Edit tour
Windows
Analysis Report
sJ9Q8UWMAX.com_7fdb00c80f0250575a05601c08627d50
Overview
General Information
Sample Name: | sJ9Q8UWMAX.com_7fdb00c80f0250575a05601c08627d50 (renamed file extension from com_7fdb00c80f0250575a05601c08627d50 to exe) |
Analysis ID: | 666578 |
MD5: | 7fdb00c80f0250575a05601c08627d50 |
SHA1: | 709a67ee148978a05bb3c3b530d68004c1eb5196 |
SHA256: | 5d47d5ad88c5d99cac3a860e682bb9542046e05ee33b3a4fd896db5464e7f0a6 |
Tags: | exe |
Infos: | |
Detection
CryptOne, Mofksys
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Mofksys
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Detected CryptOne packer
Detected unpacking (changes PE section rights)
Antivirus detection for dropped file
PE file has a writeable .text section
Queries memory information (via WMI often done to detect virtual machines)
Machine Learning detection for sample
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Drops executables to the windows directory (C:\Windows) and starts them
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Drops PE files with benign system names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Creates files inside the system directory
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Queries information about the installed CPU (vendor, model number etc)
PE file does not import any functions
Modifies existing windows services
Sample file is different than original file name gathered from version info
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Contains functionality to detect virtual machines (SGDT)
Classification
- System is w10x64
- sJ9Q8UWMAX.exe (PID: 6872 cmdline:
"C:\Users\ user\Deskt op\sJ9Q8UW MAX.exe" MD5: 7FDB00C80F0250575A05601C08627D50) - sj9q8uwmax.exe (PID: 6912 cmdline:
c:\users\u ser\deskto p\sj9q8uwm ax.exe MD5: 871EB4B8AEFAEA1113DD3F08B7CB535C) - sj9q8uwmax.exe (PID: 7024 cmdline:
"c:\users\ user\deskt op\sj9q8uw max.exe " --local-se rvice MD5: 871EB4B8AEFAEA1113DD3F08B7CB535C) - sj9q8uwmax.exe (PID: 2884 cmdline:
"c:\users\ user\deskt op\sj9q8uw max.exe " --local-co ntrol MD5: 871EB4B8AEFAEA1113DD3F08B7CB535C) - icsys.icn.exe (PID: 6972 cmdline:
C:\Windows \Resources \Themes\ic sys.icn.ex e MD5: 0A9BDF90EF50DEF16C6D4C363D0F0B9C) - explorer.exe (PID: 7056 cmdline:
c:\windows \resources \themes\ex plorer.exe MD5: DD8285E811872E2562A43A04A7B27672) - spoolsv.exe (PID: 2532 cmdline:
c:\windows \resources \spoolsv.e xe SE MD5: A97B2BA7591F981B8BBB1CE5E78C8D3A) - svchost.exe (PID: 2960 cmdline:
c:\windows \resources \svchost.e xe MD5: E2A51AD55E5850D878E994E774D44ED1) - spoolsv.exe (PID: 5092 cmdline:
c:\windows \resources \spoolsv.e xe PR MD5: A97B2BA7591F981B8BBB1CE5E78C8D3A)
- svchost.exe (PID: 6104 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 6536 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
- explorer.exe (PID: 2928 cmdline:
"C:\window s\resource s\themes\e xplorer.ex e" RO MD5: DD8285E811872E2562A43A04A7B27672)
- svchost.exe (PID: 6468 cmdline:
"C:\window s\resource s\svchost. exe" RO MD5: E2A51AD55E5850D878E994E774D44ED1)
- svchost.exe (PID: 4672 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
Click to see the 11 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Spreading |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Networking |
---|
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: |
Source: | JA3 fingerprint: |
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: |