Edit tour
Windows
Analysis Report
https://phisher-parts-production-us-east-1.s3.amazonaws.com/68a29cbc-d8f9-4c01-aa8b-704c527e3dea/2024-10-24/hdp1f4m0mtn58r7e5djj3r2baep1oktpuitii5o1/d493f6c6bdfdcf5959ae27c95155d91b5b3c1ce0bab14ef02ea76d7c451b0ee9?response-content-disposition=attachment%3B%20filename%3D%22FaxDocument-873422-Wcepinc-
Overview
General Information
Detection
Phisher
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Phisher
Creates files inside the system directory
Deletes files inside the Windows folder
Detected hidden input values containing email addresses (often used in phishing pages)
Detected non-DNS traffic on DNS port
HTML page contains hidden javascript code
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64
- cmd.exe (PID: 760 cmdline:
C:\Windows \system32\ cmd.exe /c wget -t 2 -v -T 60 -P "C:\Use rs\user\De sktop\down load" --no -check-cer tificate - -content-d isposition --user-ag ent="Mozil la/5.0 (Wi ndows NT 6 .1; WOW64; Trident/7 .0; AS; rv :11.0) lik e Gecko" " https://ph isher-part s-producti on-us-east -1.s3.amaz onaws.com/ 68a29cbc-d 8f9-4c01-a a8b-704c52 7e3dea/202 4-10-24/hd p1f4m0mtn5 8r7e5djj3r 2baep1oktp uitii5o1/d 493f6c6bdf dcf5959ae2 7c95155d91 b5b3c1ce0b ab14ef02ea 76d7c451b0 ee9?respon se-content -dispositi on=attachm ent%3B%20f ilename%3D %22FaxDocu ment-87342 2-Wcepinc- Transmissi on.html%22 %3B%20file name%2A%3D UTF-8%27%2 7FaxDocume nt-873422- Wcepinc-Tr ansmission .html&X-Am z-Algorith m=AWS4-HMA C-SHA256&X -Amz-Crede ntial=ASIA 37KREM2QLQ CGJML5%2F2 0241024%2F us-east-1% 2Fs3%2Faws 4_request& X-Amz-Date =20241024T 201816Z&X- Amz-Expire s=15711&X- Amz-Securi ty-Token=I QoJb3JpZ2l uX2VjEHMaC XVzLWVhc3Q tMSJIMEYCI QD5%2BhZvZ GN6J3Fxb1e h7JhGJFYat dM4YSe%2FB 1Lhu54clwI hAMGxuFEnQ yuPv%2FCfN Jf%2FM%2Bj k%2FqrMeNe OhUAY3BKeK KVEKogECNz %2F%2F%2F% 2F%2F%2F%2 F%2F%2F%2F wEQABoMODI zMTkzMjY1O DI0Igxkads nklCVctvwM WIq3APvQpQ pI58knFBaU I%2FesQH1F JlTX%2Blsd PXwHmIEoA7 JJLDUXnDzz teCVoUwvp1 olI1h3PTJS pl3WxfIUi7 BTzihzEqp3 qn85AWXiDO 1fWB1MbpD% 2FSDfsrqME gho9OQjpzP sQHM6e%2Bm LmZ1yTIHD9 7Pf%2FN08l etrYEZz2NF JVIQrLYTvW Qwr2QPEZJy Im0WnuSbbq 8Q1iYmha%2 FIyVB9ZKxO PpvdgR1ptX Z6oLjzsy%2 Bt%2BjafEI SWZYsRDWwv LzIujqWG%2 B63t%2BpCq 3bxmYAsSHj xnzarIm7Hm s4AOj9sIvR 9pkL0wwD3q kWG7oBYHnb 8k0%2B1Azz dJ2e%2FfLV D9TiwcG1Ks TEzsabHJpE EBXTzducKI DP%2FcB%2F Ycv03kyJnw WzUMaIbwdR V3lLj4itVu LpZpUbOm8R JChRMb83TR 2qZdNKkjYk tSR42en1uq ps%2BU0qDC %2Fg93%2FF w2lIXwuMoT ybf1fWYEY2 OQz6E5eRoi gwQhmg4wJe 1ZZgjwP8fE QSG0yo9XZn Xr%2FyAu%2 BEt2RNzWy2 wHuoZk3HVw Ps4lWnhTyT crSndmgKXk fVSpHeqCqk F3xveAbEhd %2F9qQutDI IcWnBBAlsI LK5EUpHzYL vkIMYBMTie Ctf00%2FFH qO4eOCLX5s GvDCHqeq4B jqkAeyFM5a %2FebzwF4u w87xMbquzI riBZ00BbMx Sr1F6iNQrK 5eiAmnkSYU Yh%2Fp3YJo faU0ox8%2F OVLIHBKp3W tDzd5b5%2F 5WwioyMhT1 u0BDnhNT%2 F%2B11YTTe Sy4rC4fIYd hkm7tZrFS9 Sa1WIiQXgQ iBqqjkRydZ T%2FLrmsyV TvK8wBscWk RvZxnU%2Bs i4OUJJHkmJ 27ywwC3Ob5 nE4D4%2Fwr YfIb%2F4HW JO4&X-Amz- SignedHead ers=host&X -Amz-Signa ture=4bd82 4e8586cb63 1d993afbaa 40b83fff97 64a3fdcecf 7e4b686cf1 557dfa0d0" > cmdline .out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4868 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wget.exe (PID: 2656 cmdline:
wget -t 2 -v -T 60 - P "C:\User s\user\Des ktop\downl oad" --no- check-cert ificate -- content-di sposition --user-age nt="Mozill a/5.0 (Win dows NT 6. 1; WOW64; Trident/7. 0; AS; rv: 11.0) like Gecko" "h ttps://phi sher-parts -productio n-us-east- 1.s3.amazo naws.com/6 8a29cbc-d8 f9-4c01-aa 8b-704c527 e3dea/2024 -10-24/hdp 1f4m0mtn58 r7e5djj3r2 baep1oktpu itii5o1/d4 93f6c6bdfd cf5959ae27 c95155d91b 5b3c1ce0ba b14ef02ea7 6d7c451b0e e9?respons e-content- dispositio n=attachme nt%3B%20fi lename%3D% 22FaxDocum ent-873422 -Wcepinc-T ransmissio n.html%22% 3B%20filen ame%2A%3DU TF-8%27%27 FaxDocumen t-873422-W cepinc-Tra nsmission. html&X-Amz -Algorithm =AWS4-HMAC -SHA256&X- Amz-Creden tial=ASIA3 7KREM2QLQC GJML5%2F20 241024%2Fu s-east-1%2 Fs3%2Faws4 _request&X -Amz-Date= 20241024T2 01816Z&X-A mz-Expires =15711&X-A mz-Securit y-Token=IQ oJb3JpZ2lu X2VjEHMaCX VzLWVhc3Qt MSJIMEYCIQ D5%2BhZvZG N6J3Fxb1eh 7JhGJFYatd M4YSe%2FB1 Lhu54clwIh AMGxuFEnQy uPv%2FCfNJ f%2FM%2Bjk %2FqrMeNeO hUAY3BKeKK VEKogECNz% 2F%2F%2F%2 F%2F%2F%2F %2F%2F%2Fw EQABoMODIz MTkzMjY1OD I0Igxkadsn klCVctvwMW Iq3APvQpQp I58knFBaUI %2FesQH1FJ lTX%2BlsdP XwHmIEoA7J JLDUXnDzzt eCVoUwvp1o lI1h3PTJSp l3WxfIUi7B TzihzEqp3q n85AWXiDO1 fWB1MbpD%2 FSDfsrqMEg ho9OQjpzPs QHM6e%2BmL mZ1yTIHD97 Pf%2FN08le trYEZz2NFJ VIQrLYTvWQ wr2QPEZJyI m0WnuSbbq8 Q1iYmha%2F IyVB9ZKxOP pvdgR1ptXZ 6oLjzsy%2B t%2BjafEIS WZYsRDWwvL zIujqWG%2B 63t%2BpCq3 bxmYAsSHjx nzarIm7Hms 4AOj9sIvR9 pkL0wwD3qk WG7oBYHnb8 k0%2B1Azzd J2e%2FfLVD 9TiwcG1KsT EzsabHJpEE BXTzducKID P%2FcB%2FY cv03kyJnwW zUMaIbwdRV 3lLj4itVuL pZpUbOm8RJ ChRMb83TR2 qZdNKkjYkt SR42en1uqp s%2BU0qDC% 2Fg93%2FFw 2lIXwuMoTy bf1fWYEY2O Qz6E5eRoig wQhmg4wJe1 ZZgjwP8fEQ SG0yo9XZnX r%2FyAu%2B Et2RNzWy2w HuoZk3HVwP s4lWnhTyTc rSndmgKXkf VSpHeqCqkF 3xveAbEhd% 2F9qQutDII cWnBBAlsIL K5EUpHzYLv kIMYBMTieC tf00%2FFHq O4eOCLX5sG vDCHqeq4Bj qkAeyFM5a% 2FebzwF4uw 87xMbquzIr iBZ00BbMxS r1F6iNQrK5 eiAmnkSYUY h%2Fp3YJof aU0ox8%2FO VLIHBKp3Wt Dzd5b5%2F5 WwioyMhT1u 0BDnhNT%2F %2B11YTTeS y4rC4fIYdh km7tZrFS9S a1WIiQXgQi BqqjkRydZT %2FLrmsyVT vK8wBscWkR vZxnU%2Bsi 4OUJJHkmJ2 7ywwC3Ob5n E4D4%2FwrY fIb%2F4HWJ O4&X-Amz-S ignedHeade rs=host&X- Amz-Signat ure=4bd824 e8586cb631 d993afbaa4 0b83fff976 4a3fdcecf7 e4b686cf15 57dfa0d0" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
- chrome.exe (PID: 764 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t C:\Users \user\Desk top\downlo ad\FaxDocu ment-87342 2-Wcepinc- Transmissi on.html MD5: 5BBFA6CBDF4C254EB368D534F9E23C92) - chrome.exe (PID: 5140 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2092 --fi eld-trial- handle=191 6,i,173070 9302199590 936,135543 2233019445 8,262144 - -disable-f eatures=Op timization GuideModel Downloadin g,Optimiza tionHints, Optimizati onHintsFet ching,Opti mizationTa rgetPredic tion /pref etch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Phisher_2 | Yara detected Phisher | Joe Security |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |