Edit tour
Windows
Analysis Report
uBZeAVcb6r.exe
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Drops PE files to the startup folder
Drops executable to a common third party application directory
Machine Learning detection for dropped file
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses cacls to modify the permissions of files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Contains functionality to detect virtual machines (SLDT)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
- uBZeAVcb6r.exe (PID: 5956 cmdline:
C:\Users\u ser\Deskto p\uBZeAVcb 6r.exe MD5: A5A4B316CC349DB892A27C9B5429DD4E) - javaw.exe (PID: 6120 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65) - icacls.exe (PID: 5144 cmdline:
C:\Windows \system32\ icacls.exe C:\Progra mData\Orac le\Java\.o racle_jre_ usage /gra nt "everyo ne":(OI)(C I)M MD5: FF0D1D4317A44C951240FAE75075D501) - conhost.exe (PID: 5156 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- discord.exe (PID: 4872 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\dis cord.exe" MD5: 94CCB92B775297F357670ABD1E6F754B) - javaw.exe (PID: 5524 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65)
- discord.exe (PID: 5824 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Internet Explorer\d iscord.exe " MD5: 94CCB92B775297F357670ABD1E6F754B) - javaw.exe (PID: 5212 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65)
- discord.exe (PID: 648 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Internet Explorer\d iscord.exe " MD5: 94CCB92B775297F357670ABD1E6F754B) - javaw.exe (PID: 4520 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
Timestamp: | 192.168.2.323.94.99.1194968613372853043 02/03/23-20:38:56.354509 |
SID: | 2853043 |
Source Port: | 49686 |
Destination Port: | 1337 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 23.94.99.119192.168.2.31337496862853042 02/03/23-20:38:54.878115 |
SID: | 2853042 |
Source Port: | 1337 |
Destination Port: | 49686 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.323.94.99.1194968613372853044 02/03/23-20:37:38.110801 |
SID: | 2853044 |
Source Port: | 49686 |
Destination Port: | 1337 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | HTTP traffic detected: |