Windows Analysis Report
0yGDYqDKv5.exe

Overview

General Information

Sample name: 0yGDYqDKv5.exe
renamed because original name is a hash value
Original sample name: 25a8358dbb560482b6e59b518702a746.exe
Analysis ID: 1520467
MD5: 25a8358dbb560482b6e59b518702a746
SHA1: 220ec6d3999372e7d06f9df88b0c1953caa3c6e2
SHA256: 97d1edc59b66e32eb0f1f816312fa5d2011f987dfc48c4bc7c07d163fd614db9
Tags: exeuser-abuse_ch
Infos:

Detection

BlackMoon
Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected BlackMoon Ransomware
AI detected suspicious sample
Detected VMProtect packer
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

AV Detection

barindex
Source: 0yGDYqDKv5.exe ReversingLabs: Detection: 50%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: 0yGDYqDKv5.exe Joe Sandbox ML: detected
Source: 0yGDYqDKv5.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb/ source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD19.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD19.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb11 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb- source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\C++\hacking\cod_driver\x64\Release\kdmapper_driver.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Labs\Shark-master\Build\Bins\AMD64\Shark.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD20.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\willwon\source\repos\mutante3\mutante\build\bin\mutante.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Windows\Start.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: e:\work\dangerzone\flashdriverwin32\Release\i386\amifldrv32.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD20.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: e:\work\dangerzone\flashdriverwin64\Release\amd64\amifldrv64.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: global traffic HTTP traffic detected: GET /BOT2/Var HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: 154.12.36.162Cache-Control: no-cache
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.36.162
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.36.162
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.36.162
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.36.162
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.36.162
Source: unknown TCP traffic detected without corresponding DNS query: 154.12.36.162
Source: global traffic HTTP traffic detected: GET /BOT2/Var HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: 154.12.36.162Cache-Control: no-cache
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://103.239.244.218:8898/
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://103.239.244.218:8898/600006030021.00
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://154.12.36.162/BOT2/LDvar.exe
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.000000000050A000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://154.12.36.162/BOT2/Var
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.pki.jemmylovejenny.tk/EVRootCA.crt0?
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://cacerts.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crls.pki.jemmylovejenny.tk/EVRootCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crls.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://crls.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.digicert.com0A
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.digicert.com0H
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.digicert.com0I
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.pki.jemmylovejenny.tk/EVRootCA0=
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.pki.jemmylovejenny.tk/SHA1TimeStampingServicesCA0O
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.pki.jemmylovejenny.tk/SHA2TimeStampingServicesCA0O
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ocsp.thawte.com0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://sf.symcb.com/sf.crl0f
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://sf.symcb.com/sf.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://sf.symcd.com0&
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://t2.symcb.com0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://tl.symcb.com/tl.crl0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://tl.symcb.com/tl.crt0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://tl.symcd.com0&
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000B44000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://d.symcb.com/cps0%
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://d.symcb.com/rpa0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://github.com/cadsondemak/kanit)
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://pki.jemmylovejenny.tk/cps0/
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://pki.jemmylovejenny.tk/rpa0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://scripts.sil.org/OFLThis
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://scripts.sil.org/OFLhttps://www.katatrad.comhttps://cadsondemak.comKatatrad
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://www.thawte.com/cps0/
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: https://www.thawte.com/repository0

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.a91197.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.a91197.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.a87642.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.62901a.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.613a00.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.616eba.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.0yGDYqDKv5.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: 0yGDYqDKv5.exe PID: 5536, type: MEMORYSTR

System Summary

barindex
Source: 0.2.0yGDYqDKv5.exe.a91197.4.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.a91197.4.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.a87642.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.62901a.3.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.613a00.6.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.616eba.5.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0.2.0yGDYqDKv5.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
Source: 0yGDYqDKv5.exe Static PE information: .vmp0 and .vmp1 section names
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameiQVW64.SYSH vs 0yGDYqDKv5.exe
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameShark.sys, vs 0yGDYqDKv5.exe
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameiQVW64.SYSH vs 0yGDYqDKv5.exe
Source: 0yGDYqDKv5.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 0.2.0yGDYqDKv5.exe.a91197.4.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.a91197.4.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.a84e2a.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.a87642.2.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.62901a.3.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.613a00.6.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.616eba.5.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: 0.2.0yGDYqDKv5.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
Source: classification engine Classification label: mal88.rans.evad.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 0yGDYqDKv5.exe ReversingLabs: Detection: 50%
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: msvfw32.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: avifil32.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: msacm32.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: d3d9.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: 0yGDYqDKv5.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: 0yGDYqDKv5.exe Static file information: File size 8818688 > 1048576
Source: 0yGDYqDKv5.exe Static PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x866000
Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb/ source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD19.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD19.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Documents\Desktop\kdmapper-master\x64\Release\kdmapper.pdb11 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\Kernel_project\kdmapper\x64\Release\kdmapper.pdb- source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\C++\hacking\cod_driver\x64\Release\kdmapper_driver.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: D:\Labs\Shark-master\Build\Bins\AMD64\Shark.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: \Kdmapper-Bypass360-main\kdmapper-master\x64\Release\kdmapper.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD20.pdb55 source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\willwon\source\repos\mutante3\mutante\build\bin\mutante.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Windows\Start.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: e:\work\dangerzone\flashdriverwin32\Release\i386\amifldrv32.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: UI\x64\Release\COD20.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.00000000005DB000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: e:\work\dangerzone\flashdriverwin64\Release\amd64\amifldrv64.pdb source: 0yGDYqDKv5.exe, 00000000.00000002.3295192113.0000000000A7D000.00000002.00000001.01000000.00000003.sdmp
Source: initial sample Static PE information: section where entry point is pointing to: .vmp1
Source: 0yGDYqDKv5.exe Static PE information: section name: .vmp0
Source: 0yGDYqDKv5.exe Static PE information: section name: .vmp1

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 35B0005 value: E9 2B BA 90 73 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 76EBBA30 value: E9 DA 45 6F 8C Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 36C0008 value: E9 8B 8E 84 73 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 76F08E90 value: E9 80 71 7B 8C Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 36D0005 value: E9 8B 4D 3A 72 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 75A74D90 value: E9 7A B2 C5 8D Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 36F0005 value: E9 EB EB 39 72 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 75A8EBF0 value: E9 1A 14 C6 8D Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 3700005 value: E9 8B 8A 75 72 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 75E58A90 value: E9 7A 75 8A 8D Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 3710005 value: E9 2B 02 77 72 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 75E80230 value: E9 DA FD 88 8D Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 3720005 value: E9 8B 2F 7D 73 Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Memory written: PID: 5536 base: 76EF2F90 value: E9 7A D0 82 8C Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295843603.0000000000C07000.00000020.00000001.01000000.00000003.sdmp Binary or memory string: 4SBIEDLL.DLL
Source: 0yGDYqDKv5.exe, 00000000.00000002.3295843603.0000000000C07000.00000020.00000001.01000000.00000003.sdmp Binary or memory string: 4SBIEDLL.DLL=
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe RDTSC instruction interceptor: First address: 13844C5 second address: 13844D7 instructions: 0x00000000 rdtsc 0x00000002 xor cl, FFFFFFA0h 0x00000005 stc 0x00000006 rol cl, 1 0x00000008 or al, 5Ch 0x0000000a neg ah 0x0000000c rol dx, FF80h 0x00000010 xor bl, cl 0x00000012 rdtsc
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe RDTSC instruction interceptor: First address: C9DBF7 second address: C9DC09 instructions: 0x00000000 rdtsc 0x00000002 xor cl, FFFFFFA0h 0x00000005 stc 0x00000006 rol cl, 1 0x00000008 or al, 5Ch 0x0000000a neg ah 0x0000000c rol dx, FF80h 0x00000010 xor bl, cl 0x00000012 rdtsc
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe RDTSC instruction interceptor: First address: CA5EB8 second address: CA5EBB instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 rdtsc
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: 0yGDYqDKv5.exe, 00000000.00000002.3296531490.00000000019FB000.00000004.00000020.00020000.00000000.sdmp, 0yGDYqDKv5.exe, 00000000.00000002.3296531490.000000000198E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\0yGDYqDKv5.exe Process information queried: ProcessInformation Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs