Edit tour
Windows
Analysis Report
4V6Beh3FOX.exe
Overview
General Information
Sample name: | 4V6Beh3FOX.exerenamed because original name is a hash value |
Original sample name: | 942fa054aa449b438d394d6b37d383af.exe |
Analysis ID: | 1520457 |
MD5: | 942fa054aa449b438d394d6b37d383af |
SHA1: | 1dd5556529cf575c5d14b74e51f082cff3b33bbf |
SHA256: | 77a4b26f77a0ce0c304b98002536fe19ecf8cd736ab20c4aad314e4c8b4d947e |
Tags: | exeuser-abuse_ch |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query network adapater information
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- 4V6Beh3FOX.exe (PID: 8104 cmdline:
"C:\Users\ user\Deskt op\4V6Beh3 FOX.exe" MD5: 942FA054AA449B438D394D6B37D383AF)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_0045C730 |
Source: | Binary or memory string: | memstr_6a684240-d |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0040E160 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_0041AE10 |
Source: | Code function: | 0_2_0041AE10 |
Source: | Code function: | 0_2_00410970 |
Source: | Code function: | 0_2_0040403E | |
Source: | Code function: | 0_2_00413100 | |
Source: | Code function: | 0_2_00403190 | |
Source: | Code function: | 0_2_0047A230 | |
Source: | Code function: | 0_2_0044F2E0 | |
Source: | Code function: | 0_2_0041D350 | |
Source: | Code function: | 0_2_0045B420 | |
Source: | Code function: | 0_2_004024B0 | |
Source: | Code function: | 0_2_00401610 | |
Source: | Code function: | 0_2_00416740 | |
Source: | Code function: | 0_2_004107A0 | |
Source: | Code function: | 0_2_00459AE0 | |
Source: | Code function: | 0_2_0041AE10 | |
Source: | Code function: | 0_2_00405FA0 | |
Source: | Code function: | 0_2_00472FB0 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00411750 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00448140 |
Source: | Code function: | 0_2_0042C159 |
Source: | Code function: | 0_2_004139D8 |
Source: | Code function: | 0_2_00412DA0 |
Malware Analysis System Evasion |
---|
Source: | Code function: | 0_2_00415420 | |
Source: | Code function: | 0_2_00415A90 |
Source: | Code function: | 0_2_00410870 |
Source: | Code function: | 0_2_00415A90 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_0040F8A0 |
Source: | Code function: | 0_2_0042C2EB |
Source: | Code function: | 0_2_00448140 |
Source: | Code function: | 0_2_00420DE0 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_0042C2EB | |
Source: | Code function: | 0_2_0042C47D | |
Source: | Code function: |