 \explorer. exe" C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7) wscript.exe (PID: 6976 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \Downloads \vbs.vbs" MD5: 7075DD7B9BE8807FCA93ACD86F724884) cmd.exe (PID: 7076 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\Public\D ownloads\v bs.bat" " MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 7072 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) shutdown.exe (PID: 5936 cmdline:
shutdown - r -t 50 MD5: E2EB9CC0FE26E28406FB6F82F8E81B26)
explorer.exe (PID: 6756 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
explorer.exe (PID: 4324 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
explorer.exe (PID: 2920 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
explorer.exe (PID: 6912 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
explorer.exe (PID: 360 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
explorer.exe (PID: 5292 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
explorer.exe (PID: 4104 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D)
- cleanup
{"Exfil Mode": "SMTP", "To": "emre.alagoz.44@gmail.com", "From": "keylogar99@gmail.com", "SMTP Server": "smtp.gmail.com", "Password": "10203040eam.", "port": "587"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PhoenixKeylogger | Yara detected PhoenixKeylogger | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen |
| |
MALWARE_Win_Phoenix | Phoenix/404KeyLogger keylogger payload | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PhoenixKeylogger | Yara detected PhoenixKeylogger | Joe Security | ||
MALWARE_Win_Phoenix | Phoenix/404KeyLogger keylogger payload | ditekSHen |
| |
JoeSecurity_PhoenixKeylogger | Yara detected PhoenixKeylogger | Joe Security | ||
MALWARE_Win_Phoenix | Phoenix/404KeyLogger keylogger payload | ditekSHen |
| |
JoeSecurity_PhoenixKeylogger | Yara detected PhoenixKeylogger | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PhoenixKeylogger | Yara detected PhoenixKeylogger | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen |
| |
MALWARE_Win_Phoenix | Phoenix/404KeyLogger keylogger payload | ditekSHen |
|