Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IJr8RvvhZ3.exe

Overview

General Information

Sample Name:IJr8RvvhZ3.exe
Analysis ID:694560
MD5:b77359bc85030f5f856b8010c0ddf6a8
SHA1:5bff219a3d20203a239a23db69385f2611e67f5d
SHA256:afd36e5d309ba8576b7e6a31ab1b3af4c3c0530052a2c31b97c688c0e2515005
Tags:exe
Infos:

Detection

Gandcrab, ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected ReflectiveLoader
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Creates multiple autostart registry keys
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to determine the online IP of the system
Found Tor onion address
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Queries information about the installed CPU (vendor, model number etc)
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Contains functionality to enumerate device drivers
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • IJr8RvvhZ3.exe (PID: 732 cmdline: "C:\Users\user\Desktop\IJr8RvvhZ3.exe" MD5: B77359BC85030F5F856B8010C0DDF6A8)
  • mqsmvj.exe (PID: 4652 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 476 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 5964 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 5524 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 3824 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 5304 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 4828 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 2228 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 244 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 4940 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 4864 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 5160 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 5636 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 2564 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 4956 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 4480 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 5768 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 6000 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 916 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • mqsmvj.exe (PID: 3780 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exe" MD5: 937D3395BC50812DBAB14034E2FCC25B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
IJr8RvvhZ3.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
  • 0xef92:$x1: ReflectiveLoader
IJr8RvvhZ3.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
  • 0xe8fe:$: DECRYPT.txt
  • 0xe964:$: DECRYPT.txt
IJr8RvvhZ3.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
    IJr8RvvhZ3.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
    • 0xef91:$s1: _ReflectiveLoader@
    • 0xef92:$s2: ReflectiveLoader@
    IJr8RvvhZ3.exeGandcrabGandcrab Payloadkevoreilly
    • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
    • 0xef92:$x1: ReflectiveLoader
    C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
    • 0xe8fe:$: DECRYPT.txt
    • 0xe964:$: DECRYPT.txt
    C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
      • 0xef91:$s1: _ReflectiveLoader@
      • 0xef92:$s2: ReflectiveLoader@
      C:\Users\user\AppData\Roaming\Microsoft\mqsmvj.exeGandcrabGandcrab Payloadkevoreilly
      • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.344084967.000000000F592000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
        00000010.00000002.406166723.000000000F592000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
          0000001C.00000000.542136140.000000000F58A000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
            0000001E.00000002.598229388.000000000F592000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
              00000017.00000003.471429233.0000000003A70000.00000004.00001000.00020000.00000000.sdmpReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
              • 0xef92:$x1: ReflectiveLoader
              Click to see the 181 entries
              SourceRuleDescriptionAuthorStrings
              23.0.mqsmvj.exe.f580000.0.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
              • 0xef92:$x1: ReflectiveLoader
              23.0.mqsmvj.exe.f580000.0.unpackSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
              • 0xe8fe:$: DECRYPT.txt
              • 0xe964:$: DECRYPT.txt
              23.0.mqsmvj.exe.f580000.0.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                23.0.mqsmvj.exe.f580000.0.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
                • 0xef91:$s1: _ReflectiveLoader@
                • 0xef92:$s2: ReflectiveLoader@
                23.0.mqsmvj.exe.f580000.0.unpackGandcrabGandcrab Payloadkevoreilly
                • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&