Edit tour
Windows
Analysis Report
ywvz5i8kT9
Overview
General Information
Detection
Score: | 66 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for domain / URL
Sigma detected: Registry Defender Tampering
Uses cmd line tools excessively to alter registry or file data
Sample is not signed and drops a device driver
Uses known network protocols on non-standard ports
Install WinpCap (used to filter network traffic)
Machine Learning detection for sample
Drops executables to the windows directory (C:\Windows) and starts them
PE file contains section with special chars
Sigma detected: File Created with System Process Name
Changes security center settings (notifications, updates, antivirus, firewall)
Sigma detected: Suspicious Outbound Kerberos Connection
PE file has nameless sections
Creates an undocumented autostart registry key
Creates files inside the driver directory
Drops PE files to the application program directory (C:\ProgramData)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Changes image file execution options
Contains functionality to dynamically determine API calls
Uses the system / local time for branch decision (may execute only at specific dates)
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Modifies existing windows services
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain checking for process token information
Creates driver files
Binary contains a suspicious time stamp
Uses reg.exe to modify the Windows registry
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
Enables debug privileges
Is looking for software installed on the system
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Detected TCP or UDP traffic on non-standard ports
Found evaded block containing many API calls
Creates or modifies windows services
Queries disk information (often used to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Sigma detected: Autorun Keys Modification
Classification
- System is w10x64
- ywvz5i8kT9.exe (PID: 6280 cmdline:
"C:\Users\ user\Deskt op\ywvz5i8 kT9.exe" MD5: 375B713F2E3C2018DA424666C6BE9059) - cmd.exe (PID: 6828 cmdline:
cmd.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 6836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - reg.exe (PID: 6888 cmdline:
reg add "H KLM\SOFTWA RE\Microso ft\Windows \CurrentVe rsion\Expl orer" /v S martScreen Enabled /t REG_SZ /d "Off" /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 6912 cmdline:
reg add "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\AppH ost" /v "E nableWebCo ntentEvalu ation" /t REG_DWORD /d "0" /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 6924 cmdline:
reg add "H KCU\Softwa re\Classes \Local Set tings\Soft ware\Micro soft\Windo ws\Current Version\Ap pContainer \Storage\m icrosoft.m icrosofted ge_8wekyb3 d8bbwe\Mic rosoftEdge \PhishingF ilter" /v "EnabledV9 " /t REG_D WORD /d "0 " /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 6940 cmdline:
reg add "H KLM\SOFTWA RE\Policie s\Microsof t\Windows Defender" /v Disable AntiSpywar e /t REG_D WORD /d 1 /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 6956 cmdline:
reg add "H KLM\SOFTWA RE\Policie s\Microsof t\Windows Defender\S pynet" /v SpyNetRepo rting /t R EG_DWORD / d 0 /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 6972 cmdline:
reg add "H KLM\SOFTWA RE\Policie s\Microsof t\Windows Defender\S pynet" /v SubmitSamp lesConsent /t REG_DW ORD /d 2 / f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 6988 cmdline:
reg add "H KLM\SOFTWA RE\Policie s\Microsof t\Windows Defender\S pynet" /v DontReport InfectionI nformation /t REG_DW ORD /d 1 / f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 7000 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \Sense" /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 7020 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \SecurityH ealthServi ce" /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 7036 cmdline:
reg add "H KLM\SOFTWA RE\Policie s\Microsof t\MRT" /v "DontRepor tInfection Informatio n" /t REG_ DWORD /d 1 /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 7052 cmdline:
reg add "H KLM\SOFTWA RE\Policie s\Microsof t\MRT" /v "DontOffer ThroughWUA U" /t REG_ DWORD /d 1 /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 7064 cmdline:
reg delete "HKLM\SOF TWARE\Micr osoft\Wind ows\Curren tVersion\R un" /v "Se curityHeal th" /f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 7104 cmdline:
reg delete "HKLM\SOF TWARE\Micr osoft\Wind ows\Curren tVersion\E xplorer\St artupAppro ved\Run" / v "Securit yHealth" / f MD5: E3DACF0B31841FA02064B4457D44B357) - reg.exe (PID: 3032 cmdline:
reg add "H KLM\SOFTWA RE\Microso ft\Windows NT\Curren tVersion\I mage File Execution Options\Se cHealthUI. exe" /v De bugger /t REG_SZ /d "C:\Window s\System32 \taskkill. exe" /f MD5: E3DACF0B31841FA02064B4457D44B357) - WinPcap_4_1_3.exe (PID: 3836 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\W inPcap_4_1 _3.exe" MD5: A11A2F0CFE6D0B4C50945989DB6360CD) - vcredist_2010_x64.exe (PID: 3108 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\v credist_20 10_x64.exe " /q /nore start MD5: CBE0B05C11D5D523C2AF997D737C137B) - vcredist_2013_x64.exe (PID: 6716 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\v credist_20 13_x64.exe " /q /nore start MD5: 4CCF1937068BF8D0773341F86A448634) - vcredist_2013_x64.exe (PID: 6384 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\v credist_20 13_x64.exe " /q /nore start -bur n.unelevat ed BurnPip e.{2D277E6 C-5CDF-4BE 9-BD86-D80 206082B4F} {7764B93C -9D98-4483 -A035-10A6 3673DA0D} 6716 MD5: 4CCF1937068BF8D0773341F86A448634) - sc.exe (PID: 3568 cmdline:
"C:\Window s\system32 \sc.exe" c reate svch ost binPat h= C:\Wind ows\SysWOW 64\Runtime Broker.exe start= au to Display Name= svch ost MD5: D79784553A9410D15E04766AAAB77CD6) - conhost.exe (PID: 6568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - sc.exe (PID: 6400 cmdline:
C:\Windows \system32\ sc.exe" de scription svchost "? ???? ??? ?? ?? ???? ?? ?? ?? ??? ?? ??? (VPN) ??? ?????. ? ? ??? ???? ? ?? ? ???? ????? ??? ?? ???? ?? ?? ????. MD5: D79784553A9410D15E04766AAAB77CD6) - conhost.exe (PID: 6356 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - sc.exe (PID: 6360 cmdline:
"C:\Window s\system32 \sc.exe" c onfig svch ost start= auto MD5: D79784553A9410D15E04766AAAB77CD6) - conhost.exe (PID: 6912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - sc.exe (PID: 6916 cmdline:
"C:\Window s\system32 \sc.exe" s tart svcho st MD5: D79784553A9410D15E04766AAAB77CD6) - conhost.exe (PID: 6956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- svchost.exe (PID: 6788 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 3256 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 2732 cmdline:
c:\windows \system32\ svchost.ex e -k local service -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 1312 cmdline:
c:\windows \system32\ svchost.ex e -k netwo rkservice -p -s DoSv c MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 3740 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 5208 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- SgrmBroker.exe (PID: 1048 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
- svchost.exe (PID: 4952 cmdline:
c:\windows \system32\ svchost.ex e -k local servicenet workrestri cted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 6440 cmdline:
c:\windows \system32\ svchost.ex e -k unist acksvcgrou p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 6736 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
- RuntimeBroker.exe (PID: 7008 cmdline:
C:\Windows \SysWOW64\ RuntimeBro ker.exe MD5: 737DF71F01C8DE6613D9A5F1870A6CB2)
- svchost.exe (PID: 2064 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_NET_NAME_ConfuserEx | Detects ConfuserEx packed file | Arnim Rupp |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_NET_NAME_ConfuserEx | Detects ConfuserEx packed file | Arnim Rupp |
| |
SUSP_NET_NAME_ConfuserEx | Detects ConfuserEx packed file | Arnim Rupp |
|
System Summary |
---|
Source: | Author: Florian Roth: |
Source: | Author: Sander Wiebing, Tim Shelton: |
Source: | Author: Ilyas Ochkov, oscd.community: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: frack113: |
Timestamp: | 04/19/22-16:44:26.306507 04/19/22-16:44:26.306507 |
SID: | 2034340 |
Source Port: | 49758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 04/19/22-16:44:36.911779 04/19/22-16:44:36.911779 |
SID: | 2034340 |
Source Port: | 49758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 04/19/22-16:44:41.532338 04/19/22-16:44:41.532338 |
SID: | 2034340 |
Source Port: | 49758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 04/19/22-16:44:27.387415 04/19/22-16:44:27.387415 |
SID: | 2034340 |
Source Port: | 49758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 04/19/22-16:44:38.649934 04/19/22-16:44:38.649934 |
SID: | 2034340 |
Source Port: | 49758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 04/19/22-16:44:37.995145 04/19/22-16:44:37.995145 |
SID: | 2034340 |
Source Port: | 49758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Code function: | 31_2_01004F6B | |
Source: | Code function: | 31_2_010045EB | |
Source: | Code function: | 32_2_01298101 | |
Source: | Code function: | 32_2_012B7378 | |
Source: | Code function: | 32_2_01298386 | |
Source: | Code function: | 32_2_01297E2A |
Source: | Static PE information: |
Source: | Key value queried: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Code function: | 31_2_010046B9 | |
Source: | Code function: | 32_2_012B66A3 | |
Source: | Code function: | 32_2_01298BE8 | |
Source: | Code function: | 32_2_012B5710 |
Networking |
---|
Source: | Snort IDS: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |