Edit tour
Windows
Analysis Report
AyqwnIUrcz.exe
Overview
General Information
Sample name: | AyqwnIUrcz.exerenamed because original name is a hash value |
Original sample name: | d8ae7fbb8db3b027a832be6f1acc44c7f5aebfdcb306cd297f7c30f1594d9c45.exe |
Analysis ID: | 1574722 |
MD5: | 1e047b85b671cc99d941c13865f069db |
SHA1: | 7e23e9ffbdfd30537546385e5cd475f58b06e7ae |
SHA256: | d8ae7fbb8db3b027a832be6f1acc44c7f5aebfdcb306cd297f7c30f1594d9c45 |
Tags: | ConsolHQLTDexeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Drops large PE files
Loading BitLocker PowerShell Module
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Console CodePage Lookup Via CHCP
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- AyqwnIUrcz.exe (PID: 6244 cmdline:
"C:\Users\ user\Deskt op\AyqwnIU rcz.exe" MD5: 1E047B85B671CC99D941C13865F069DB) - IoNixNginx.exe (PID: 1964 cmdline:
C:\Users\u ser~1\AppD ata\Local\ Temp\2pvtP ES5t7aoV3e XnWrywytFi 10\IoNixNg inx.exe MD5: 4DE03596272B7D7B70FF34893D072F21) - cmd.exe (PID: 5896 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ch cp" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 6788 cmdline:
chcp MD5: 33395C4732A49065EA72590B14B64F32) - IoNixNginx.exe (PID: 3628 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\2pvt PES5t7aoV3 eXnWrywytF i10\IoNixN ginx.exe" --type=gpu -process - -user-data -dir="C:\U sers\user\ AppData\Ro aming\hgek orcpiasney mc" --gpu- preference s=UAAAAAAA AADgAAAYAA AAAAAAAAAA AAAAAABgAA AAAAAwAAAA AAAAAAAAAA AQAAAAAAAA AAAAAAAAAA AAAAAAABgA AAAAAAAAGA AAAAAAAAAI AAAAAAAAAA gAAAAAAAAA CAAAAAAAAA A= --mojo- platform-c hannel-han dle=1848 - -field-tri al-handle= 1860,i,932 8495160301 710752,881 8608180410 504784,131 072 --disa ble-featur es=SpareRe ndererForS itePerProc ess,WinRet rieveSugge stionsOnly OnDemand / prefetch:2 MD5: 4DE03596272B7D7B70FF34893D072F21) - cmd.exe (PID: 3968 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "ec ho %COMPUT ERNAME%.%U SERDNSDOMA IN%" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7164 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4456 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1156 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - IoNixNginx.exe (PID: 5076 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\2pvt PES5t7aoV3 eXnWrywytF i10\IoNixN ginx.exe" --type=uti lity --uti lity-sub-t ype=networ k.mojom.Ne tworkServi ce --lang= en-GB --se rvice-sand box-type=n one --user -data-dir= "C:\Users\ user\AppDa ta\Roaming \hgekorcpi asneymc" - -mojo-plat form-chann el-handle= 2184 --fie ld-trial-h andle=1860 ,i,9328495 1603017107 52,8818608 1804105047 84,131072 --disable- features=S pareRender erForSiteP erProcess, WinRetriev eSuggestio nsOnlyOnDe mand /pref etch:8 MD5: 4DE03596272B7D7B70FF34893D072F21) - cmd.exe (PID: 3968 cmdline:
C:\Windows \system32\ cmd.exe /d /s /c "fi ndstr /C:" Detected b oot enviro nment" "%w indir%\Pan ther\setup act.log"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - findstr.exe (PID: 6016 cmdline:
findstr /C :"Detected boot envi ronment" " C:\Windows \Panther\s etupact.lo g" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - powershell.exe (PID: 3640 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5772 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5348 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2260 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4876 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2468 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1056 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1840 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7552 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7560 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7672 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7680 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7804 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7812 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7840 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7848 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7932 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7884 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7912 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7920 cmdline:
powershell .exe -NoPr ofile -NoL ogo -Input Format Tex t -NoExit -Execution Policy Unr estricted -Command - MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: frack113: |
Source: | Author: _pete_0, TheDFIRReport: |
Source: | Author: frack113, Nasreddine Bencherchali: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |