Edit tour
Windows
Analysis Report
T1#U52a9#U624b1.0.1.exe
Overview
General Information
Sample name: | T1#U52a9#U624b1.0.1.exerenamed because original name is a hash value |
Original sample name: | T11.0.1.exe |
Analysis ID: | 1581935 |
MD5: | 477d3b9ee775c048f96b450dd00ba490 |
SHA1: | 81f1991882b1bf1cb4b169da6c94b772517ab1eb |
SHA256: | 799084320848500fef5673799157b94c1db7b74f9651ffe0af326051973cf490 |
Tags: | backdoorexesilverfoxwinosuser-zhuzhu0009 |
Infos: | |
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Found pyInstaller with non standard icon
Loading BitLocker PowerShell Module
Query firmware table information (likely to detect VMs)
Sigma detected: Suspicious File Creation In Uncommon AppData Folder
Suspicious powershell command line found
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
Uses Register-ScheduledTask to add task schedules
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Form action URLs do not match main URL
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
IP address seen in connection with other malware
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file contains strange resources
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- T1#U52a9#U624b1.0.1.exe (PID: 7332 cmdline:
"C:\Users\ user\Deskt op\T1#U52a 9#U624b1.0 .1.exe" MD5: 477D3B9EE775C048F96B450DD00BA490) - T1#U52a9#U624b1.0.1.exe (PID: 7348 cmdline:
"C:\Users\ user\Deskt op\T1#U52a 9#U624b1.0 .1.exe" MD5: 477D3B9EE775C048F96B450DD00BA490) - powershell.exe (PID: 7404 cmdline:
powershell -Command " $Actio n = New-Sc heduledTas kAction -E xecute 'C: \Users\use r\AppData\ Roaming\.. /LineInst. exe'; $T rigger = N ew-Schedul edTaskTrig ger -Once -At (Get-D ate); $P rincipal = New-Sched uledTaskPr incipal -U serId 'use r' -LogonT ype Intera ctive -Run Level High est; Reg ister-Sche duledTask -Action $A ction -Tri gger $Trig ger -Princ ipal $Prin cipal -Tas kName 'Mic rosoftEdge UpdatesOnc e' -Descri ption 'Mic rosoftEdge UpdatesOnc e once' -F orce; St art-Schedu ledTask -T askName 'M icrosoftEd geUpdatesO nce' " MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7544 cmdline:
powershell -Command " $Actio n = New-Sc heduledTas kAction -E xecute 'C: \Users\use r\AppData\ Roaming\.. /WinHex.ex e'; $Tri gger = New -Scheduled TaskTrigge r -AtLogon ; $Princ ipal = New -Scheduled TaskPrinci pal -UserI d 'user' - LogonType Interactiv e -RunLeve l Highest; Registe r-Schedule dTask -Act ion $Actio n -Trigger $Trigger -Principal $Principa l -TaskNam e 'Microso ftEdgeUpda tesOnceMe' -Descript ion 'Micro softEdgeUp datesOnce once You' -Force; Start-Sche duledTask -TaskName 'Microsoft EdgeUpdate sOnceMe' " MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7552 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7560 cmdline:
C:\Windows \system32\ cmd.exe /c "attrib + s +a +h C: \Users\use r\AppData\ LineInst.e xe&&attrib +s +a +h C:\Users\u ser\AppDat a\WinHex.e xe&&attrib +s +a +h C:\Users\u ser\AppDat a\SystemUp date.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7580 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - attrib.exe (PID: 7668 cmdline:
attrib +s +a +h C:\U sers\user\ AppData\Li neInst.exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - attrib.exe (PID: 7704 cmdline:
attrib +s +a +h C:\U sers\user\ AppData\Wi nHex.exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - attrib.exe (PID: 7728 cmdline:
attrib +s +a +h C:\U sers\user\ AppData\Sy stemUpdate .exe MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
- LineInst.exe (PID: 7804 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ../LineIns t.exe MD5: AA2AD37BB74C05A49417E3D2F1BD89CE) - SetupHost.exe (PID: 7892 cmdline:
"C:\$Windo ws.~WS\Sou rces\Setup Host.Exe" /Download /Web MD5: A5D94F9587F97E9C674447447721B77F)
- WinHex.exe (PID: 7812 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ../WinHex. exe MD5: EFDC5DBA52333C0F5EEEDB0308FBE2D0) - WinHex.exe (PID: 7968 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ../WinHex. exe MD5: EFDC5DBA52333C0F5EEEDB0308FBE2D0) - cmd.exe (PID: 8028 cmdline:
C:\Windows \system32\ cmd.exe /c "C:\Users \user\AppD ata\System Update.exe " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SystemUpdate.exe (PID: 8072 cmdline:
C:\Users\u ser\AppDat a\SystemUp date.exe MD5: 6BDDA8BA15F8F472FE7D065689E7D35D) - SystemUpdate.exe (PID: 8124 cmdline:
C:\Users\u ser\AppDat a\SystemUp date.exe MD5: 6BDDA8BA15F8F472FE7D065689E7D35D) - cmd.exe (PID: 8164 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8172 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5696 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 2180 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3604 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7324 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4208 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7572 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 6544 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7732 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7580 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7520 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7340 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 4584 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1196 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7372 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 4948 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 1016 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 3912 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7952 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7448 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7452 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7504 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 1076 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 652 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 1016 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5744 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 2300 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7008 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 480 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7336 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 4924 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6148 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4956 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 7840 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 8008 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 6264 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6688 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2) - cmd.exe (PID: 4004 cmdline:
C:\Windows \system32\ cmd.exe /c "schtasks /Query /T N Microsof tEdgeUpdat esOnceMe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4296 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 8024 cmdline:
schtasks / Query /TN MicrosoftE dgeUpdates OnceMe MD5: 76CD6626DD8834BD4A42E6A565104DC2)
- vdsldr.exe (PID: 7932 cmdline:
C:\Windows \System32\ vdsldr.exe -Embeddin g MD5: 472A05A6ADC167E9E5D2328AD98E3067)
- chrome.exe (PID: 7440 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 2080 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2092 --fi eld-trial- handle=200 4,i,664044 4533988444 684,515930 0963362034 494,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- svchost.exe (PID: 7752 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- chrome.exe (PID: 5292 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5300 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2076 --fi eld-trial- handle=202 8,i,454588 2299053764 737,128105 3124911410 3037,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 940 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6592 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2068 --fi eld-trial- handle=201 2,i,654286 9062695771 062,177408 3449221506 8834,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 7120 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7472 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2052 --fi eld-trial- handle=199 6,i,379156 9026057449 520,155593 7511202883 5645,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 3736 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7852 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2052 --fi eld-trial- handle=199 6,i,677080 7407451840 845,273155 8754491331 151,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 5300 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=532930 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6676 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2052 --fi eld-trial- handle=199 2,i,293139 9691241927 18,1358387 8474494082 115,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 180 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 2324 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2152 --fi eld-trial- handle=198 8,i,490316 6560758941 508,110374 7211490069 2945,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 7576 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// go.microso ft.com/fwl ink/?LinkI d=530045 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6764 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =1476 --fi eld-trial- handle=205 6,i,155883 3944355029 7223,13273 6420162814 84051,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-29T13:40:37.759404+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.4 | 49905 | 8.212.101.195 | 1122 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 13_2_0052C0E8 | |
Source: | Code function: | 13_2_0051C3FB | |
Source: | Code function: | 13_2_0051C3BE | |
Source: | Code function: | 13_2_0051C464 | |
Source: | Code function: | 13_2_0051C4D7 | |
Source: | Code function: | 13_2_00528A9A | |
Source: | Code function: | 13_2_00523F26 |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | File created: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Code function: | 0_2_00007FF7A6746714 | |
Source: | Code function: | 0_2_00007FF7A6737820 | |
Source: | Code function: | 0_2_00007FF7A6746714 | |
Source: | Code function: | 0_2_00007FF7A67509B4 | |
Source: | Code function: | 12_2_00007FF7C5BE6714 | |
Source: | Code function: | 12_2_00007FF7C5BE6714 | |
Source: | Code function: | 12_2_00007FF7C5BD7820 | |
Source: | Code function: | 12_2_00007FF7C5BF09B4 | |
Source: | Code function: | 13_2_004FFD75 | |
Source: | Code function: | 13_2_00544EA0 | |
Source: | Code function: | 19_2_00007FF657806714 | |
Source: | Code function: | 19_2_00007FF6577F7820 | |
Source: | Code function: | 19_2_00007FF657806714 | |
Source: | Code function: | 19_2_00007FF6578109B4 |
Source: | Code function: | 13_2_00544D90 |
Networking |
---|
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Windows user hook set: |
Source: | Code function: | 13_2_0054B1B1 | |
Source: | Code function: | 13_2_0054B274 | |
Source: | Code function: | 13_2_004E7ACA | |
Source: | Code function: | 13_2_0052B0B2 | |
Source: | Code function: | 13_2_005211C8 | |
Source: | Code function: | 13_2_0050D55E | |
Source: | Code function: | 13_2_0050CACB | |
Source: | Code function: | 13_2_0050FABD | |
Source: | Code function: | 13_2_004FDD47 | |
Source: | Code function: | 13_2_0051CD74 | |
Source: | Code function: | 13_2_0050FD1E | |
Source: | Code function: | 13_2_0054AE25 |
Source: | Code function: | 13_2_004FE3BE |
Source: | File created: | Jump to behavior | ||
Source: | File created: |
Source: | Code function: | 0_2_00007FF7A6736780 | |
Source: | Code function: | 0_2_00007FF7A6755D6C | |
Source: | Code function: | 0_2_00007FF7A6746714 | |
Source: | Code function: | 0_2_00007FF7A6754E20 | |
Source: | Code function: | 0_2_00007FF7A6746F98 | |
Source: | Code function: | 0_2_00007FF7A6740FB4 | |
Source: | Code function: | 0_2_00007FF7A6742800 | |
Source: | Code function: | 0_2_00007FF7A674D718 | |
Source: | Code function: | 0_2_00007FF7A6744F50 | |
Source: | Code function: | 0_2_00007FF7A675509C | |
Source: | Code function: | 0_2_00007FF7A674D098 | |
Source: | Code function: | 0_2_00007FF7A67380A0 | |
Source: | Code function: | 0_2_00007FF7A6755820 | |
Source: | Code function: | 0_2_00007FF7A6746714 | |
Source: | Code function: | 0_2_00007FF7A6740DB0 | |
Source: | Code function: | 0_2_00007FF7A6752D30 | |
Source: | Code function: | 0_2_00007FF7A6746560 | |
Source: | Code function: | 0_2_00007FF7A674FA08 | |
Source: | Code function: | 0_2_00007FF7A6741E70 | |
Source: | Code function: | 0_2_00007FF7A6748BA0 | |
Source: | Code function: | 0_2_00007FF7A6740BA4 | |
Source: | Code function: | 0_2_00007FF7A67413C4 | |
Source: | Code function: | 0_2_00007FF7A674CC04 | |
Source: | Code function: | 0_2_00007FF7A6742C04 | |
Source: | Code function: | 0_2_00007FF7A6758B68 | |
Source: | Code function: | 0_2_00007FF7A6731B90 | |
Source: | Code function: | 0_2_00007FF7A67409A0 | |
Source: | Code function: | 0_2_00007FF7A67509B4 | |
Source: | Code function: | 0_2_00007FF7A67411C0 | |
Source: | Code function: | 0_2_00007FF7A67531CC | |
Source: | Code function: | 0_2_00007FF7A674FA08 | |
Source: | Code function: | 12_2_00007FF7C5BF4E20 | |
Source: | Code function: | 12_2_00007FF7C5BF5D6C | |
Source: | Code function: | 12_2_00007FF7C5BD6780 | |
Source: | Code function: | 12_2_00007FF7C5BE6714 | |
Source: | Code function: | 12_2_00007FF7C5BE1E70 | |
Source: | Code function: | 12_2_00007FF7C5BE0DB0 | |
Source: | Code function: | 12_2_00007FF7C5BE6560 | |
Source: | Code function: | 12_2_00007FF7C5BEFA08 | |
Source: | Code function: | 12_2_00007FF7C5BF2D30 | |
Source: | Code function: | 12_2_00007FF7C5BD80A0 | |
Source: | Code function: | 12_2_00007FF7C5BF509C | |
Source: | Code function: | 12_2_00007FF7C5BED098 | |
Source: | Code function: | 12_2_00007FF7C5BE6714 | |
Source: | Code function: | 12_2_00007FF7C5BF5820 | |
Source: | Code function: | 12_2_00007FF7C5BE2800 | |
Source: | Code function: | 12_2_00007FF7C5BE6F98 | |
Source: | Code function: | 12_2_00007FF7C5BE0FB4 | |
Source: | Code function: | 12_2_00007FF7C5BED718 | |
Source: | Code function: | 12_2_00007FF7C5BE4F50 | |
Source: | Code function: | 12_2_00007FF7C5BEFA08 | |
Source: | Code function: | 12_2_00007FF7C5BE09A0 | |
Source: | Code function: | 12_2_00007FF7C5BF09B4 | |
Source: | Code function: | 12_2_00007FF7C5BE11C0 | |
Source: | Code function: | 12_2_00007FF7C5BF31CC | |
Source: | Code function: | 12_2_00007FF7C5BE2C04 | |
Source: | Code function: | 12_2_00007FF7C5BECC04 | |
Source: | Code function: | 12_2_00007FF7C5BE0BA4 | |
Source: | Code function: | 12_2_00007FF7C5BE8BA0 | |
Source: | Code function: | 12_2_00007FF7C5BE13C4 | |
Source: | Code function: | 12_2_00007FF7C5BF8B68 | |
Source: | Code function: | 12_2_00007FF7C5BD1B90 | |
Source: | Code function: | 13_2_0053F60E | |
Source: | Code function: | 13_2_005041C5 | |
Source: | Code function: | 13_2_0051D1EE | |
Source: | Code function: | 13_2_0053A197 | |
Source: | Code function: | 13_2_005342E0 | |
Source: | Code function: | 13_2_005393D4 | |
Source: | Code function: | 13_2_0054F480 | |
Source: | Code function: | 13_2_004F95CA | |
Source: | Code function: | 13_2_0051C650 | |
Source: | Code function: | 13_2_0053167A | |
Source: | Code function: | 13_2_0052F6F2 | |
Source: | Code function: | 13_2_005177F7 | |
Source: | Code function: | 13_2_0052D7FE | |
Source: | Code function: | 13_2_005367EE | |
Source: | Code function: | 13_2_00527783 | |
Source: | Code function: | 13_2_00503859 | |
Source: | Code function: | 13_2_0051F942 | |
Source: | Code function: | 13_2_00534940 | |
Source: | Code function: | 13_2_00531970 | |
Source: | Code function: | 13_2_004F490F | |
Source: | Code function: | 13_2_0051CB3C | |
Source: | Code function: | 13_2_004C3B8C | |
Source: | Code function: | 13_2_00502BB0 | |
Source: | Code function: | 13_2_0052EC40 | |
Source: | Code function: | 13_2_00525C92 | |
Source: | Code function: | 13_2_00538CAC | |
Source: | Code function: | 13_2_004FCDC6 | |
Source: | Code function: | 13_2_00519EBC | |
Source: | Code function: | 19_2_00007FF6577F6780 | |
Source: | Code function: | 19_2_00007FF657815D6C | |
Source: | Code function: | 19_2_00007FF65780FA08 | |
Source: | Code function: | 19_2_00007FF657806714 | |
Source: | Code function: | 19_2_00007FF6577F80A0 | |
Source: | Code function: | 19_2_00007FF65780D098 | |
Source: | Code function: | 19_2_00007FF65781509C | |
Source: | Code function: | 19_2_00007FF657802800 | |
Source: | Code function: | 19_2_00007FF657815820 | |
Source: | Code function: | 19_2_00007FF657804F50 | |
Source: | Code function: | 19_2_00007FF657806F98 | |
Source: | Code function: | 19_2_00007FF657800FB4 | |
Source: | Code function: | 19_2_00007FF657806714 | |
Source: | Code function: | 19_2_00007FF65780D718 | |
Source: | Code function: | 19_2_00007FF657801E70 | |
Source: | Code function: | 19_2_00007FF657814E20 | |
Source: | Code function: | 19_2_00007FF657806560 | |
Source: | Code function: | 19_2_00007FF65780FA08 | |
Source: | Code function: | 19_2_00007FF657800DB0 | |
Source: | Code function: | 19_2_00007FF657812D30 | |
Source: | Code function: | 19_2_00007FF6578013C4 | |
Source: | Code function: | 19_2_00007FF657802C04 | |
Source: | Code function: | 19_2_00007FF65780CC04 | |
Source: | Code function: | 19_2_00007FF657818B68 | |
Source: | Code function: | 19_2_00007FF6577F1B90 | |
Source: | Code function: | 19_2_00007FF657800BA4 | |
Source: | Code function: | 19_2_00007FF657808BA0 | |
Source: | Code function: | 19_2_00007FF6578011C0 | |
Source: | Code function: | 19_2_00007FF6578131CC | |
Source: | Code function: | 19_2_00007FF6578009A0 | |
Source: | Code function: | 19_2_00007FF6578109B4 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary string: |