Edit tour
Windows
Analysis Report
Hu25VEa8Dr.exe
Overview
General Information
Sample Name: | Hu25VEa8Dr.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original Sample Name: | 9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7 |
Analysis ID: | 1317431 |
MD5: | bc76bd7b332aa8f6aedbb8e11b7ba9b6 |
SHA1: | c6858031315a50ec87e37966291ec69b64600efb |
SHA256: | 9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7 |
Infos: | |
Detection
Gamarue
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Yara detected Gamarue
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Writes to foreign memory regions
Contain functionality to detect virtual machines
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Contains functionality to inject code into remote processes
Tries to detect virtualization through RDTSC time measurements
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Contains functionality to check if Internet connection is working
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Stores large binary data to the registry
Contains functionality to get notified if a device is plugged in / out
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard
Classification
- System is w7x64
- Hu25VEa8Dr.exe (PID: 2948 cmdline:
C:\Users\u ser\Deskto p\Hu25VEa8 Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6) - Sahofivizu.exe (PID: 920 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Sahofiv izu.exe" " C:\Users\u ser\Deskto p\Hu25VEa8 Dr.exe MD5: 7FE00CC4EA8429629AC0AC610DB51993) - Hu25VEa8Dr.exe (PID: 1724 cmdline:
C:\Users\u ser\Deskto p\Hu25VEa8 Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6) - Hu25VEa8Dr.exe (PID: 2092 cmdline:
C:\Users\u ser\Deskto p\Hu25VEa8 Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6) - msiexec.exe (PID: 1948 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\MSI\ms iexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703) - Lohonibuhod.exe (PID: 1396 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Lohoni buhod.exe" "C:\Users \user\AppD ata\Local\ Temp\MSI\m siexec.exe " MD5: 44902781C1865978B17F396DB51D85E1) - msiexec.exe (PID: 2748 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\MSI\ms iexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703) - msiexec.exe (PID: 2948 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\MSI\ms iexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703) - svchost.exe (PID: 1740 cmdline:
C:\Windows \syswow64\ svchost.ex e MD5: 54A47F6B5E09A77E61649109C6A08866)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Andromeda, Gamarue, B106-Gamarue, B67-SS-Gamarue |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gamarue | Yara detected Gamarue | Joe Security |
⊘No Sigma rule has matched
Timestamp: | 147.75.61.38192.168.2.2280491662031515 10/01/23-06:01:37.455932 |
SID: | 2031515 |
Source Port: | 80 |
Destination Port: | 49166 |
Protocol: | TCP |
Classtype: | Misc activity |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Code function: | 3_2_00402493 | |
Source: | Code function: | 7_2_00402493 |
Compliance |
---|
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 9_2_001E29C0 |
Source: | Code function: | 0_2_00405D07 | |
Source: | Code function: | 0_2_00405331 | |
Source: | Code function: | 0_2_0040263E | |
Source: | Code function: | 5_2_00405D07 | |
Source: | Code function: | 5_2_00405331 | |
Source: | Code function: | 5_2_0040263E | |
Source: | Code function: | 9_2_001E1E80 | |
Source: | Code function: | 9_2_001E1700 | |
Source: | Code function: | 9_2_001E1B70 |
Source: | Code function: | 9_2_001E10D0 |
Networking |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior |
Source: | HTTP traffic detected: |