Windows
Analysis Report
project.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Powershell download and execute
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Installs a raw input device (often for capturing keystrokes)
PE / OLE file has an invalid certificate
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Classification
- System is w10x64
project.exe (PID: 4940 cmdline:
"C:\Users\ user\Deskt op\project .exe" MD5: 2B9CEF8CF6801B96FD404A6436DA80ED) conhost.exe (PID: 6848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) WMIC.exe (PID: 3892 cmdline:
wmic path win32_Vide oControlle r get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785) tasklist.exe (PID: 2720 cmdline:
tasklist MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
⊘No Sigma rule has matched
⊘No Snort rule has matched
- • Cryptography
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Show All Signature Results
Source: | Binary or memory string: |