Edit tour
Windows
Analysis Report
5006_2.6.2.exe
Overview
General Information
Detection
Score: | 54 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
System process connects to network (likely due to code injection or exploit)
Deletes itself after installation
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks winsocket function (used for sniffing or altering network traffic)
Install WinpCap (used to filter network traffic)
Installs a global event hook (focus changed)
Installs a global get message hook
Installs new ROOT certificates
Modifies the prolog of user mode functions (user mode inline hooks)
Overwrites Mozilla Firefox settings
Sample is not signed and drops a device driver
Sigma detected: System File Execution Location Anomaly
Tries to harvest and steal browser information (history, passwords, etc)
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Enables debug privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Use Short Name Path in Command Line
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- 5006_2.6.2.exe (PID: 6532 cmdline:
"C:\Users\ user\Deskt op\5006_2. 6.2.exe" MD5: 8541DA559ECB090CD768BC6F3173FFC4) - antivirus_detector.exe (PID: 3808 cmdline:
"antivirus _detector. exe" C:\Us ers\user\D esktop\500 6_2.6.2.ex e|C:\Users \user\AppD ata\Roamin g\Windows Provisioni ng|| MD5: 7BCC1F1DEB45BF58C7C559DFE3240E08) - main_installer.exe (PID: 1864 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Windows P rovisionin g\main_ins taller.exe " -s=1 MD5: 2F61BD2AC7DC2252AD5743093CEB09DC) - post_install.exe (PID: 3304 cmdline:
"post_inst all.exe" e xe=C:\User s\user\App Data\Roami ng\Windows Provision ing\main_i nstaller.e xe|inst=C: \Program F iles (x86) \Windows P rovisionin g|s=1|k=|p =|r=0 MD5: 52A76696B447635922D8EC87D0DA7FEE)
- svcAppUpdate.exe (PID: 4332 cmdline:
"C:\Progra m Files (x 86)\Window s Provisio ning\svcAp pUpdate.ex e" MD5: E53E0020D7FE34B1E8F75AF444E64C72)
- svcAppInit.exe (PID: 6556 cmdline:
"C:\Progra m Files (x 86)\Window s Provisio ning\svcAp pInit.exe" MD5: 3135A7FEE1AD484104A1309104312D9E) - rundll32.exe (PID: 6056 cmdline:
rundll32.e xe "C:\Pro gram Files (x86)\Win dows Provi sioning\sv cAppInit.d ll",Proces sDll s=hid edialog MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 3220 cmdline:
C:\Windows \sysnative \rundll32. exe "C:\Pr ogram File s (x86)\Wi ndows Prov isioning\w indows_hoo k_64.dll", ProcessDll Stub MD5: EF3179D498793BF4234F708D3BE28633)
- svcAppLookup.exe (PID: 2924 cmdline:
"C:\Progra m Files (x 86)\Window s Provisio ning\svcAp pLookup.ex e" MD5: 794122A33A390FF07CA891B568110D10)
- nt_system_service.exe (PID: 7060 cmdline:
"C:\Progra m Files (x 86)\Window s Provisio ning\nt_sy stem_servi ce.exe" MD5: 64F8F960D535AA6200E620C1DEF292FB) - certutil.exe (PID: 6224 cmdline:
nss\certut il -A -t " TCu" -i "C :\PROGRA~2 \WIE901~1\ app_data\D E_NET~1/SS L/DIGICE~1 .CER" -n " de_netfilt er/SSL/Dig iCert SHA2 Extended Validation Server CA 3" -d sql :"C:\Users \user\AppD ata\Roamin g\Mozilla\ Firefox\Pr ofiles\V6Z CHH~1.DEF" -f pwfile MD5: 3337B8D5AAB06D9072E3D4A72E0F9D26)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Ransomware_Hellokitty_d9391a1a | unknown | unknown |
| |
Windows_Ransomware_Hellokitty_d9391a1a | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Ransomware_Hellokitty_d9391a1a | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Ransomware_Hellokitty_d9391a1a | unknown | unknown |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: frack113, Nasreddine Bencherchali: |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Static PE information: |
Source: | Window detected: |