Edit tour
Windows
Analysis Report
HDKuOe.exe
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- HDKuOe.exe (PID: 2260 cmdline:
"C:\Users\ user\Deskt op\HDKuOe. exe" MD5: 4EBFFCED85203BC1C3C5D9F3AFD1045D) - setup.exe (PID: 6224 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\setup. exe" MD5: 12F9523E0ADA8BDABC28FA142D6E56BD) - Snetchball.exe (PID: 4584 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Snetchball \Snetchbal l.exe MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 2328 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 3272 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6148 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6232 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6252 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6612 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6764 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6708 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6816 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 6900 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 7068 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 4820 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 1072 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 4144 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" -- type=gpu-p rocess --n o-sandbox --log-seve rity=disab le --user- agent="Moz illa/5.0 ( Macintosh; Intel Mac OS X 10_1 5_7) Apple WebKit/537 .36 (KHTML , like Gec ko) Chrome /127.0.0.0 Safari/53 7.36 OPR/1 13.0.0.0" --lang=en- US --user- data-dir=" C:\Users\u ser\AppDat a\Local\CE F\User Dat a" --gpu-p references =WAAAAAAAA ADgAAAMAAA AAAAAAAAAA AAAAABgAAA AAAA4AAAAA AAAAAAAAAA EAAAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAGAA AAAAAAAAYA AAAAAAAAAg AAAAAAAAAC AAAAAAAAAA IAAAAAAAAA A== --log- file="C:\U sers\user\ AppData\Ro aming\Snet chball\deb ug.log" -- mojo-platf orm-channe l-handle=3 408 --fiel d-trial-ha ndle=3416, i,13150293 6480653228 22,1691455 3153379797 195,262144 --disable -features= BackForwar dCache,Cal culateNati veWinOcclu sion,Docum entPicture InPictureA PI /prefet ch:2 MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 4208 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" -- type=utili ty --utili ty-sub-typ e=storage. mojom.Stor ageService --lang=en -US --serv ice-sandbo x-type=ser vice --no- sandbox -- log-severi ty=disable --user-ag ent="Mozil la/5.0 (Ma cintosh; I ntel Mac O S X 10_15_ 7) AppleWe bKit/537.3 6 (KHTML, like Gecko ) Chrome/1 27.0.0.0 S afari/537. 36 OPR/113 .0.0.0" -- lang=en-US --user-da ta-dir="C: \Users\use r\AppData\ Local\CEF\ User Data" --log-fil e="C:\User s\user\App Data\Roami ng\Snetchb all\debug. log" --moj o-platform -channel-h andle=3856 --field-t rial-handl e=3416,i,1 3150293648 065322822, 1691455315 3379797195 ,262144 -- disable-fe atures=Bac kForwardCa che,Calcul ateNativeW inOcclusio n,Document PictureInP ictureAPI /prefetch: 8 MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 5720 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 2180 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" -- type=utili ty --utili ty-sub-typ e=network. mojom.Netw orkService --lang=en -US --serv ice-sandbo x-type=non e --no-san dbox --log -severity= disable -- user-agent ="Mozilla/ 5.0 (Macin tosh; Inte l Mac OS X 10_15_7) AppleWebKi t/537.36 ( KHTML, lik e Gecko) C hrome/127. 0.0.0 Safa ri/537.36 OPR/113.0. 0.0" --lan g=en-US -- user-data- dir="C:\Us ers\user\A ppData\Loc al\CEF\Use r Data" -- log-file=" C:\Users\u ser\AppDat a\Roaming\ Snetchball \debug.log " --mojo-p latform-ch annel-hand le=4084 -- field-tria l-handle=3 416,i,1315 0293648065 322822,169 1455315337 9797195,26 2144 --dis able-featu res=BackFo rwardCache ,Calculate NativeWinO cclusion,D ocumentPic tureInPict ureAPI /pr efetch:8 MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 2568 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" -- type=rende rer --log- severity=d isable --u ser-agent= "Mozilla/5 .0 (Macint osh; Intel Mac OS X 10_15_7) A ppleWebKit /537.36 (K HTML, like Gecko) Ch rome/127.0 .0.0 Safar i/537.36 O PR/113.0.0 .0" --user -data-dir= "C:\Users\ user\AppDa ta\Local\C EF\User Da ta" --firs t-renderer -process - -no-sandbo x --log-fi le="C:\Use rs\user\Ap pData\Roam ing\Snetch ball\debug .log" --la ng=en-US - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=6 --t ime-ticks- at-unix-ep och=-17251 2998004911 4 --launch -time-tick s=57364994 34 --mojo- platform-c hannel-han dle=4220 - -field-tri al-handle= 3416,i,131 5029364806 5322822,16 9145531533 79797195,2 62144 --di sable-feat ures=BackF orwardCach e,Calculat eNativeWin Occlusion, DocumentPi ctureInPic tureAPI /p refetch:1 MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 5916 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" -- type=rende rer --log- severity=d isable --u ser-agent= "Mozilla/5 .0 (Macint osh; Intel Mac OS X 10_15_7) A ppleWebKit /537.36 (K HTML, like Gecko) Ch rome/127.0 .0.0 Safar i/537.36 O PR/113.0.0 .0" --user -data-dir= "C:\Users\ user\AppDa ta\Local\C EF\User Da ta" --no-s andbox --l og-file="C :\Users\us er\AppData \Roaming\S netchball\ debug.log" --lang=en -US --devi ce-scale-f actor=1 -- num-raster -threads=2 --enable- main-frame -before-ac tivation - -renderer- client-id= 5 --time-t icks-at-un ix-epoch=- 1725129980 049114 --l aunch-time -ticks=573 6521392 -- mojo-platf orm-channe l-handle=4 268 --fiel d-trial-ha ndle=3416, i,13150293 6480653228 22,1691455 3153379797 195,262144 --disable -features= BackForwar dCache,Cal culateNati veWinOcclu sion,Docum entPicture InPictureA PI /prefet ch:1 MD5: A011E4E8E7502FDFCD1C52A98392FF46) - Snetchball.exe (PID: 3332 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46)
- Snetchball.exe (PID: 3492 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Snetchbal l\Snetchba ll.exe" MD5: A011E4E8E7502FDFCD1C52A98392FF46)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Registry value created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Code function: | 7_2_027C4F58 | |
Source: | Code function: | 7_2_027C3860 | |
Source: | Code function: | 7_2_027C1049 | |
Source: | Code function: | 7_2_053967F8 | |
Source: | Code function: | 7_2_05397C08 | |
Source: | Code function: | 7_2_05395F28 | |
Source: | Code function: | 7_2_053957E0 | |
Source: | Code function: | 7_2_05397BF8 | |
Source: | Code function: | 7_2_062765B0 | |
Source: | Code function: | 7_2_06E30790 | |
Source: | Code function: | 7_2_06E3D530 | |
Source: | Code function: | 10_2_02194F58 | |
Source: | Code function: | 10_2_02193860 | |
Source: | Code function: | 11_2_00E64F58 | |
Source: | Code function: | 11_2_00E63860 | |
Source: | Code function: | 12_2_01574F58 | |
Source: | Code function: | 12_2_01573860 | |
Source: | Code function: | 12_2_01571049 | |
Source: | Code function: | 13_2_01134F58 | |
Source: | Code function: | 13_2_01133860 | |
Source: | Code function: | 13_2_01131049 | |
Source: | Code function: | 15_2_01804F58 | |
Source: | Code function: | 15_2_01803860 | |
Source: | Code function: | 15_2_01801049 | |
Source: | Code function: | 16_2_029B4F58 | |
Source: | Code function: | 16_2_029B3860 | |
Source: | Code function: | 16_2_029B1049 |
Source: | Dropped File: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: |