Edit tour
Windows
Analysis Report
sV9ElC4fU4.exe
Overview
General Information
Sample name: | sV9ElC4fU4.exerenamed because original name is a hash value |
Original sample name: | bf53f19b542df72aacf589a049619bc7.exe |
Analysis ID: | 1533857 |
MD5: | bf53f19b542df72aacf589a049619bc7 |
SHA1: | 1fdd0458c805758732b118a3b98fcc12877f5f54 |
SHA256: | c5c3401f71f4361ed454bbd96ea7cdd8a9132a655815e35e207dfff0ea690469 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
GO Backdoor
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected GO Backdoor
AI detected suspicious sample
Drops PE files with a suspicious file extension
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- sV9ElC4fU4.exe (PID: 5724 cmdline:
"C:\Users\ user\Deskt op\sV9ElC4 fU4.exe" MD5: BF53F19B542DF72AACF589A049619BC7) - cmd.exe (PID: 4452 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Mi n Min.bat & Min.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6680 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6404 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 4536 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 4936 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 3528 cmdline:
findstr /I "avastui avgui bdse rvicehost nswscsvc s ophoshealt h" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 3532 cmdline:
cmd /c md 353685 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 6816 cmdline:
findstr /V "Wireless NeilAspBri nging" Act ively MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6748 cmdline:
cmd /c cop y /b ..\Sk irts D MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Soldiers.pif (PID: 4912 cmdline:
Soldiers.p if D MD5: 18CE19B57F43CE0A5AF149C96AECC685) - cmd.exe (PID: 3504 cmdline:
cmd /k ech o [Interne tShortcut] > "C:\Use rs\user\Ap pData\Roam ing\Micros oft\Window s\Start Me nu\Program s\Startup\ ChameleonC raft.url" & echo URL ="C:\Users \user\AppD ata\Local\ DesignQuan tum Innova tions\Cham eleonCraft .js" >> "C :\Users\us er\AppData \Roaming\M icrosoft\W indows\Sta rt Menu\Pr ograms\Sta rtup\Chame leonCraft. url" & exi t MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Soldiers.pif (PID: 7096 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\353685\ Soldiers.p if MD5: 18CE19B57F43CE0A5AF149C96AECC685) - choice.exe (PID: 3580 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- wscript.exe (PID: 2940 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\DesignQ uantum Inn ovations\C hameleonCr aft.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - ChameleonCraft.scr (PID: 4584 cmdline:
"C:\Users\ user\AppDa ta\Local\D esignQuant um Innovat ions\Chame leonCraft. scr" "C:\U sers\user\ AppData\Lo cal\Design Quantum In novations\ q" MD5: 18CE19B57F43CE0A5AF149C96AECC685) - ChameleonCraft.scr (PID: 3900 cmdline:
"C:\Users\ user\AppDa ta\Local\D esignQuant um Innovat ions\Chame leonCraft. scr" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security | ||
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security |
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Max Altgelt (Nextron Systems): |
Source: | Author: Christopher Peacock @securepeacock, SCYTHE @scythe_io: |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-15T09:40:15.987244+0200 | 2855536 | 1 | A Network Trojan was detected | 192.168.2.8 | 49962 | 94.103.85.114 | 30202 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-15T09:40:15.985563+0200 | 2855539 | 1 | A Network Trojan was detected | 94.103.85.114 | 30202 | 192.168.2.8 | 49962 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062EB | |
Source: | Code function: | 0_2_00406CB1 | |
Source: | Code function: | 22_2_00944005 | |
Source: | Code function: | 22_2_0094C2FF | |
Source: | Code function: | 22_2_0094494A | |
Source: | Code function: | 22_2_0094CD9F | |
Source: | Code function: | 22_2_0094CD14 | |
Source: | Code function: | 22_2_0094F5D8 | |
Source: | Code function: | 22_2_0094F735 | |
Source: | Code function: | 22_2_0094FA36 | |
Source: | Code function: | 22_2_00943CE2 | |
Source: | Code function: | 23_2_00A04005 | |
Source: | Code function: | 23_2_00A0C2FF | |
Source: | Code function: | 23_2_00A0494A | |
Source: | Code function: | 23_2_00A0CD9F | |
Source: | Code function: | 23_2_00A0CD14 | |
Source: | Code function: | 23_2_00A0F5D8 | |
Source: | Code function: | 23_2_00A0F735 | |
Source: | Code function: | 23_2_00A0FA36 | |
Source: | Code function: | 23_2_00A03CE2 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | String found in binary or memory: |