Edit tour
Windows
Analysis Report
5EvHHcMjRg.exe
Overview
General Information
Sample name: | 5EvHHcMjRg.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original sample name: | 35005932465ca51b1bffcd168dd6c9386dbdecb78efacfbe4877b9b1e65da8b4 |
Analysis ID: | 1501540 |
MD5: | 1c6b522d985b2e60890a098e3d5e78b8 |
SHA1: | 32885914ce6f49f589842b174a0e13d7dc334d5f |
SHA256: | 35005932465ca51b1bffcd168dd6c9386dbdecb78efacfbe4877b9b1e65da8b4 |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Installs new ROOT certificates
Tries to harvest and steal browser information (history, passwords, etc)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Stores large binary data to the registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- 5EvHHcMjRg.exe (PID: 5740 cmdline:
"C:\Users\ user\Deskt op\5EvHHcM jRg.exe" MD5: 1C6B522D985B2E60890A098E3D5E78B8)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_00AE3310 |
Source: | IP Address: |
Source: | DNS query: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |