Edit tour
Windows
Analysis Report
0t8amSU3vd.exe
Overview
General Information
Sample name: | 0t8amSU3vd.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original sample name: | ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981 |
Analysis ID: | 1586217 |
MD5: | ed98ce8f541e6871d1f39943ce09dfa3 |
SHA1: | 1fa08e8ce2c70daf4a3456eb53e48484b20d3d12 |
SHA256: | ad340c9ea5510d1f0f6149fae0bd5349d6e8b01df4eccc9a2bb300be4bc9d981 |
Infos: | |
Detection
CryptoWall, TrojanRansom
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CryptoWall ransomware
Yara detected TrojanRansom
AI detected suspicious sample
Contains functionality to determine the online IP of the system
Creates autostart registry keys with suspicious names
Creates files in the recycle bin to hide itself
Deletes itself after installation
Deletes shadow drive data (may be related to ransomware)
Drops a file containing file decryption instructions (likely related to ransomware)
Found Tor onion address
Found potential ransomware demand text
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs new ROOT certificates
Machine Learning detection for sample
May disable shadow drive data (uses vssadmin)
May drop file containing decryption instructions (likely related to ransomware)
Modifies existing user documents (likely ransomware behavior)
Moves / writes many txt or jpg files (may be a ransomware encrypting documents)
Overwrites Mozilla Firefox settings
Searches for Windows Mail specific files
Sigma detected: DNS Query Tor .Onion Address - Sysmon
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Tries to harvest and steal browser information (history, passwords, etc)
Uses TOR for connection hidding
Writes a notice file (html or txt) to demand a ransom
Writes many files with high entropy
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a Chrome extension
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: Use NTFS Short Name in Command Line
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w7x64
- 0t8amSU3vd.exe (PID: 3452 cmdline:
"C:\Users\ user\Deskt op\0t8amSU 3vd.exe" MD5: ED98CE8F541E6871D1F39943CE09DFA3) - svcmtr.exe (PID: 3504 cmdline:
C:\Users\u ser\AppDat a\Roaming\ svcmtr.exe MD5: ED98CE8F541E6871D1F39943CE09DFA3) - vssadmin.exe (PID: 3636 cmdline:
"C:\Window s\System32 \vssadmin. exe" delet e shadows /all /Quie t MD5: E23DD973E1444684EB36365DEFF1FC74) - cmd.exe (PID: 3532 cmdline:
"C:\Window s\system32 \cmd.exe" /c del C:\ Users\user \Desktop\0 T8AMS~1.EX E >> NUL MD5: AD7B9C14083B52BC532FBA5948342B98)
- svcmtr.exe (PID: 3892 cmdline:
"C:\Users\ user\AppDa ta\Roaming \svcmtr.ex e" MD5: ED98CE8F541E6871D1F39943CE09DFA3)
- svcmtr.exe (PID: 3948 cmdline:
"C:\Users\ user\AppDa ta\Roaming \svcmtr.ex e" MD5: ED98CE8F541E6871D1F39943CE09DFA3)
- svcmtr.exe (PID: 4000 cmdline:
"C:\Users\ user\AppDa ta\Roaming \svcmtr.ex e" MD5: ED98CE8F541E6871D1F39943CE09DFA3)
- chrome.exe (PID: 2696 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --start- maximized --single-a rgument C: \Users\use r\AppData\ Roaming\Mi crosoft\Wi ndows\Star t Menu\Pro grams\Star tup\restor e_files_gp mus.html MD5: FFA2B8E17F645BCC20F0E0201FEF83ED) - chrome.exe (PID: 2760 cmdline:
"C:\Progra m Files (x 86)\Google \Chrome\Ap plication\ chrome.exe " --type=u tility --u tility-sub -type=netw ork.mojom. NetworkSer vice --lan g=en-US -- service-sa ndbox-type =none --mo jo-platfor m-channel- handle=144 4 --field- trial-hand le=1208,i, 4485940417 927276280, 1440355452 6492516596 ,131072 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion /prefe tch:8 MD5: FFA2B8E17F645BCC20F0E0201FEF83ED)
- notepad.exe (PID: 1992 cmdline:
"C:\Window s\system32 \NOTEPAD.E XE" C:\Use rs\user\Ap pData\Roam ing\Micros oft\Window s\Start Me nu\Program s\Startup\ restore_fi les_gpmus. txt MD5: B32189BDFF6E577A92BAA61AD49264E6)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Cryptowall | CryptoWall is a ransomware, is usually spread by spam and phishing emails, malicious ads, hacked websites, or other malware and uses a Trojan horse to deliver the malicious payload. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Win32_Ransomware_Teslacrypt | unknown | ReversingLabs |
| |
Click to see the 10 entries |
System Summary |
---|
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Brandon George (blog post), Thomas Patzke: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T21:09:59.404903+0100 | 2021723 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49164 | 199.116.254.169 | 80 | TCP |
2025-01-08T21:10:02.476308+0100 | 2021723 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49165 | 185.230.63.171 | 80 | TCP |
2025-01-08T21:10:03.336051+0100 | 2021723 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49166 | 185.230.63.171 | 443 | TCP |
2025-01-08T21:10:04.741113+0100 | 2021723 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49167 | 34.149.87.45 | 443 | TCP |
2025-01-08T21:10:05.429191+0100 | 2021723 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49168 | 67.22.44.2 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T21:10:08.210773+0100 | 2812134 | 1 | A Network Trojan was detected | 192.168.2.22 | 63926 | 8.8.8.8 | 53 | UDP |
2025-01-08T21:10:08.228147+0100 | 2812134 | 1 | A Network Trojan was detected | 192.168.2.22 | 65510 | 8.8.8.8 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T21:09:59.404903+0100 | 2813018 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49164 | 199.116.254.169 | 80 | TCP |
2025-01-08T21:10:02.476308+0100 | 2813018 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49165 | 185.230.63.171 | 80 | TCP |
2025-01-08T21:10:05.429191+0100 | 2813018 | 1 | Malware Command and Control Activity Detected | 192.168.2.22 | 49168 | 67.22.44.2 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T21:09:37.821207+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.22 | 49163 | 34.117.59.81 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | HTTP Parser: |
Compliance |
---|
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Directory created: | ||
Source: | Directory created: | ||
Source: | Directory created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Directory queried: |
Source: | Code function: | 0_2_004139B0 | |
Source: | Code function: | 2_2_004139B0 |
Source: | Code function: | 0_2_00413780 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Code function: | 0_2_0041A560 | |
Source: | Code function: | 2_2_0041A560 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |