Edit tour
Windows
Analysis Report
O16AWEA5iQ.exe
Overview
General Information
Sample name: | O16AWEA5iQ.exerenamed because original name is a hash value |
Original sample name: | e704ea2f17b1c9b22182eb203c757ba91e262983d7021f4c644b99cd98f0b0ce.exe |
Analysis ID: | 1577436 |
MD5: | 54a911b3e8161444ea6677c23aa38d17 |
SHA1: | 7c9776b4517cc6c45a3f2f98ba53b3859724eae6 |
SHA256: | e704ea2f17b1c9b22182eb203c757ba91e262983d7021f4c644b99cd98f0b0ce |
Tags: | 107-148-62-100exeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Potentially malicious time measurement code found
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Installs a raw input device (often for capturing keystrokes)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- O16AWEA5iQ.exe (PID: 1096 cmdline:
"C:\Users\ user\Deskt op\O16AWEA 5iQ.exe" MD5: 54A911B3E8161444EA6677C23AA38D17)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
OlympicDestroyer_1 | OlympicDestroyer Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
OlympicDestroyer_1 | OlympicDestroyer Payload | kevoreilly |
| |
OlympicDestroyer_1 | OlympicDestroyer Payload | kevoreilly |
|
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T13:31:48.133803+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 107.148.62.100 | 8084 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_000002EBF9BB8000 | |
Source: | Code function: | 0_2_000002EBF9BB7260 |
Networking |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |