Edit tour
Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Attempt to bypass Chrome Application-Bound Encryption
Found malware configuration
Yara detected Telegram RAT
AI detected suspicious sample
Excessive usage of taskkill to terminate processes
Found pyInstaller with non standard icon
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a global mouse hook
JA3 SSL client fingerprint seen in connection with other malware
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Execution of Suspicious File Type Extension
Spawns drivers
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Classification
- System is w10x64
- file.exe (PID: 6848 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 2DBF5E00223BD7D14CA7ED7BE362866F) - file.exe (PID: 5476 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 2DBF5E00223BD7D14CA7ED7BE362866F) - cmd.exe (PID: 6844 cmdline:
C:\Windows \system32\ cmd.exe /c "dxdiag / t C:\Users \user\AppD ata\Local\ Bunny\Info .txt" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - dxdiag.exe (PID: 5268 cmdline:
dxdiag /t C:\Users\u ser\AppDat a\Local\Bu nny\Info.t xt MD5: 19AB5AD061BF013EBD012D0682DF37E5) - taskkill.exe (PID: 528 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chrome.exe (PID: 4476 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9876 --pro file-direc tory=Defau lt --remot e-allow-or igins=* -- window-pos ition=1000 0,10000 -- window-siz e=1,1 --di sable-gpu --no-sandb ox MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6764 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-sandb ox --mojo- platform-c hannel-han dle=1988 - -field-tri al-handle= 2004,i,168 7365708994 6729221,16 6712267836 05916720,2 62144 /pre fetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - taskkill.exe (PID: 4072 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chrome.exe (PID: 7628 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9876 --pro file-direc tory=Defau lt --remot e-allow-or igins=* -- window-pos ition=1000 0,10000 -- window-siz e=1,1 --di sable-gpu --no-sandb ox MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7828 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-sandb ox --mojo- platform-c hannel-han dle=2016 - -field-tri al-handle= 1996,i,203 2109330353 751590,130 2897458012 1269176,26 2144 /pref etch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - taskkill.exe (PID: 7980 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 8008 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chrome.exe (PID: 8060 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9876 --pro file-direc tory=Defau lt --remot e-allow-or igins=* -- window-pos ition=1000 0,10000 -- window-siz e=1,1 --di sable-gpu --no-sandb ox MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 760 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-sandb ox --mojo- platform-c hannel-han dle=1872 - -field-tri al-handle= 1980,i,701 9123131012 893565,153 2357987994 7470228,26 2144 /pref etch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - taskkill.exe (PID: 7812 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7808 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msedge.exe (PID: 2968 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 6120 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2104 --fi eld-trial- handle=207 2,i,147602 9339460589 9277,10581 9628853208 68667,2621 44 /prefet ch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - taskkill.exe (PID: 7704 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msedge.exe (PID: 7932 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox MD5: 69222B8101B0601CC6663F8381E7E00F) - taskkill.exe (PID: 7672 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msedge.exe (PID: 7724 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5396 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2108 --fi eld-trial- handle=206 4,i,175753 2531936573 2122,61722 4901761659 6838,26214 4 /prefetc h:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - taskkill.exe (PID: 6528 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msedge.exe (PID: 8440 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8428 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2112 --fi eld-trial- handle=206 0,i,151981 0673855940 657,812746 5609125034 474,262144 /prefetch :3 MD5: 69222B8101B0601CC6663F8381E7E00F) - taskkill.exe (PID: 7780 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msedge.exe (PID: 8956 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7748 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2112 --fi eld-trial- handle=200 0,i,456941 7142642358 918,154768 4186526237 323,262144 /prefetch :3 MD5: 69222B8101B0601CC6663F8381E7E00F) - taskkill.exe (PID: 8500 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 8580 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msedge.exe (PID: 528 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 3376 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2092 --fi eld-trial- handle=192 0,i,130011 2833859972 2861,13573 1140457965 479,262144 /prefetch :3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- mstee.sys (PID: 4 cmdline:
MD5: 244C73253E165582DDC43AF4467D23DF)
- mskssrv.sys (PID: 4 cmdline:
MD5: 26854C1F5500455757BC00365CEF9483)
- msedge.exe (PID: 6292 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 4752 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2016 --fi eld-trial- handle=197 2,i,726754 7130407083 90,1151039 6830708599 302,262144 /prefetch :3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 7120 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7564 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2080 --fi eld-trial- handle=202 0,i,112100 2524606923 6568,60397 9994972148 2261,26214 4 /prefetc h:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 8412 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 1976 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2080 --fi eld-trial- handle=206 4,i,125563 9992315026 3826,25013 6856672798 0130,26214 4 /prefetc h:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 8624 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8164 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2072 --fi eld-trial- handle=203 6,i,161176 6081639755 236,258600 4836248563 306,262144 /prefetch :3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 8856 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=987 6 --profil e-director y=Default --remote-a llow-origi ns=* --win dow-positi on=10000,1 0000 --win dow-size=1 ,1 --disab le-gpu --n o-sandbox --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 4744 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --mojo-pla tform-chan nel-handle =2044 --fi eld-trial- handle=203 6,i,150762 1865173041 619,986797 9607064769 478,262144 /prefetch :3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8836 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -no-sandbo x --mojo-p latform-ch annel-hand le=5132 -- field-tria l-handle=2 036,i,1507 6218651730 41619,9867 9796070647 69478,2621 44 /prefet ch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7088 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --no-sa ndbox --on nx-enabled -for-ee -- mojo-platf orm-channe l-handle=5 192 --fiel d-trial-ha ndle=2036, i,15076218 6517304161 9,98679796 0706476947 8,262144 / prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
{"C2 url": "https://api.telegram.org/bot7027613045:aagx3rpo-1uhb195if6jixakjypoomnxxuu/sendMessage"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Max Altgelt (Nextron Systems): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | File created: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |