Edit tour
Windows
Analysis Report
client.exe
Overview
General Information
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Drops PE files to the startup folder
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Classification
- System is w10x64
- client.exe (PID: 6472 cmdline:
"C:\Users\ user\Deskt op\client. exe" MD5: 0367368930008D4A8A1E61DD36397276) - conhost.exe (PID: 7096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - client.exe (PID: 432 cmdline:
C:\Users\u ser\Deskto p\client.e xe MD5: B5712CB60C06909B9B4479AADD03FF9E) - cmd.exe (PID: 1680 cmdline:
C:\Windows \system32\ cmd.exe /c "latest.e xe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - latest.exe (PID: 6152 cmdline:
latest.exe MD5: 8E8D4E8C939EBAF71FB1A593B92ED618) - all.exe (PID: 1856 cmdline:
C:\Users\u ser\Deskto p\latest.e xe MD5: 05B6254021999F744DF72E1EF9C57451)
- latest.exe (PID: 4196 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\lat est.exe" MD5: 8E8D4E8C939EBAF71FB1A593B92ED618) - conhost.exe (PID: 6120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - all.exe (PID: 760 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\lat est.exe" MD5: 05B6254021999F744DF72E1EF9C57451)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:41:20.874297+0100 | 2036752 | 1 | A Network Trojan was detected | 194.59.30.220 | 5000 | 192.168.2.5 | 49705 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |