Edit tour
Windows
Analysis Report
S3zoj9Uts0.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Drops executable to a common third party application directory
Machine Learning detection for sample
Machine Learning detection for dropped file
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses cacls to modify the permissions of files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
- S3zoj9Uts0.exe (PID: 1172 cmdline:
C:\Users\u ser\Deskto p\S3zoj9Ut s0.exe MD5: 94CCB92B775297F357670ABD1E6F754B) - javaw.exe (PID: 3372 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65) - icacls.exe (PID: 3048 cmdline:
C:\Windows \system32\ icacls.exe C:\Progra mData\Orac le\Java\.o racle_jre_ usage /gra nt "everyo ne":(OI)(C I)M MD5: FF0D1D4317A44C951240FAE75075D501) - conhost.exe (PID: 4904 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- discord.exe (PID: 5836 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Internet Explorer\d iscord.exe " MD5: 94CCB92B775297F357670ABD1E6F754B) - javaw.exe (PID: 5944 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65)
- discord.exe (PID: 3160 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Internet Explorer\d iscord.exe " MD5: 94CCB92B775297F357670ABD1E6F754B) - javaw.exe (PID: 4904 cmdline:
"C:\Progra m Files (x 86)\Java\j re1.8.0_21 1\bin\java w.exe" -ja r "C:\User s\user\App Data\Local \Temp\jarv a.jar" MD5: 4BFEB2F64685DA09DEBB95FB981D4F65)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
Timestamp: | 192.168.2.423.94.99.1194969813372853044 02/03/23-20:40:09.381307 |
SID: | 2853044 |
Source Port: | 49698 |
Destination Port: | 1337 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Snort IDS: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | HTTP traffic detected: |