Edit tour
Windows
Analysis Report
5b1cxnTnnS.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes many files with high entropy
Queries temperature or sensor information (via WMI often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Drops PE files
Tries to load missing DLLs
Deletes files inside the Windows folder
Creates files inside the system directory
PE file contains sections with non-standard names
Checks for available system drives (often done to infect USB drives)
Found dropped PE file which has not been started or loaded
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
Classification
- System is w10x64_ra
- 5b1cxnTnnS.exe (PID: 1504 cmdline:
C:\Users\u ser\Deskto p\5b1cxnTn nS.exe MD5: 5225371F32A1BA8A5DAA8F14CE64E8BF) - dxwebsetup.exe (PID: 3764 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\dxwebs etup.exe" MD5: 2CBD6AD183914A0C554F0739069E77D7) - dxwsetup.exe (PID: 2508 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\IXP000. TMP\dxwset up.exe MD5: AC3A5F7BE8CD13A863B50AB5FE00B71C)
- cleanup
⊘No yara matches
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Window detected: |