Edit tour
Windows
Analysis Report
g8jiNk0ZVv.exe
Overview
General Information
Sample name: | g8jiNk0ZVv.exerenamed because original name is a hash value |
Original sample name: | d3847704a6ec28a099434c383d130fdbcebe8e46.exe |
Analysis ID: | 1575181 |
MD5: | 9520e99abb9f84d5a7fff2ede2fcfcfc |
SHA1: | d3847704a6ec28a099434c383d130fdbcebe8e46 |
SHA256: | 7231871fb0cdad9a4fe4467d9b6dc5db71986d5c3747c1bc52630f97714a30e6 |
Tags: | exeMetaQuotesSetupSUMMITRECRUITMENTLIMITEDuser-NDA0E |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Adds / modifies Windows certificates
Checks if the current process is being debugged
Connects to several IPs in different countries
Contains capabilities to detect virtual machines
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Classification
- System is w10x64
- g8jiNk0ZVv.exe (PID: 6964 cmdline:
"C:\Users\ user\Deskt op\g8jiNk0 ZVv.exe" MD5: 9520E99ABB9F84D5A7FFF2EDE2FCFCFC)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Binary or memory string: | memstr_7f55c353-5 |
Source: | Window detected: |