Play interactive tourEdit tour
Windows Analysis Report fillProxy_for_terminal_20210702_v1.0.0.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Infects executable files (exe, dll, sys, html)
Changes security center settings (notifications, updates, antivirus, firewall)
Uses regedit.exe to modify the Windows registry
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Uses the system / local time for branch decision (may execute only at specific dates)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain checking for process token information
Sigma detected: Imports Registry Key From a File
PE file contains more sections than normal
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
PE file contains sections with non-standard names
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Uses cacls to modify the permissions of files
Installs a global mouse hook
Found evaded block containing many API calls
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Classification
Process Tree |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Imports Registry Key From a File | Show sources |
Source: | Author: Oddvar Moe, Sander Wiebing, oscd.community: |
Jbx Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
Source: | Code function: | 20_2_000A9EB7 | |
Source: | Code function: | 20_2_000CF961 | |
Source: | Code function: | 20_2_000A9C99 | |
Source: | Code function: | 21_2_00029EB7 | |
Source: | Code function: | 21_2_0004F961 | |
Source: | Code function: | 21_2_00029C99 | |
Source: | Code function: | 23_2_00FCF961 | |
Source: | Code function: | 23_2_00FA9C99 | |
Source: | Code function: | 23_2_00FA9EB7 | |
Source: | Code function: | 27_2_012CF961 | |
Source: | Code function: | 27_2_012A9C99 | |
Source: | Code function: | 27_2_012A9EB7 |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Key value queried: | ||
Source: | Key value queried: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: | |||
Source: | File created: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Spreading: |
---|
Infects executable files (exe, dll, sys, html) | Show sources |
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: | ||
Source: | System file written: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Code function: | 0_2_0040E4C1 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_0040E2EE | |
Source: | Code function: | 0_2_0040B6B3 | |
Source: | Code function: | 0_2_0041FB81 | |
Source: | Code function: | 20_2_00093BC3 | |
Source: | Code function: | 20_2_000D4315 | |
Source: | Code function: | 20_2_000A993E | |
Source: | Code function: | 20_2_000C7A87 | |
Source: | Code function: | 21_2_00054315 | |
Source: | Code function: | 21_2_0002993E | |
Source: | Code function: | 21_2_00013BC3 | |
Source: | Code function: | 21_2_00047A87 | |
Source: | Code function: | 23_2_00FA993E | |
Source: | Code function: | 23_2_00F93BC3 | |
Source: | Code function: | 23_2_00FD4315 | |
Source: | Code function: | 27_2_012D4315 | |
Source: | Code function: | 27_2_01293BC3 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |