Edit tour
Windows
Analysis Report
S1Rv3ioghk.exe
Overview
General Information
Sample name: | S1Rv3ioghk.exerenamed because original name is a hash value |
Original sample name: | FD7EC2C34E2593E4D606E0A9D37E257A.exe |
Analysis ID: | 1581258 |
MD5: | fd7ec2c34e2593e4d606e0a9d37e257a |
SHA1: | aac4d5282290c1da30acbf00703c02c5e6ee4b6e |
SHA256: | 17a742ca6bd9bd88de4f83074d17d1f74faec1b04d177bef710229c77d9e6e21 |
Tags: | exeValleyRATuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Loading BitLocker PowerShell Module
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sleep loop found (likely to delay execution)
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- S1Rv3ioghk.exe (PID: 6364 cmdline:
"C:\Users\ user\Deskt op\S1Rv3io ghk.exe" MD5: FD7EC2C34E2593E4D606E0A9D37E257A) - cmd.exe (PID: 2828 cmdline:
"C:\Window s\System32 \cmd.exe" /c start C :\Users\Pu blic\Bulet e\program\ ShellExper ienceHosts .exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5244 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ShellExperienceHosts.exe (PID: 5868 cmdline:
C:\Users\P ublic\Bule te\program \ShellExpe rienceHost s.exe MD5: 0922B22053A6D5D9516EA910D34A4771) - cmd.exe (PID: 4312 cmdline:
cmd.exe /B /c "C:\Us ers\user\A ppData\Loc al\Temp\\m onitor.bat " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 5816 cmdline:
tasklist / FI "IMAGEN AME eq She llExperien ceHosts.ex e" MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 3412 cmdline:
findstr /I "ShellExp erienceHos ts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - timeout.exe (PID: 5228 cmdline:
timeout /t 30 /nobre ak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - tasklist.exe (PID: 1988 cmdline:
tasklist / FI "IMAGEN AME eq She llExperien ceHosts.ex e" MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5368 cmdline:
findstr /I "ShellExp erienceHos ts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - timeout.exe (PID: 3588 cmdline:
timeout /t 30 /nobre ak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - tasklist.exe (PID: 4940 cmdline:
tasklist / FI "IMAGEN AME eq She llExperien ceHosts.ex e" MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 2852 cmdline:
findstr /I "ShellExp erienceHos ts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - timeout.exe (PID: 4548 cmdline:
timeout /t 30 /nobre ak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - tasklist.exe (PID: 6296 cmdline:
tasklist / FI "IMAGEN AME eq She llExperien ceHosts.ex e" MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6264 cmdline:
findstr /I "ShellExp erienceHos ts.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - timeout.exe (PID: 6448 cmdline:
timeout /t 30 /nobre ak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - cmd.exe (PID: 2488 cmdline:
cmd.exe /C powershel l -Command "Set-Exec utionPolic y Unrestri cted -Scop e CurrentU ser" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5516 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6104 cmdline:
powershell -Command "Set-Execu tionPolicy Unrestric ted -Scope CurrentUs er" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - cmd.exe (PID: 5428 cmdline:
cmd.exe /C powershel l -Executi onPolicy B ypass -Fil e C:\Users \user\AppD ata\Local\ updated.ps 1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6692 cmdline:
powershell -Executio nPolicy By pass -File C:\Users\ user\AppDa ta\Local\u pdated.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T09:20:45.215284+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.4 | 49782 | 118.107.44.112 | 18091 | TCP |
2024-12-27T09:21:56.244401+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.4 | 49793 | 118.107.44.112 | 18091 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 3_2_6C6B8E2D | |
Source: | Code function: | 3_2_6C6B8792 | |
Source: | Code function: | 3_2_6C6B84FC |
Source: | Binary or memory string: | memstr_fc1d8e85-1 |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |