Edit tour
Windows
Analysis Report
client.exe
Overview
General Information
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Drops PE files to the startup folder
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Classification
- System is w10x64
- client.exe (PID: 5828 cmdline:
"C:\Users\ user\Deskt op\client. exe" MD5: 0367368930008D4A8A1E61DD36397276) - conhost.exe (PID: 6168 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - client.exe (PID: 7144 cmdline:
C:\Users\u ser\Deskto p\client.e xe MD5: B5712CB60C06909B9B4479AADD03FF9E) - cmd.exe (PID: 3284 cmdline:
C:\Windows \system32\ cmd.exe /c "latest.e xe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - latest.exe (PID: 6496 cmdline:
latest.exe MD5: 8E8D4E8C939EBAF71FB1A593B92ED618) - all.exe (PID: 6860 cmdline:
C:\Users\u ser\Deskto p\latest.e xe MD5: 05B6254021999F744DF72E1EF9C57451)
- latest.exe (PID: 6304 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\lat est.exe" MD5: 8E8D4E8C939EBAF71FB1A593B92ED618) - conhost.exe (PID: 7092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - all.exe (PID: 708 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\lat est.exe" MD5: 05B6254021999F744DF72E1EF9C57451)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:56:26.546750+0100 | 2036752 | 1 | A Network Trojan was detected | 194.59.30.220 | 5000 | 192.168.2.8 | 49706 | TCP |
2024-12-18T11:57:08.094827+0100 | 2036752 | 1 | A Network Trojan was detected | 194.59.30.220 | 5000 | 192.168.2.8 | 49706 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |