Edit tour
Windows
Analysis Report
https://bigdatafriend.com/connect/dbeaver-ce-24.0.0-x86_64-setup.msi
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Allocates memory in foreign processes
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Launches processes in debugging mode, may be used to hinder debugging
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Stores large binary data to the registry
Tries to load missing DLLs
Classification
- System is w10x64_ra
- chrome.exe (PID: 5952 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// bigdatafri end.com/co nnect/dbea ver-ce-24. 0.0-x86_64 -setup.msi MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 2356 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2260 --fi eld-trial- handle=204 0,i,128941 6093613568 0563,15036 2889155790 3779,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - msiexec.exe (PID: 6588 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Download s\dbeaver- ce-24.0.0- x86_64-set up.msi" MD5: E5DA170027542E25EDE42FC54C929077)
- msiexec.exe (PID: 4436 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) - dbeaver.exe (PID: 1740 cmdline:
C:\Program Data\jvb\d beaver.exe MD5: D0C20D7B58C6974691BCD70220BB1218) - wscript.exe (PID: 1360 cmdline:
wscript.ex e" "9.js MD5: A47CBE969EA935BDD3AB568BB126BC80) - node.exe (PID: 4376 cmdline:
"C:\Progra mData\jvb\ node.exe" C:/Program Data/jvb/n ode.js MD5: 6522AA9953CC98490D64340DD8CF370A) - conhost.exe (PID: 2568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3672 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 3788 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 2788 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 6192 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 2896 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 4112 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 1472 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 5776 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 1588 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "vo l c:" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
- cleanup
⊘No yara matches
System Summary |
---|
Source: | Author: Michael Haag: |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Window detected: |