FindVUK.exe
This report is generated from a file or URL submitted to this webservice
on June 26th 2021 00:07:24 (UTC)
Guest System:
Windows 7 64 bit, Professional, 6.1 (build 7601), Service Pack 1
Report generated by Falcon Sandbox © Hybrid Analysis
Incident Response
Risk Assessment
- Remote Access
- Reads terminal service related keys (often RDP related)
- Evasive
- Possibly tries to implement anti-virtualization techniques
- Network Behavior
- Contacts 1 domain and 1 host. View all details
MITRE ATT&CK™ Techniques Detection
Additional Context
Related Sandbox Artifacts
- Associated SHA256s
-
8cdead397a0559ba1e38f1040a82c7fd9754251f1856eee982448cf8d845cafd
98d277af543a93b20361ae902c83c108eb63c77f5a6192e992baf5d8d2c404bd
4efd9d703023b96a3375df093640aa77f009f4726f601b1b9423537f0056d1f7
ba78adaa2b8506b6f80f30190c1c5a1f74c8f7c5dc2b492525897b2a94e81555
9341e322d9d5715ca35e2117f1233011c04f273a21616fe0e05b53e8763f9905
eee347ec53d439bdc9ff9480210a9e6bd2f71ed5be60f6d69465b35070b39b44
180a284ee53c97206742602f62f4aa8b8a1114b4f793c506d80e0d025662c480 - Associated URLs
- hxxp://fvonline-db.bplaced.net/findvuk/FindVUK_1.38.zip
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 2
-
External Systems
-
Sample was identified as malicious by a trusted Antivirus engine
- details
- No specific details available
- source
- External System
- relevance
- 5/10
-
Sample was identified as malicious by at least one Antivirus engine
- details
-
2/37 Antivirus vendors marked sample as malicious (5% detection rate)
3/71 Antivirus vendors marked sample as malicious (4% detection rate) - source
- External System
- relevance
- 8/10
-
Sample was identified as malicious by a trusted Antivirus engine
-
Suspicious Indicators 13
-
Anti-Reverse Engineering
-
Possibly checks for known debuggers/analysis tools
- details
-
"http://live.sysinternals.com/procdump.exe" (Indicator: "sysinternals")
"http://live.sysinternals.com/procdump64.exe" (Indicator: "sysinternals")
"Software\Sysinternals\ProcDump" (Indicator: "sysinternals")
"Please download it manually from the SysInternals website" (Indicator: "sysinternals")
"ProcDumpUrl = http://live.sysinternals.com/procdump.exe" (Indicator: "sysinternals")
"ProcDump64Url = http://live.sysinternals.com/procdump64.exe" (Indicator: "sysinternals") - source
- File/Memory
- relevance
- 2/10
-
Possibly checks for known debuggers/analysis tools
-
Environment Awareness
-
Possibly tries to implement anti-virtualization techniques
- details
-
"QEMU Drive detected - accept it as 'blu-ray' drive - Vendor >" (Indicator: "qemu")
"VMware drive detected - assume bluray compatibility" (Indicator: "vmware")
"Oracle Virtualbox 'VBOX CD-ROM' detected, continue with enumeration" (Indicator: "vbox")
"Oracle Virtualbox 'VBOX CD-ROM' detected, continue with enumeration" (Indicator: "virtualbox")
"VBOX CD-ROM" (Indicator: "vbox")
"Oracle Virtualbox 'VBOX CD-ROM' detected - accept it as 'blu-ray' drive" (Indicator: "vbox")
"Oracle Virtualbox 'VBOX CD-ROM' detected - accept it as 'blu-ray' drive" (Indicator: "virtualbox")
"VBOX drive in 'passthrough' mode detected - assume it's a 'virtual' drive" (Indicator: "vbox") - source
- File/Memory
- relevance
- 4/10
- ATT&CK ID
- T1497 (Show technique in the MITRE ATT&CK™ matrix)
-
Possibly tries to implement anti-virtualization techniques
-
External Systems
-
Found an IP/URL artifact that was identified as malicious by at least one reputation engine
- details
- 2/88 reputation engines marked "http://example.com" as malicious (2% detection rate)
- source
- External System
- relevance
- 10/10
-
Found an IP/URL artifact that was identified as malicious by at least one reputation engine
-
General
-
Reads configuration files
- details
- "FindVUK.exe" read file "C:\config\FindVUK.ini"
- source
- API Call
- relevance
- 4/10
-
Reads configuration files
-
Network Related
-
Found potential IP address in binary/memory
- details
-
Potential IP "127.0.0.1" found in string "127.0.0.1/"
"2.5.29.18"
"2.5.29.19"
"2.5.29.17"
Potential IP "10.0.4.9" found in string "ERROR! Starting with DVDfab 10.0.4.9 the VUK is not available in memory any longer!"
Potential IP "9.2.1.2" found in string "ERROR! Starting with Passkey 9.2.1.2 the VUK is not available im memory any longer!" - source
- File/Memory
- relevance
- 3/10
-
Sends traffic on typical HTTP outbound port, but without HTTP header
- details
- TCP traffic to 162.55.0.134 on port 80 is sent without HTTP header
- source
- Network Traffic
- relevance
- 5/10
- ATT&CK ID
- T1043 (Show technique in the MITRE ATT&CK™ matrix)
-
Uses a User Agent typical for browsers, although no browser was ever launched
- details
- Found user agent(s): Mozilla/5.0 Gecko/41.0 Firefox/41.0
- source
- Network Traffic
- relevance
- 10/10
-
Found potential IP address in binary/memory
-
Remote Access Related
-
Reads terminal service related keys (often RDP related)
- details
- "FindVUK.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\TERMINAL SERVER"; Key: "TSUSERENABLED")
- source
- Registry Access
- relevance
- 10/10
- ATT&CK ID
- T1076 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads terminal service related keys (often RDP related)
-
Unusual Characteristics
-
Imports suspicious APIs
- details
-
RegCloseKey
RegOpenKeyExW
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
UnhandledExceptionFilter
GetTempPathW
DeviceIoControl
CopyFileW
GetModuleFileNameW
CreateThread
TerminateProcess
SleepEx
CreateToolhelp32Snapshot
LoadLibraryW
GetVersionExW
GetTickCount
VirtualProtect
LoadLibraryA
GetFileSize
OpenProcess
CreateDirectoryW
DeleteFileW
GetProcAddress
GetFileSizeEx
FindNextFileW
FindFirstFileW
CreateFileW
CreateFileA
Process32NextW
GetCommandLineW
Process32FirstW
GetModuleHandleA
GetModuleHandleW
WriteFile
CreateProcessW
Sleep
VirtualAlloc
ShellExecuteExW
GetWindowThreadProcessId
FindWindowExW
FindWindowW
accept
WSAStartup
connect
closesocket
send
listen
recv
socket
bind - source
- Static Parser
- relevance
- 1/10
-
Installs hooks/patches the running process
- details
-
"FindVUK.exe" wrote bytes "c0df87771cf98677ccf886770d64887700000000c011037600000000fc3e037600000000e0130376000000009457f87525e08777c6e0877700000000bc6af77500000000cf310376000000009319f875000000002c32037600000000" to virtual address "0x77821000" (part of module "NSI.DLL")
"FindVUK.exe" wrote bytes "711167007a3b6600ab8b02007f950200fc8c0200729602006cc805001ecd63007d266300" to virtual address "0x772607E4" (part of module "USER32.DLL")
"FindVUK.exe" wrote bytes "7d078b7781ed8977ae868877c6e08777effd8a772d16897760148b77478d8877a8e287776089887700000000ad37fd758b2dfd75b641fd7500000000" to virtual address "0x73A81000" (part of module "WSHTCPIP.DLL")
"FindVUK.exe" wrote bytes "0efc8a7781ed8977ae868877c6e08777effd8a772d168977c0fc8677da8f917760148b77478d8877a8e287776089887700000000ad37fd758b2dfd75b641fd7500000000" to virtual address "0x73A91000" (part of module "WSHIP6.DLL") - source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1179 (Show technique in the MITRE ATT&CK™ matrix)
-
Imports suspicious APIs
-
Hiding 3 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 9
-
General
-
Contacts domains
- details
- "fvonline-db.bplaced.net"
- source
- Network Traffic
- relevance
- 1/10
-
Contacts server
- details
- "162.55.0.134:80"
- source
- Network Traffic
- relevance
- 1/10
-
GETs files from a webserver
- details
-
"GET /findvuk/release.ini HTTP/1.1
Host: fvonline-db.bplaced.net
User-Agent: Mozilla/5.0 Gecko/41.0 Firefox/41.0
Accept: */*" - source
- Network Traffic
- relevance
- 5/10
-
Contacts domains
-
Installation/Persistence
-
Connects to LPC ports
- details
- "FindVUK.exe" connecting to "\ThemeApiPort"
- source
- API Call
- relevance
- 1/10
-
Dropped files
- details
-
"FindVUK.ini" has type "UTF-8 Unicode (with BOM) text with CRLF line terminators"
"mod.update_Release.ini" has type "UTF-8 Unicode (with BOM) text with CRLF line terminators"
"2021-06-26_FindVUK.txt" has type "ASCII text with CRLF line terminators" - source
- Binary File
- relevance
- 3/10
-
Touches files in the Windows directory
- details
- "FindVUK.exe" touched file "%WINDIR%\SysWOW64\tzres.dll"
- source
- API Call
- relevance
- 7/10
-
Connects to LPC ports
-
Network Related
-
Found potential URL in binary/memory
- details
-
Heuristic match: "ftp@example.com"
Pattern match: "https://curl.haxx.se/docs/http-cookies.html"
Pattern match: "http://www.w3.org/XML/1998/namespace"
Pattern match: "http://www.w3.org/2000/xmlns/"
Pattern match: "http://fvonline-db.bplaced.net/fv_download.php"
Pattern match: "http://live.sysinternals.com/procdump.exe"
Pattern match: "http://forum.doom9.org/showthread.php?t=171298"
Pattern match: "http://forum.doom9.org/showthread.php?t=172914"
Pattern match: "http://fvonline-db.bplaced.net/fv_upload.php"
Pattern match: "http://live.sysinternals.com/procdump64.exe"
Pattern match: "http://fvonline-db.bplaced.net/findvuk/release.ini"
Pattern match: "http://www.labdv.com/aacs/keydb-upload.php"
Heuristic match: "fvonline-db.bplaced.net" - source
- File/Memory
- relevance
- 10/10
-
Found potential URL in binary/memory
-
System Security
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
- details
- "FindVUK.exe" opened "\Device\KsecDD"
- source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1215 (Show technique in the MITRE ATT&CK™ matrix)
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
-
Unusual Characteristics
-
Matched Compiler/Packer signature
- details
- "310c3cb46b99d3e745b9e612f6a31480822efc0220e3cbc59322e4d35f493328.bin" was detected as "PureBasic 4.x -> Neil Hodgson"
- source
- Static Parser
- relevance
- 10/10
- ATT&CK ID
- T1045 (Show technique in the MITRE ATT&CK™ matrix)
-
Matched Compiler/Packer signature
File Details
FindVUK.exe
- Filename
- FindVUK.exe
- Size
- 1.8MiB (1880576 bytes)
- Type
- peexe executable
- Description
- PE32 executable (console) Intel 80386, for MS Windows
- Architecture
- WINDOWS
- SHA256
- 310c3cb46b99d3e745b9e612f6a31480822efc0220e3cbc59322e4d35f493328
- MD5
- addb745fe6234c0ed62d49fc7f69d0c9
- SHA1
- 42916e17dd72a29822c8f438298d01111d1e291f
- ssdeep
-
24576:fQ96nTefowWOjaPrOd6T3oBhm7JQtfwZqwU2aHPZi3wTOS78xO9tPy7:Ikwow6rOd6TWhSQ5wD2Tt7
- imphash
-
0347a0c475781305b40a136e9de71de1
- authentihash
-
0ced4bccf1c0625bf1109ffe7d558c902345b777bc6d57bd42b81eddbefba790
- Compiler/Packer
- PureBasic 4.x -> Neil Hodgson
Classification (TrID)
- 35.5% (.EXE) InstallShield setup
- 25.7% (.EXE) Win32 Executable MS Visual C++ (generic)
- 22.8% (.EXE) Win64 Executable (generic)
- 5.4% (.DLL) Win32 Dynamic Link Library (generic)
- 3.7% (.EXE) Win32 Executable (generic)
File Sections
| Details | ||||||
|---|---|---|---|---|---|---|
File Resources
| Details | ||||
|---|---|---|---|---|
File Imports
Screenshots
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 1 process in total.
-
FindVUK.exe (PID: 4024) 5/93
Network Analysis
DNS Requests
| Domain | Address | Registrar | Country |
|---|---|---|---|
|
fvonline-db.bplaced.net
OSINT |
162.55.0.134
TTL: 599 |
CPS-Datensysteme GmbH
Organization: - Name Server: NS1.BPLACED.NET Creation Date: 2007-09-05T00:00:00 |
|
Contacted Hosts
| IP Address | Port/Protocol | Associated Process | Details |
|---|---|---|---|
|
162.55.0.134 |
80
TCP |
findvuk.exe PID: 4024 |
|
Contacted Countries
HTTP Traffic
| Endpoint | Request | URL | |
|---|---|---|---|
| 162.55.0.134:80 (fvonline-db.bplaced.net) | GET | fvonline-db.bplaced.net/findvuk/release.ini | GET /findvuk/release.ini HTTP/1.1
Host: fvonline-db.bplaced.net
User-Agent: Mozilla/5.0 Gecko/41.0 Firefox/41.0
Accept: */* More Details |
Extracted Strings
Extracted Files
-
Informative 3
-
-
FindVUK.ini
- Filepath
- C:\config\FindVUK.ini
- Size
- 2.5KiB (2555 bytes)
- Type
- text
- Description
- UTF-8 Unicode (with BOM) text, with CRLF line terminators
- Runtime Process
- FindVUK.exe (PID: 4024)
- MD5
-
fdb43164e3d4f5b0b50174e5865b2153
- SHA1
-
152d7723d8e065016b0ace4995a02d79ca3b3c3a
- SHA256
-
e8bf9e9d713c0caf27df16c9709ca5672dc68df519c6e654aedbeb396e8b6fbb
-
2021-06-26_FindVUK.txt
- Filepath
- C:\log\2021-06-26_FindVUK.txt
- Size
- 3.1KiB (3219 bytes)
- Type
- text
- Description
- ASCII text, with CRLF line terminators
- Runtime Process
- FindVUK.exe (PID: 4024)
- MD5
-
bd38e8ae8e90becd76064f9016b3706a
- SHA1
-
ce81b024d4bb50533f69aeae28e59145fa9590b7
- SHA256
-
e13799e9416decee8210120ceab5c693930cb86e052b5dd7b29aae19aa2d2723
-
mod.update_Release.ini
- Size
- 113B (113 bytes)
- Type
- text
- Description
- UTF-8 Unicode (with BOM) text, with CRLF line terminators
- Runtime Process
- FindVUK.exe (PID: 4024)
- MD5
-
caa6dee3b8289d3d43bb220d7189a6c7
- SHA1
-
ed68b04a731164b8d3bec1f88c472b08cedc0253
- SHA256
-
31ff5c494a03ee5fa9236fe33a5fa71bffcbe11b83d338abd9a1c9527bef1400
-