Edit tour
Windows
Analysis Report
caseup.exe
Overview
General Information
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for dropped file
Sigma detected: Schedule system process
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Found decision node followed by non-executed suspicious APIs
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Detected TCP or UDP traffic on non-standard ports
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Downloads executable code via HTTP
Classification
- System is w7x64
- loaddll64.exe (PID: 2080 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\cas eup.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6) - cmd.exe (PID: 2948 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\cas eup.dll",# 1 MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41) - rundll32.exe (PID: 500 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\case up.dll",#1 MD5: DD81D91FF3B0763C392422865C9AC12E) - rundll32.exe (PID: 772 cmdline:
rundll32.e xe C:\Prog ramData\St ndUpdate\U imbTD.dll, DllMain MD5: DD81D91FF3B0763C392422865C9AC12E) - schtasks.exe (PID: 1288 cmdline:
"C:\Window s\system32 \schtasks. exe" /Crea te /SC MIN UTE /MO 1 /TN Stdnts Update /TR "C:\Windo ws\system3 2\rundll32 .exe C:\Pr ogramData\ StndUpdate \UimbTD.dl l,DllMain" /f MD5: 97E0EC3D6D99E8CC2B17EF2D3760E8FC) - rundll32.exe (PID: 1184 cmdline:
rundll32.e xe C:\User s\user\Des ktop\caseu p.dll,DllM ain MD5: DD81D91FF3B0763C392422865C9AC12E) - rundll32.exe (PID: 1552 cmdline:
rundll32.e xe C:\Prog ramData\St ndUpdate\U imbTD.dll, DllMain MD5: DD81D91FF3B0763C392422865C9AC12E) - schtasks.exe (PID: 1688 cmdline:
"C:\Window s\system32 \schtasks. exe" /Crea te /SC MIN UTE /MO 1 /TN Stdnts Update /TR "C:\Windo ws\system3 2\rundll32 .exe C:\Pr ogramData\ StndUpdate \UimbTD.dl l,DllMain" /f MD5: 97E0EC3D6D99E8CC2B17EF2D3760E8FC)
- taskeng.exe (PID: 1424 cmdline:
taskeng.ex e {195B2CF 0-9BCC-414 5-91B3-379 20C07B877} S-1-5-21- 966771315- 3019405637 -367336477 -1006:user -PC\user:I nteractive :[1] MD5: 65EA57712340C09B1B0C427B4848AE05) - rundll32.exe (PID: 1748 cmdline:
C:\Windows \system32\ rundll32.e xe C:\Prog ramData\St ndUpdate\U imbTD.dll, DllMain MD5: DD81D91FF3B0763C392422865C9AC12E)
- cleanup
⊘No configs have been found
⊘No yara matches
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: |
Source: | Code function: | 1_2_000007FEF30A38A0 | |
Source: | Code function: | 9_2_000007FEF2F2EC80 |
Source: | Static PE information: |
Networking |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | HTTP traffic detected: |