Edit tour
Windows
Analysis Report
Hwacaj.exe
Overview
General Information
Detection
Darkbot
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Yara detected Darkbot
AI detected suspicious sample
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Contains functionality to access PhysicalDrive, possible boot sector overwrite
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Found API chain indicative of debugger detection
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking system information)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Changes the start page of internet explorer
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to get notified if a device is plugged in / out
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w7x64
- Hwacaj.exe (PID: 3532 cmdline:
"C:\Users\ user\Deskt op\Hwacaj. exe" MD5: 9F8ABA858F3A742000B8D2CDF3E96AEE) - notepad.exe (PID: 3544 cmdline:
"C:\Window s\notepad. exe" MD5: B32189BDFF6E577A92BAA61AD49264E6) - Hwacaj.exe (PID: 3556 cmdline:
"C:\Users\ user\Deskt op\Hwacaj. exe" MD5: 9F8ABA858F3A742000B8D2CDF3E96AEE) - iexplore.exe (PID: 3628 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\iexplore .exe" MD5: 8A590F790A98F3D77399BE457E01386A) - iexplore.exe (PID: 3636 cmdline:
"C:\Progra m Files\In ternet Exp lorer\IEXP LORE.EXE" MD5: 4EB098135821348270F27157F7A84E65) - iexplore.exe (PID: 3732 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:3636 CR EDAT:27545 7 /prefetc h:2 MD5: 8A590F790A98F3D77399BE457E01386A) - WmiPrvSE.exe (PID: 2004 cmdline:
C:\Windows \sysWOW64\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 54B7C43C2E89F5CE71B2C255C1CF35E2) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1272 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 652 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1696 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 628 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1376 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1784 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 436 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1628 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1808 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 848 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2880 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2872 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2836 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2712 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2736 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2892 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 3036 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2052 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2664 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1076 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1448 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2468 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1372 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2344 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1212 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1468 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2184 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2188 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2908 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2920 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2244 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 2180 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717) - LMrDJmjGiVuMmdtVXtMTEmE.exe (PID: 1440 cmdline:
"C:\Progra m Files (x 86)\FoPwVA mUWJRKQDKE QtsCbGxUBx jOXWMRfIaJ bqWbfVLsWI EAsTtOljzA DqR\LMrDJm jGiVuMmdtV XtMTEmE.ex e" MD5: 32B8AD6ECA9094891E792631BAEA9717)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Darkbot | Yara detected Darkbot | Joe Security | ||
JoeSecurity_Darkbot | Yara detected Darkbot | Joe Security | ||
JoeSecurity_Darkbot | Yara detected Darkbot | Joe Security | ||
JoeSecurity_Darkbot | Yara detected Darkbot | Joe Security | ||
JoeSecurity_Darkbot | Yara detected Darkbot | Joe Security | ||
Click to see the 32 entries |
System Summary |
---|
Source: | Author: frack113: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 2_2_00408C90 | |
Source: | Code function: | 2_2_00401EA0 | |
Source: | Code function: | 2_2_00408B30 | |
Source: | Code function: | 7_2_05E28B30 | |
Source: | Code function: | 7_2_05E21EA0 | |
Source: | Code function: | 7_2_05E28C90 | |
Source: | Code function: | 10_2_00198C90 | |
Source: | Code function: | 10_2_00191EA0 | |
Source: | Code function: | 10_2_00198B30 | |
Source: | Code function: | 11_2_00391EA0 | |
Source: | Code function: | 11_2_00398C90 | |
Source: | Code function: | 11_2_00398B30 | |
Source: | Code function: | 12_2_00108C90 | |
Source: | Code function: | 12_2_00101EA0 | |
Source: | Code function: | 12_2_00108B30 | |
Source: | Code function: | 13_2_00251EA0 | |
Source: | Code function: | 13_2_00258C90 | |
Source: | Code function: | 13_2_00258B30 | |
Source: | Code function: | 14_2_00108C90 | |
Source: | Code function: | 14_2_00101EA0 | |
Source: | Code function: | 14_2_00108B30 | |
Source: | Code function: | 15_2_00548C90 | |
Source: | Code function: | 15_2_00541EA0 | |
Source: | Code function: | 15_2_00548B30 | |
Source: | Code function: | 16_2_00148C90 | |
Source: | Code function: | 16_2_00141EA0 | |
Source: | Code function: | 16_2_00148B30 | |
Source: | Code function: | 17_2_001B8C90 | |
Source: | Code function: | 17_2_001B1EA0 | |
Source: | Code function: | 17_2_001B8B30 | |
Source: | Code function: | 18_2_00178C90 | |
Source: | Code function: | 18_2_00171EA0 | |
Source: | Code function: | 18_2_00178B30 | |
Source: | Code function: | 19_2_00178C90 | |
Source: | Code function: | 19_2_00171EA0 | |
Source: | Code function: | 19_2_00178B30 | |
Source: | Code function: | 20_2_00271EA0 | |
Source: | Code function: | 20_2_00278C90 | |
Source: | Code function: | 20_2_00278B30 | |
Source: | Code function: | 21_2_00158C90 | |
Source: | Code function: | 21_2_00151EA0 | |
Source: | Code function: | 21_2_00158B30 | |
Source: | Code function: | 22_2_00548C90 | |
Source: | Code function: | 22_2_00541EA0 | |
Source: | Code function: | 22_2_00548B30 | |
Source: | Code function: | 23_2_00271EA0 | |
Source: | Code function: | 23_2_00278C90 | |
Source: | Code function: | 23_2_00278B30 | |
Source: | Code function: | 24_2_00351EA0 | |
Source: | Code function: | 24_2_00358C90 | |
Source: | Code function: | 24_2_00358B30 | |
Source: | Code function: | 25_2_00168C90 | |
Source: | Code function: | 25_2_00161EA0 | |
Source: | Code function: | 25_2_00168B30 | |
Source: | Code function: | 26_2_00108C90 | |
Source: | Code function: | 26_2_00101EA0 | |
Source: | Code function: | 26_2_00108B30 | |
Source: | Code function: | 27_2_00371EA0 | |
Source: | Code function: | 27_2_00378C90 | |
Source: | Code function: | 27_2_00378B30 | |
Source: | Code function: | 28_2_00331EA0 | |
Source: | Code function: | 28_2_00338C90 | |
Source: | Code function: | 28_2_00338B30 | |
Source: | Code function: | 29_2_00371EA0 | |
Source: | Code function: | 29_2_00378C90 | |
Source: | Code function: | 29_2_00378B30 | |
Source: | Code function: | 30_2_00291EA0 | |
Source: | Code function: | 30_2_00298C90 | |
Source: | Code function: | 30_2_00298B30 | |
Source: | Code function: | 31_2_00601EA0 | |
Source: | Code function: | 31_2_00608C90 | |
Source: | Code function: | 31_2_00608B30 | |
Source: | Code function: | 32_2_00098C90 | |
Source: | Code function: | 32_2_00091EA0 | |
Source: | Code function: | 32_2_00098B30 | |
Source: | Code function: | 33_2_002A1EA0 | |
Source: | Code function: | 33_2_002A8C90 | |
Source: | Code function: | 33_2_002A8B30 | |
Source: | Code function: | 34_2_00548C90 | |
Source: | Code function: | 34_2_00541EA0 | |
Source: | Code function: | 34_2_00548B30 | |
Source: | Code function: | 35_2_00271EA0 | |
Source: | Code function: | 35_2_00278C90 | |
Source: | Code function: | 35_2_00278B30 | |
Source: | Code function: | 36_2_001A8C90 | |
Source: | Code function: | 36_2_001A1EA0 | |
Source: | Code function: | 36_2_001A8B30 | |
Source: | Code function: | 37_2_00148C90 | |
Source: | Code function: | 37_2_00141EA0 | |
Source: | Code function: | 37_2_00148B30 | |
Source: | Code function: | 38_2_00221EA0 | |
Source: | Code function: | 38_2_00228C90 | |
Source: | Code function: | 38_2_00228B30 | |
Source: | Code function: | 39_2_00188C90 | |
Source: | Code function: | 39_2_00181EA0 | |
Source: | Code function: | 39_2_00188B30 | |
Source: | Code function: | 40_2_00341EA0 | |
Source: | Code function: | 40_2_00348C90 | |
Source: | Code function: | 40_2_00348B30 | |
Source: | Code function: | 41_2_008B8C90 | |
Source: | Code function: | 41_2_008B1EA0 | |
Source: | Code function: | 41_2_008B8B30 |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |