Edit tour
Windows
Analysis Report
S1Rv3ioghk.exe
Overview
General Information
Sample name: | S1Rv3ioghk.exerenamed because original name is a hash value |
Original sample name: | FD7EC2C34E2593E4D606E0A9D37E257A.exe |
Analysis ID: | 1581258 |
MD5: | fd7ec2c34e2593e4d606e0a9d37e257a |
SHA1: | aac4d5282290c1da30acbf00703c02c5e6ee4b6e |
SHA256: | 17a742ca6bd9bd88de4f83074d17d1f74faec1b04d177bef710229c77d9e6e21 |
Tags: | exeValleyRATuser-abuse_ch |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- S1Rv3ioghk.exe (PID: 4464 cmdline:
"C:\Users\ user\Deskt op\S1Rv3io ghk.exe" MD5: FD7EC2C34E2593E4D606E0A9D37E257A) - cmd.exe (PID: 6304 cmdline:
"C:\Window s\System32 \cmd.exe" /c start C :\Users\Pu blic\Bulet e\program\ ShellExper ienceHosts .exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 432 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ShellExperienceHosts.exe (PID: 4228 cmdline:
C:\Users\P ublic\Bule te\program \ShellExpe rienceHost s.exe MD5: 0922B22053A6D5D9516EA910D34A4771) - WerFault.exe (PID: 1436 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 228 -s 852 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Code function: | 4_2_6C6D8E2D | |
Source: | Code function: | 4_2_6C6D8792 | |
Source: | Code function: | 4_2_6C6D84FC |
Source: | Binary or memory string: | memstr_c72f41ab-2 |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |