MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8029bb75c733a49efcb6d7f37d65dc29f9cbe8eeedd08ca5d6c4702aa2c803c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 8 File information Comments

SHA256 hash: 8029bb75c733a49efcb6d7f37d65dc29f9cbe8eeedd08ca5d6c4702aa2c803c5
SHA3-384 hash: 68c86021e43a08156a7034240bcfe0c76f4d1e0b0c63059fbfb8258816032e92e68c09f45a1f76fb1bec4311c5487605
SHA1 hash: ea288f2a1bfd4c9c1ab4c73766d7cefffb1abd52
MD5 hash: f4eb314990fcccf751dd2a6351000b30
humanhash: oven-march-cardinal-two
File name:f4eb314990fcccf751dd2a6351000b30.exe
Download: download sample
File size:3'752'536 bytes
First seen:2024-04-28 08:51:44 UTC
Last seen:2024-04-28 09:32:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e569e6f445d32ba23766ad67d1e3787f (262 x Adware.Generic, 41 x RecordBreaker, 24 x RedLineStealer)
ssdeep 98304:ykLuzxCVSkfhVcsvCSHoqBTBeab7mskt29s4C1eH9N:d0xCxpfCS/jP5kt5o9N
TLSH T13C06013FF268A13EC5AA1B3205739320997BBA51681A8C1F47FC344DCF765601E3B65A
TrID 39.3% (.EXE) Inno Setup installer (107240/4/30)
21.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
15.7% (.EXE) InstallShield setup (43053/19/16)
15.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.8% (.EXE) Win64 Executable (generic) (10523/12/4)
File icon (PE):PE icon
dhash icon 5050d270cccc82ae (109 x Adware.Generic, 43 x LummaStealer, 42 x OffLoader)
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
272
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8029bb75c733a49efcb6d7f37d65dc29f9cbe8eeedd08ca5d6c4702aa2c803c5.exe
Verdict:
Malicious activity
Analysis date:
2024-04-28 08:55:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Restart of the analyzed sample
Searching for the window
Creating a file in the Windows subdirectories
Moving a file to the Windows subdirectory
Creating a file
Moving a recently created file
Launching a process
Creating a process with a hidden window
Creating a file in the Program Files subdirectories
Creating a service
Launching a service
Moving a file to the Program Files subdirectory
Enabling autorun for a service
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint installer lolbin overlay packed setupapi shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain checking for user administrative privileges
Found stalling execution ending in API Sleep call
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432804 Sample: 31jvjGbPV0.exe Startdate: 28/04/2024 Architecture: WINDOWS Score: 64 102 validating.lat 2->102 104 launcheradmin.shop 2->104 106 fg.microsoft.map.fastly.net 2->106 116 Multi AV Scanner detection for submitted file 2->116 118 Drops executables to the windows directory (C:\Windows) and starts them 2->118 13 31jvjGbPV0.exe 2 2->13         started        16 Runtimebroker88.exe 2->16         started        19 svchost.exe 2->19         started        22 MicrosoftEdgeUpdate.exe 2->22         started        signatures3 process4 dnsIp5 88 C:\Users\user\AppData\...\31jvjGbPV0.tmp, PE32 13->88 dropped 24 31jvjGbPV0.tmp 4 13 13->24         started        112 Found stalling execution ending in API Sleep call 16->112 108 127.0.0.1 unknown unknown 19->108 file6 signatures7 process8 dnsIp9 110 launcheradmin.shop 176.9.63.49, 443, 49705, 49706 HETZNER-ASDE Germany 24->110 86 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 24->86 dropped 122 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->122 29 31jvjGbPV0.exe 2 24->29         started        file10 signatures11 process12 file13 90 C:\Users\user\AppData\...\31jvjGbPV0.tmp, PE32 29->90 dropped 32 31jvjGbPV0.tmp 29 32 29->32         started        process14 dnsIp15 100 validating.lat 63.250.38.89, 443, 49712 NAMECHEAP-NETUS United States 32->100 70 C:\adobeData\runtimes\...\is-I308H.tmp, PE32 32->70 dropped 72 C:\adobeData\...\WebView2Loader.dll (copy), PE32 32->72 dropped 74 C:\adobeData\runtimes\...\is-BKCI9.tmp, PE32+ 32->74 dropped 76 14 other files (none is malicious) 32->76 dropped 114 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 32->114 37 MicrosoftEdgeWebview2Setup.exe 107 32->37         started        41 sc.exe 1 32->41         started        43 sc.exe 1 32->43         started        45 sc.exe 1 32->45         started        file16 signatures17 process18 file19 78 C:\Program Files (x86)\...\psuser_arm64.dll, PE32+ 37->78 dropped 80 C:\Program Files (x86)\...\psuser_64.dll, PE32+ 37->80 dropped 82 C:\Program Files (x86)\...\psuser.dll, PE32 37->82 dropped 84 97 other files (none is malicious) 37->84 dropped 120 Found evasive API chain checking for user administrative privileges 37->120 47 MicrosoftEdgeUpdate.exe 2 4 37->47         started        50 conhost.exe 41->50         started        52 conhost.exe 43->52         started        54 conhost.exe 45->54         started        signatures20 process21 file22 92 C:\...\MicrosoftEdgeUpdate.exe, PE32 47->92 dropped 94 C:\...\psuser_arm64.dll (copy), PE32+ 47->94 dropped 96 C:\...\psuser_64.dll (copy), PE32+ 47->96 dropped 98 98 other files (none is malicious) 47->98 dropped 56 MicrosoftEdgeUpdate.exe 78 47->56         started        58 MicrosoftEdgeUpdate.exe 28 47->58         started        60 MicrosoftEdgeUpdate.exe 47->60         started        62 MicrosoftEdgeUpdate.exe 47->62         started        process23 process24 64 MicrosoftEdgeUpdateComRegisterShell64.exe 56->64         started        66 MicrosoftEdgeUpdateComRegisterShell64.exe 56->66         started        68 MicrosoftEdgeUpdateComRegisterShell64.exe 56->68         started       
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-04-28 01:06:36 UTC
File Type:
PE (Exe)
Extracted files:
38
AV detection:
15 of 24 (62.50%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Checks system information in the registry
Drops file in System32 directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Registers COM server for autorun
Creates new service(s)
Downloads MZ/PE file
Sets file execution options in registry
Unpacked files
SH256 hash:
9b166cb8d2e5644a0cd410fa027f1e0578cdd9251b0c1723409bd6ed0befa657
MD5 hash:
6ee0a57959144040037f46a1e5910cd5
SHA1 hash:
fc9e8fa7b5ca29545bbe8581e08480c5f6a241e0
SH256 hash:
e0a56c60014e99f9a9662d992ef40a79a2af804bf0860514246360b99dafd709
MD5 hash:
cc72ce4e157142d34da7f1fa6aea2c78
SHA1 hash:
ed349ac2a14cd99a2a48a597ff96aeacad5c44dd
SH256 hash:
9ade3839bec86b460e4e15a704683bd3a8b9877404195e3fbbb7d7d0813efa65
MD5 hash:
61fa48a46b14e7c6a7b55f05951a56f0
SHA1 hash:
e4c34d406a41aad50ccd99c3b9b7c5836f8ce500
SH256 hash:
e1e43d67179743041ade34fcca7e908a05741113a8e9acd00dd273a645aaac37
MD5 hash:
67f477c08c39a8c9393d9515b52c169d
SHA1 hash:
a67b18bcb6c83bdea8144b807645c6b62066eaf7
SH256 hash:
d8853259e66279f11e6e3fb7080164a7e71f9c86f33efee180e11bb850a6b7bf
MD5 hash:
d1afb984423d5d4080904b8e652b139c
SHA1 hash:
0759ba8369b83ef29de1f5c0d0da2124ccc5fac8
SH256 hash:
9e4a0bf1b653b393aacb2b0d1bb4a82740102aa285835b091905b3dbbc8f3ec3
MD5 hash:
0027978f918d4e4b6fc2833ff3c7d1ed
SHA1 hash:
bc3634c64c55ddeca5cf4687db07645a036312ea
SH256 hash:
8029bb75c733a49efcb6d7f37d65dc29f9cbe8eeedd08ca5d6c4702aa2c803c5
MD5 hash:
f4eb314990fcccf751dd2a6351000b30
SHA1 hash:
ea288f2a1bfd4c9c1ab4c73766d7cefffb1abd52
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 8029bb75c733a49efcb6d7f37d65dc29f9cbe8eeedd08ca5d6c4702aa2c803c5

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationadvapi32.dll::ConvertSidToStringSidW
advapi32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
advapi32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryW
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoW
kernel32.dll::GetDiskFreeSpaceW
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryValueExW
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageW
user32.dll::CreateWindowExW

Comments