Edit tour
Windows
Analysis Report
YF3YnL4ksc.exe
Overview
General Information
Sample name: | YF3YnL4ksc.exerenamed because original name is a hash value |
Original sample name: | 032fbff0c808c0de5d363a06a2dad711486cc4d05642858190cc3f8b0b56ba2e.exe |
Analysis ID: | 1577203 |
MD5: | 5fb35c53e68fc1fa0d555db9fcda099f |
SHA1: | 828bd14a630b4ff78d5159876ab004c8fd3e63cc |
SHA256: | 032fbff0c808c0de5d363a06a2dad711486cc4d05642858190cc3f8b0b56ba2e |
Tags: | 139-99-188-124exeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Browser Execution In Headless Mode
Sigma detected: Browser Started with Remote Debugging
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- YF3YnL4ksc.exe (PID: 3848 cmdline:
"C:\Users\ user\Deskt op\YF3YnL4 ksc.exe" MD5: 5FB35C53E68FC1FA0D555DB9FCDA099F) - Job Description.exe (PID: 5848 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Job De scription. exe" MD5: C20EF77017D4930161CA76C2F2C70A8E) - Rader_OS.exe (PID: 8636 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\2oHekPb Lk7CsxCvTv kEHZaSjhOq \Rader_OS. exe MD5: 0A914DEC9E5D43DFA78DBA6638491859) - Rader_OS.exe (PID: 8772 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\2oHekP bLk7CsxCvT vkEHZaSjhO q\Rader_OS .exe" --ty pe=gpu-pro cess --fie ld-trial-h andle=1764 ,815536469 1852384350 ,806509305 7334821699 ,131072 -- disable-fe atures=Lay outNG,Spar eRendererF orSitePerP rocess --g pu-prefere nces=IAAAA AAAAADgAAA gAAAAAAAAY AAAAAAACAA AAAAAAAAoA AAABAAAACA AAAAAAAAAK AAAAAAAAAA wAAAAAAAAA DgAAAAAAAA AEAAAAAAAA AAAAAAABQA AABAAAAAAA AAAAAAAAAY AAAAQAAAAA AAAAAEAAAA FAAAAEAAAA AAAAAABAAA ABgAAAA== --service- request-ch annel-toke n=18269599 1701754405 05 --mojo- platform-c hannel-han dle=1776 - -ignored=" --type=re nderer " / prefetch:2 MD5: 0A914DEC9E5D43DFA78DBA6638491859) - Rader_OS.exe (PID: 8804 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\2oHekP bLk7CsxCvT vkEHZaSjhO q\Rader_OS .exe" --ty pe=rendere r --field- trial-hand le=1764,81 5536469185 2384350,80 6509305733 4821699,13 1072 --dis able-featu res=Layout NG,SpareRe ndererForS itePerProc ess --lang =en-GB --a pp-path="C :\Users\us er\AppData \Local\Tem p\2oHekPbL k7CsxCvTvk EHZaSjhOq\ resources\ app.asar" --node-int egration - -no-sandbo x --no-zyg ote --prel oad="C:\Us ers\user\A ppData\Loc al\Temp\2o HekPbLk7Cs xCvTvkEHZa SjhOq\reso urces\app. asar\prelo ad.js" --c ontext-iso lation --b ackground- color=#fff --device- scale-fact or=1 --num -raster-th reads=2 -- enable-mai n-frame-be fore-activ ation --se rvice-requ est-channe l-token=94 2105491467 1817812 -- renderer-c lient-id=4 --no-v8-u ntrusted-c ode-mitiga tions --mo jo-platfor m-channel- handle=212 4 /prefetc h:1 MD5: 0A914DEC9E5D43DFA78DBA6638491859) - chrome.exe (PID: 9180 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --di sable-back ground-net working -- enable-fea tures=Netw orkService ,NetworkSe rviceInPro cess --dis able-backg round-time r-throttli ng --disab le-backgro unding-occ luded-wind ows --disa ble-breakp ad --disab le-client- side-phish ing-detect ion --disa ble-compon ent-extens ions-with- background -pages --d isable-def ault-apps --disable- dev-shm-us age --disa ble-extens ions --dis able-featu res=Transl ateUI,Blin kGenProper tyTrees,Im provedCook ieControls ,SameSiteB yDefaultCo okies,Lazy FrameLoadi ng --disab le-hang-mo nitor --di sable-ipc- flooding-p rotection --disable- popup-bloc king --dis able-promp t-on-repos t --disabl e-renderer -backgroun ding --dis able-sync --force-co lor-profil e=srgb --m etrics-rec ording-onl y --no-fir st-run --e nable-auto mation --p assword-st ore=basic --use-mock -keychain --user-dat a-dir=C:\U sers\user\ AppData\Lo cal\Local- Data --rem ote-debugg ing-pipe - -headless --hide-scr ollbars -- mute-audio --blink-s ettings=pr imaryHover Type=2,ava ilableHove rTypes=2,p rimaryPoin terType=4, availableP ointerType s=4 --no-s andbox --d isable-bac kground-ne tworking - -ignore-ce rtificate- errors --n o-sandbox --disable- setuid-san dbox --dis able-accel erated-2d- canvas --d isable-gpu --disable -popup-blo cking --di sable-noti fications --window-s ize=1,1 -- window-pos ition=-50, -50 --prof ile-direct ory=Defaul t about:bl ank MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 8084 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --no-sandb ox --ignor e-certific ate-errors --use-ang le=swiftsh ader-webgl --use-gl= angle --mu te-audio - -ignore-ce rtificate- errors --h eadless -- mojo-platf orm-channe l-handle=1 744 --fiel d-trial-ha ndle=1412, i,92655605 5202372106 ,377587831 2395504047 ,262144 -- enable-fea tures=Netw orkService ,NetworkSe rviceInPro cess --dis able-featu res=BlinkG enProperty Trees,Impr ovedCookie Controls,L azyFrameLo ading,Pain tHolding,S ameSiteByD efaultCook ies,Transl ateUI /pre fetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - cmd.exe (PID: 6916 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta skkill /F /IM msedge .exe /T" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6000 cmdline:
taskkill / F /IM msed ge.exe /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - cmd.exe (PID: 5872 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta skkill /F /IM msedge .exe /T" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 8576 cmdline:
taskkill / F /IM msed ge.exe /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - cmd.exe (PID: 6324 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta skkill /F /IM msedge .exe /T" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 8916 cmdline:
taskkill / F /IM msed ge.exe /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - cmd.exe (PID: 2444 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta skkill /F /IM msedge .exe /T" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 8872 cmdline:
taskkill / F /IM msed ge.exe /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - cmd.exe (PID: 8964 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta skkill /F /IM msedge .exe /T" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7952 cmdline:
taskkill / F /IM msed ge.exe /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - msedge.exe (PID: 7836 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --disab le-backgro und-networ king --ena ble-featur es=Network Service,Ne tworkServi ceInProces s --disabl e-backgrou nd-timer-t hrottling --disable- background ing-occlud ed-windows --disable -breakpad --disable- client-sid e-phishing -detection --disable -component -extension s-with-bac kground-pa ges --disa ble-defaul t-apps --d isable-dev -shm-usage --disable -extension s --disabl e-features =Translate UI,BlinkGe nPropertyT rees,Impro vedCookieC ontrols,Sa meSiteByDe faultCooki es,LazyFra meLoading --disable- hang-monit or --disab le-ipc-flo oding-prot ection --d isable-pop up-blockin g --disabl e-prompt-o n-repost - -disable-r enderer-ba ckgroundin g --disabl e-sync --f orce-color -profile=s rgb --metr ics-record ing-only - -no-first- run --enab le-automat ion --pass word-store =basic --u se-mock-ke ychain "-- user-data- dir=C:\Use rs\user\Ap pData\Loca l\Microsof t\Edge\Use r Data" -- remote-deb ugging-pip e --headle ss --hide- scrollbars --mute-au dio --blin k-settings =primaryHo verType=2, availableH overTypes= 2,primaryP ointerType =4,availab lePointerT ypes=4 --n o-sandbox --disable- background -networkin g --ignore -certifica te-errors --no-sandb ox --disab le-setuid- sandbox -- disable-ac celerated- 2d-canvas --disable- gpu --disa ble-popup- blocking - -disable-n otificatio ns --windo w-size=1,1 --window- position=- 50,-50 --p rofile-dir ectory=Def ault about :blank MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 3908 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --n o-sandbox --ignore-c ertificate -errors -- use-angle= swiftshade r-webgl -- use-gl=ang le --mute- audio --ig nore-certi ficate-err ors --head less --moj o-platform -channel-h andle=1504 --field-t rial-handl e=1364,i,1 4197532081 980675620, 1165460425 4891626532 ,262144 -- enable-fea tures=Netw orkService ,NetworkSe rviceInPro cess --dis able-featu res=BlinkG enProperty Trees,Impr ovedCookie Controls,L azyFrameLo ading,Pain tHolding,S ameSiteByD efaultCook ies,Transl ateUI /pre fetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - Rader_OS.exe (PID: 8996 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\2oHekP bLk7CsxCvT vkEHZaSjhO q\Rader_OS .exe" --ty pe=rendere r --field- trial-hand le=1764,81 5536469185 2384350,80 6509305733 4821699,13 1072 --dis able-featu res=Layout NG,SpareRe ndererForS itePerProc ess --lang =en-GB --a pp-path="C :\Users\us er\AppData \Local\Tem p\2oHekPbL k7CsxCvTvk EHZaSjhOq\ resources\ app.asar" --no-sandb ox --no-zy gote --bac kground-co lor=#fff - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --serv ice-reques t-channel- token=8653 9960575302 54188 --re nderer-cli ent-id=6 - -no-v8-unt rusted-cod e-mitigati ons --mojo -platform- channel-ha ndle=2268 /prefetch: 1 MD5: 0A914DEC9E5D43DFA78DBA6638491859) - Rader_OS.exe (PID: 7888 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\2oHekP bLk7CsxCvT vkEHZaSjhO q\Rader_OS .exe" --ty pe=gpu-pro cess --fie ld-trial-h andle=1764 ,815536469 1852384350 ,806509305 7334821699 ,131072 -- disable-fe atures=Lay outNG,Spar eRendererF orSitePerP rocess --d isable-gpu -sandbox - -use-gl=di sabled --g pu-prefere nces=IAAAA AAAAADgAAA gAAAAAAAAY AAAAAAACAA AAAAAAAAoA AAABAAAACA AAAAAAAAAK AAAAAAAAAA wAAAAAAAAA DgAAAAAAAA AEAAAAAAAA AAAAAAABQA AABAAAAAAA AAAAAAAAAY AAAAQAAAAA AAAAAEAAAA FAAAAEAAAA AAAAAABAAA ABgAAAA== --service- request-ch annel-toke n=17974062 3202169694 16 --mojo- platform-c hannel-han dle=2576 / prefetch:2 MD5: 0A914DEC9E5D43DFA78DBA6638491859) - Acrobat.exe (PID: 6488 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \AppData\L ocal\Temp\ Advertisin g_Campaign _Manager_R ole_v2.pdf " MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 1344 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 7488 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=20 80 --field -trial-han dle=1640,i ,821355096 1044138864 ,127180355 1582675503 9,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - crypted.exe (PID: 4496 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\crypte d.exe" MD5: B48C9F368745E6D89288BD4D40F3AADE) - conhost.exe (PID: 3572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - MSBuild.exe (PID: 6784 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - MSBuild.exe (PID: 4508 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - WerFault.exe (PID: 7396 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 496 -s 312 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |