Edit tour
Windows
Analysis Report
dropper.exe
Overview
General Information
Detection
Score: | 66 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Found direct / indirect Syscall (likely to bypass EDR)
Injects code into the Windows Explorer (explorer.exe)
Tries to delay execution (extensive OutputDebugStringW loop)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Enables driver privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Uses Microsoft's Enhanced Cryptographic Provider
Classification
- System is w10x64native
- dropper.exe (PID: 8776 cmdline:
"C:\Users\ user\Deskt op\dropper .exe" MD5: B86AC1DA682DBCF7461084E143B3B1EF) - conhost.exe (PID: 8784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 8920 cmdline:
"C:\Window s\System32 \cmd.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - winlogon.exe (PID: 884 cmdline:
winlogon.e xe MD5: A987B43E6A8E8F894B98A3DF022DB518) - lsass.exe (PID: 948 cmdline:
C:\Windows \system32\ lsass.exe MD5: 15A556DEF233F112D127025AB51AC2D3) - svchost.exe (PID: 568 cmdline:
C:\Windows \system32\ svchost.ex e -k DcomL aunch -p MD5: F586835082F632DC8D9404D83BC16316) - fontdrvhost.exe (PID: 780 cmdline:
"fontdrvho st.exe" MD5: AB7AB4CF816D091EEE234C1D9BC4FD13) - fontdrvhost.exe (PID: 688 cmdline:
"fontdrvho st.exe" MD5: AB7AB4CF816D091EEE234C1D9BC4FD13) - svchost.exe (PID: 1072 cmdline:
C:\Windows \system32\ svchost.ex e -k RPCSS -p MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1124 cmdline:
C:\Windows \system32\ svchost.ex e -k DcomL aunch -p - s LSM MD5: F586835082F632DC8D9404D83BC16316) - dwm.exe (PID: 1188 cmdline:
"dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C) - svchost.exe (PID: 1276 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s g psvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1312 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s lmhosts MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1344 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s NcbService MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1352 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s TimeBroke rSvc MD5: F586835082F632DC8D9404D83BC16316) - IntelCpHDCPSvc.exe (PID: 1444 cmdline:
C:\Windows \System32\ DriverStor e\FileRepo sitory\iig d_dch.inf_ amd64_3ea7 56ac68d34d 21\IntelCp HDCPSvc.ex e MD5: B6BAD2BD8596D9101874E9042B8E2D63) - svchost.exe (PID: 1452 cmdline:
C:\Windows \system32\ svchost.ex e -k Local Service -p -s EventS ystem MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1484 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s S chedule MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1528 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s P rofSvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1552 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s EventLog MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1652 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s S ENS MD5: F586835082F632DC8D9404D83BC16316) - igfxCUIService.exe (PID: 1740 cmdline:
C:\Windows \System32\ DriverStor e\FileRepo sitory\cui _dch.inf_a md64_2e49f 48165b8de1 0\igfxCUIS ervice.exe MD5: 91038D45A86B5465E8B7E5CD63187150) - svchost.exe (PID: 1748 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s U serManager MD5: F586835082F632DC8D9404D83BC16316) - IntelCpHeciSvc.exe (PID: 1764 cmdline:
C:\Windows \System32\ DriverStor e\FileRepo sitory\iig d_dch.inf_ amd64_3ea7 56ac68d34d 21\IntelCp HeciSvc.ex e MD5: 3B0DF35583675DE5A08E8D4C1271CEC0) - svchost.exe (PID: 1836 cmdline:
C:\Windows \system32\ svchost.ex e -k Local Service -p -s nsi MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1904 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s Dhcp MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1952 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNoN etwork -p MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2004 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s T hemes MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1404 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s AudioEndpo intBuilder MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 1400 cmdline:
C:\Windows \system32\ svchost.ex e -k Local Service -p -s FontCa che MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2100 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p -s NlaS vc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2272 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s netpro fm MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2392 cmdline:
C:\Windows \system32\ svchost.ex e -k Local Service -p -s DispBr okerDeskto pSvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2424 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNet workRestri cted -p -s WinHttpAu toProxySvc MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2492 cmdline:
C:\Windows \system32\ svchost.ex e -k Netwo rkService -p -s Dnsc ache MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2588 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2676 cmdline:
C:\Windows \System32\ svchost.ex e -k Local ServiceNet workRestri cted -p MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2684 cmdline:
C:\Windows \system32\ svchost.ex e -k Local ServiceNet workRestri cted -p MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2692 cmdline:
C:\Windows \system32\ svchost.ex e -k appmo del -p -s StateRepos itory MD5: F586835082F632DC8D9404D83BC16316) - svchost.exe (PID: 2748 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s S hellHWDete ction MD5: F586835082F632DC8D9404D83BC16316)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Code function: | 0_2_00007FF66AC9B240 | |
Source: | Code function: | 3_2_00000222EDEBD8F0 | |
Source: | Code function: | 3_2_00007FFB8354D8F0 |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |