Edit tour
Windows
Analysis Report
https://down-package.ludashicdn.com/downloader/temp_package/2024-07/%E8%85%BE%E8%AE%AF%E4%BC%9A.%E8%AE%AE_4496905339.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Chrome blocked dangerous download
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect virtualization through RDTSC time measurements
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains capabilities to detect virtual machines
Downloads executable code via HTTP
Drops PE files
Found dropped PE file which has not been started or loaded
Is looking for software installed on the system
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Sigma detected: File Download From Browser Process Via Inline URL
Stores files to the Windows start menu directory
Classification
- System is w10x64_ra
- chrome.exe (PID: 876 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// down-packa ge.ludashi cdn.com/do wnloader/t emp_packag e/2024-07/ ???.?_4496 905339.exe MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6188 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2184 --fi eld-trial- handle=191 6,i,517428 1895215060 84,1617519 9301985379 620,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6888 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= chrome.moj om.UtilRea dIcon --la ng=en-US - -service-s andbox-typ e=icon_rea der --mojo -platform- channel-ha ndle=5584 --field-tr ial-handle =1916,i,51 7428189521 506084,161 7519930198 5379620,26 2144 --dis able-featu res=Optimi zationGuid eModelDown loading,Op timization Hints,Opti mizationHi ntsFetchin g,Optimiza tionTarget Prediction /prefetch :8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - ???.?_4496905339.exe (PID: 6852 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0) - ???.?_4496905339.exe (PID: 6756 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0) - ???.?_4496905339.exe (PID: 7748 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0)
- rundll32.exe (PID: 7888 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- ???.?_4496905339.exe (PID: 8064 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0)
- ???.?_4496905339.exe (PID: 8116 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0)
- ???.?_4496905339.exe (PID: 7620 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0)
- ???.?_4496905339.exe (PID: 4880 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0)
- ???.?_4496905339.exe (PID: 3964 cmdline:
"C:\Users\ user\Downl oads\???.? _449690533 9.exe" MD5: 3490DC6FE080B01509AE7ADF52D6F3D0)
- cleanup
⊘No yara matches
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | OCR Text: | ||
Source: | OCR Text: |
Source: | HTTP traffic detected: |