Edit tour
Windows
Analysis Report
dotNetFx40_Full_setup.exe
Overview
General Information
Detection
Phemedrone Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected Telegram Recon
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Yara detected Phemedrone Stealer
Machine Learning detection for sample
May check the online IP address of the machine
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Generic Downloader
.NET source code contains very large strings
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Drops PE files to the application program directory (C:\ProgramData)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Modifies existing windows services
Drops PE files
Found evasive API chain checking for process token information
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
PE file contains sections with non-standard names
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Found potential string decryption / allocating functions
Contains functionality to communicate with device drivers
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates or modifies windows services
Uses Microsoft's Enhanced Cryptographic Provider
Classification
- System is w10x64
- dotNetFx40_Full_setup.exe (PID: 6744 cmdline:
C:\Users\u ser\Deskto p\dotNetFx 40_Full_se tup.exe MD5: 5D4392B56AA4EBAC400BBE86FE5D0767) - conhost.exe (PID: 6752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - G5K9HNJ7.exe (PID: 6860 cmdline:
"C:\Progra mData\Star t Menu\G5K 9HNJ7.exe" MD5: 53406E9988306CBD4537677C5336ABA4) - Setup.exe (PID: 7012 cmdline:
C:\6c89449 22f7b98d0b 6cd82b768\ \Setup.exe /x86 /x6 4 /ia64 /w eb MD5: 006F8A615020A4A17F5E63801485DF46) - WINWORD.EXE (PID: 2284 cmdline:
C:\Program Files (x8 6)\Microso ft Office\ Root\Offic e16\WINWOR D.EXE" /i "C:\Users\ user\AppDa ta\Local\T emp\Blocke rsInfo1.rt f MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678) - splwow64.exe (PID: 6936 cmdline:
C:\Windows \splwow64. exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73) - EQB4OREJ.exe (PID: 6896 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\acrord 32_super_s bx\EQB4ORE J.exe" MD5: AE881BAA8C3A00A94E5994826BDAC3AA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
Invoke_Mimikatz | Detects Invoke-Mimikatz String | Florian Roth |
| |
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_PhemedroneStealer | Yara detected Phemedrone Stealer | Joe Security | ||
Click to see the 1 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Code function: | 2_2_00217C12 | |
Source: | Code function: | 2_2_0021751D | |
Source: | Code function: | 3_2_00007FFDA159B176 | |
Source: | Code function: | 3_2_00007FFDA159B25B | |
Source: | Code function: | 4_2_6C9517D1 | |
Source: | Code function: | 4_2_6C938094 | |
Source: | Code function: | 4_2_6C938083 | |
Source: | Code function: | 4_2_6C9380A5 | |
Source: | Code function: | 4_2_6C9380D5 | |
Source: | Code function: | 4_2_6C938114 |
Source: | Static PE information: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 2_2_0021774A |
Source: | Code function: | 2_2_002192BB | |
Source: | Code function: | 2_2_0021A7B1 | |
Source: | Code function: | 4_2_6C638097 | |
Source: | Code function: | 4_2_6C624281 | |
Source: | Code function: | 4_2_6C925B82 | |
Source: | Code function: | 4_2_6C92410A |
Networking |
---|
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | Code function: | 4_2_6C964B54 |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Long String: |
Source: | Code function: | 2_2_00223049 | |
Source: | Code function: | 2_2_00222056 | |
Source: | Code function: | 2_2_0021F9FE | |
Source: | Code function: | 2_2_00224252 | |
Source: | Code function: | 2_2_00220BD0 | |
Source: | Code function: | 2_2_0022630E | |
Source: | Code function: | 2_2_002273D8 | |
Source: | Code function: | 3_2_00007FFDA1591967 | |
Source: | Code function: | 3_2_00007FFDA1595D05 | |
Source: | Code function: | 4_2_6C49CBE6 | |
Source: | Code function: | 4_2_6C63D064 | |
Source: | Code function: | 4_2_6C63D81C | |
Source: | Code function: | 4_2_6C629A50 | |
Source: | Code function: | 4_2_6C979F12 | |
Source: | Code function: | 4_2_6C97A9BE | |
Source: | Code function: | 4_2_6C95E49E | |
Source: | Code function: | 4_2_6C97A468 | |
Source: | Code function: | 4_2_6C97C65E | |
Source: | Code function: | 4_2_6C91F790 | |
Source: | Code function: | 4_2_6C97B09F | |
Source: | Code function: | 4_2_6C97C00B |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Code function: | 4_2_6C944E0D |
Source: | Code function: | 2_2_00217A0A |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Code function: | 2_2_00218DAE |
Source: | Code function: | 4_2_6C93E9B4 |
Source: | Code function: | 4_2_6C4A7A10 |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 4_2_6C944DC9 |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File created: | Jump to behavior |
Source: | Code function: | 4_2_6C4A6525 |
Source: | Code function: | 2_2_0021774A |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Code function: | 4_2_6C48EFE2 |
Source: | Base64 encoded string: |