Windows
Analysis Report
HHGHJJUILn.exe
Overview
General Information
Detection
DarkCloud
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected DarkCloud
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Writes to foreign memory regions
Detected potential unwanted application
Tries to steal Crypto Currency Wallets
Writes or reads registry keys via WMI
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
Drops PE files to the user root directory
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Drops PE files to the user directory
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
HHGHJJUILn.exe (PID: 5460 cmdline:
C:\Users\u ser\Deskto p\HHGHJJUI Ln.exe MD5: 103F2CA898F5C7285A3651F23D926218) vbc.exe (PID: 5168 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\vbc. exe MD5: B3A917344F5610BEEC562556F11300FA) vbc.exe (PID: 5140 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\vbc. exe MD5: B3A917344F5610BEEC562556F11300FA) vbc.exe (PID: 5132 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\vbc. exe MD5: B3A917344F5610BEEC562556F11300FA) vbc.exe (PID: 4772 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\vbc. exe MD5: B3A917344F5610BEEC562556F11300FA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
SUSP_Reversed_Base64_Encoded_EXE | Detects an base64 encoded executable with reversed characters | Florian Roth |
| |
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
MALWARE_Win_A310Logger | Detects A310Logger | ditekSHen |
| |
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
MALWARE_Win_A310Logger | Detects A310Logger | ditekSHen |
| |
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
Click to see the 5 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | DNS query: |
Source: | IP Address: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in b |