Edit tour
Windows
Analysis Report
dr0p.exe
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Drops PE files to the startup folder
Found API chain with Download & Execute functionality
Machine Learning detection for sample
Uses ping.exe to check the status of other devices and networks
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
File is packed with WinRar
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- dr0p.exe (PID: 5412 cmdline:
"C:\Users\ user\Deskt op\dr0p.ex e" MD5: D085F244D635D6E43546E63649EA2E67) - mh.exe (PID: 1176 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\mh. exe" MD5: 287EEBE03B7EC7488ED2AE07A5E98CF0) - q.exe (PID: 1596 cmdline:
"C:\Users\ user\Deskt op\q.exe" hm.exe MD5: 935809D393A2BF9F0E886A41FF5B98BE) - conhost.exe (PID: 6904 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - hm.exe (PID: 5788 cmdline:
"C:\Users\ user\Deskt op\hm.exe" MD5: 692D72923747BE1ED2C05CD6B4118BF4) - conhost.exe (PID: 5908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1616 cmdline:
"C:\Window s\System32 \cmd.exe" /c ping -c 2 jnkmfjq corurgzffk isb4ndio7b i7glp7.oas t.fun MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 5976 cmdline:
ping -c 2 jnkmfjqcor urgzffkisb 4ndio7bi7g lp7.oast.f un MD5: B3624DD758CCECF93A1226CEF252CA12)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-06T06:03:58.177534+0100 | 2019714 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49709 | 23.27.51.244 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-06T06:03:58.177534+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49709 | 23.27.51.244 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Binary string: |
Source: | Code function: | 3_2_00007FF741EBB190 | |
Source: | Code function: | 3_2_00007FF741EA40BC | |
Source: | Code function: | 3_2_00007FF741ECFCA0 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Process created: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |