Edit tour
Windows
Analysis Report
Wk6IMAhBNF.exe
Overview
General Information
Sample name: | Wk6IMAhBNF.exerenamed because original name is a hash value |
Original sample name: | FF61853AA5A10D3FE8FBE0D5470DB9D0.exe |
Analysis ID: | 1581277 |
MD5: | ff61853aa5a10d3fe8fbe0d5470db9d0 |
SHA1: | bc6f2373b942643d275a062ac01367b197c3ad24 |
SHA256: | ec234980252c20fc05b927ffa9bc292c88f210bda8e2e532a38cf9cbd1e72557 |
Tags: | exeValleyRATuser-abuse_ch |
Infos: | |
Detection
GhostRat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected GhostRat
AI detected suspicious sample
Contain functionality to detect virtual machines
Contains functionality to capture and log keystrokes
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Machine Learning detection for sample
PE file has a writeable .text section
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries temperature or sensor information (via WMI often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Sleep loop found (likely to delay execution)
Stores large binary data to the registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Classification
- System is w10x64
- Wk6IMAhBNF.exe (PID: 2148 cmdline:
"C:\Users\ user\Deskt op\Wk6IMAh BNF.exe" MD5: FF61853AA5A10D3FE8FBE0D5470DB9D0)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_GhostRat | Yara detected GhostRat | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T09:57:51.073805+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.5 | 49786 | 103.199.100.97 | 8080 | TCP |
2024-12-27T09:59:01.558575+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.5 | 49786 | 103.199.100.97 | 8080 | TCP |
2024-12-27T10:00:12.511514+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.5 | 49979 | 103.199.100.97 | 8080 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_058880E0 |
Source: | Code function: | 0_2_0040BAA0 | |
Source: | Code function: | 0_2_0040BC00 | |
Source: | Code function: | 0_2_0040BC8C |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00404BBD |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | Code function: | 0_2_0588E740 | |
Source: | Code function: | 0_2_0588E740 | |
Source: | Code function: | 0_2_0588E740 | |
Source: | Code function: | 0_2_0588E740 |
Source: | Code function: | 0_2_0588E740 |
Source: | Code function: | 0_2_0588E740 |
Source: | Code function: | 0_2_0588BBD0 |
Source: | Code function: | 0_2_0588E3E0 |
Source: | Windows user hook set: | Jump to behavior |
Source: | Binary or memory string: | memstr_61d963bb-0 |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Code function: | 0_2_0588B41F | |
Source: | Code function: | 0_2_0588B443 | |
Source: | Code function: | 0_2_0588B3FB |
Source: | Code function: | 0_2_0041C186 | |
Source: | Code function: | 0_2_0041F443 | |
Source: | Code function: | 0_2_004294C2 | |
Source: | Code function: | 0_2_0041C59E | |
Source: | Code function: | 0_2_0041F672 | |
Source: | Code function: | 0_2_004127CC | |
Source: | Code function: | 0_2_0041C9D3 | |
Source: | Code function: | 0_2_00417A31 | |
Source: | Code function: | 0_2_0042BAB9 | |
Source: | Code function: | 0_2_00423B40 | |
Source: | Code function: | 0_2_00474B4C | |
Source: | Code function: | 0_2_00474B12 | |
Source: | Code function: | 0_2_00474B28 | |
Source: | Code function: | 0_2_0041BC8A | |
Source: | Code function: | 0_2_0041AD20 | |
Source: | Code function: | 0_2_0041CE08 | |
Source: | Code function: | 0_2_00473EE2 | |
Source: | Code function: | 0_2_00430EEB | |
Source: | Code function: | 0_2_00473EEF | |
Source: | Code function: | 0_2_00473EFD | |
Source: | Code function: | 0_2_00473E86 | |
Source: | Code function: | 0_2_00473E86 | |
Source: | Code function: | 0_2_05886C20 | |
Source: | Code function: | 0_2_05886ED0 | |
Source: | Code function: | 0_2_058824B0 | |
Source: | Code function: | 0_2_0589D78F | |
Source: | Code function: | 0_2_0589E231 | |
Source: | Code function: | 0_2_05898271 | |
Source: | Code function: | 0_2_0589DCE0 | |
Source: | Code function: | 0_2_0589E90D | |
Source: | Code function: | 0_2_0589F8EF | |
Source: | Code function: | 0_2_058888F0 | |
Source: | Code function: | 0_2_022977D0 | |
Source: | Code function: | 0_2_022AB4E7 | |
Source: | Code function: | 0_2_0229C575 | |
Source: | Code function: | 0_2_02284F3B | |
Source: | Code function: | 0_2_02298F43 | |
Source: | Code function: | 0_2_02281F9C | |
Source: | Code function: | 0_2_0229CC14 | |
Source: | Code function: | 0_2_023D01EA | |
Source: | Code function: | 0_2_023D0425 | |
Source: | Code function: | 0_2_023D39F5 | |
Source: | Code function: | 0_2_023D6D75 | |
Source: | Code function: | 0_2_02490246 | |
Source: | Code function: | 0_2_0246D265 | |
Source: | Code function: | 0_2_02499278 | |
Source: | Code function: | 0_2_022881FC | |
Source: | Code function: | 0_2_022868D6 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_05887730 | |
Source: | Code function: | 0_2_05887610 | |
Source: | Code function: | 0_2_05887B60 |
Source: | Code function: | 0_2_05886C20 |
Source: | Code function: | 0_2_05886020 |
Source: | Code function: | 0_2_0040C523 |
Source: | Mutant created: |
Source: | Command line argument: | 0_2_00435090 |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_05887480 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0046C024 | |
Source: | Code function: | 0_2_004932D1 | |
Source: | Code function: | 0_2_004781AF | |
Source: | Code function: | 0_2_00488396 | |
Source: | Code function: | 0_2_00492488 | |
Source: | Code function: | 0_2_00419319 | |
Source: | Code function: | 0_2_00492488 | |
Source: | Code function: | 0_2_004E7B40 | |
Source: | Code function: | 0_2_004E7D25 | |
Source: | Code function: | 0_2_004E4517 | |
Source: | Code function: | 0_2_004E7D25 | |
Source: | Code function: | 0_2_004EF5A3 | |
Source: | Code function: | 0_2_004745EE | |
Source: | Code function: | 0_2_004E4681 | |
Source: | Code function: | 0_2_004E7D25 | |
Source: | Code function: | 0_2_004E4681 | |
Source: | Code function: | 0_2_004E4681 | |
Source: | Code function: | 0_2_0048369A | |
Source: | Code function: | 0_2_004747E1 | |
Source: | Code function: | 0_2_004BD421 | |
Source: | Code function: | 0_2_004D9801 | |
Source: | Code function: | 0_2_00481832 | |
Source: | Code function: | 0_2_004DD945 | |
Source: | Code function: | 0_2_00481944 | |
Source: | Code function: | 0_2_004DD945 | |
Source: | Code function: | 0_2_004DD945 | |
Source: | Code function: | 0_2_0046B975 | |
Source: | Code function: | 0_2_0046B975 | |
Source: | Code function: | 0_2_0046B975 | |
Source: | Code function: | 0_2_00476939 | |
Source: | Code function: | 0_2_0046BFA0 |
Source: | Static PE information: |
Source: | Code function: | 0_2_0588B39D |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_0040CB1E | |
Source: | Code function: | 0_2_0040DAA8 |
Source: | Code function: | 0_2_0040DC56 |
Source: | Evasive API call chain: | graph_0-71483 |
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |