Edit tour
Windows
Analysis Report
file.exe
Overview
General Information
Detection
Socks5Systemz
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Yara detected Socks5Systemz
AI detected suspicious sample
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- svchost.exe (PID: 1312 cmdline:
C:\Windows \system32\ svchost.ex e -k Unist ackSvcGrou p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- SgrmBroker.exe (PID: 2932 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
- svchost.exe (PID: 1308 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 6796 cmdline:
C:\Windows \System32\ svchost.ex e -k wsapp x -p -s Cl ipSVC MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 1880 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - MpCmdRun.exe (PID: 7652 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: B3676839B2EE96983F9ED735CD044159) - conhost.exe (PID: 7660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- file.exe (PID: 6784 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 5A3F6AA1107D91BDC0430E2A0C1F4F26) - sQurASc1qLwRL.exe (PID: 7748 cmdline:
"C:\Users\ user\AppDa ta\Roaming \RW27Sgr\s QurASc1qLw RL.exe" MD5: 23619F330C57AF62DE72DFFEBADBF07B) - sQurASc1qLwRL.tmp (PID: 7772 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-IVO 84.tmp\sQu rASc1qLwRL .tmp" /SL5 ="$20138,4 002138,542 72,C:\User s\user\App Data\Roami ng\RW27Sgr \sQurASc1q LwRL.exe" MD5: CC7B0A71A44CA4000DE2656C0486FD86) - schtasks.exe (PID: 7808 cmdline:
"C:\Window s\system32 \schtasks. exe" /Dele te /F /TN "video_min imizer_121 24" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7816 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - videominimizer2.exe (PID: 7852 cmdline:
"C:\Users\ user\AppDa ta\Local\V ideo Minim izer 2.33\ videominim izer2.exe" -i MD5: BDDC95BF37B6EB97D516948CEC1CB311) - xIphwNW7O.exe (PID: 7916 cmdline:
"C:\Users\ user\AppDa ta\Roaming \LBOSqRLg\ xIphwNW7O. exe" MD5: F328A95046E3A2514C36347EAEC911C0) - WerFault.exe (PID: 8064 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 784 -s 584 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 7996 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 8040 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 480 -p 67 84 -ip 678 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 8160 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s w lidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_Socks5Systemz | Yara detected Socks5Systemz | Joe Security | ||
JoeSecurity_Socks5Systemz | Yara detected Socks5Systemz | Joe Security | ||
JoeSecurity_Socks5Systemz | Yara detected Socks5Systemz | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
System Summary |
---|
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-12T16:49:05.832704+0100 | 2028765 | 3 | Unknown Traffic | 192.168.2.11 | 49987 | 188.119.66.185 | 443 | TCP |
2024-12-12T16:49:08.095208+0100 | 2028765 | 3 | Unknown Traffic | 192.168.2.11 | 49990 | 188.119.66.185 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-12T16:49:06.512880+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49987 | 188.119.66.185 | 443 | TCP |
2024-12-12T16:49:08.823229+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49990 | 188.119.66.185 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 12_2_0045CFD8 | |
Source: | Code function: | 12_2_0045D08C | |
Source: | Code function: | 12_2_0045D0A4 | |
Source: | Code function: | 12_2_10001000 | |
Source: | Code function: | 12_2_10001130 |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Registry value created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 12_2_00452A60 | |
Source: | Code function: | 12_2_00474DFC | |
Source: | Code function: | 12_2_004625C4 | |
Source: | Code function: | 12_2_00463B50 | |
Source: | Code function: | 12_2_00497C14 | |
Source: | Code function: | 12_2_00463FCC |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |