Edit tour
Windows
Analysis Report
CarrierPortal.exe
Overview
General Information
Detection
Score: | 45 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Loading BitLocker PowerShell Module
Monitors registry run keys for changes
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Query firmware table information (likely to detect VMs)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a global mouse hook
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Execution of Suspicious File Type Extension
Spawns drivers
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64_ra
- CarrierPortal.exe (PID: 3012 cmdline:
"C:\Users\ user\Deskt op\Carrier Portal.exe " MD5: 4C6D58378BE4B9051DEBFB5670F5B82C) - cmd.exe (PID: 6904 cmdline:
cmd.exe /c dxdiag /t C:\Users\ user\AppDa ta\Local\T emp\iPopWY eOjnPUTsl4 4DoJ4i6LpO 3Hfrmj.txt MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6916 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - dxdiag.exe (PID: 6988 cmdline:
dxdiag /t C:\Users\u ser\AppDat a\Local\Te mp\iPopWYe OjnPUTsl44 DoJ4i6LpO3 Hfrmj.txt MD5: 19AB5AD061BF013EBD012D0682DF37E5)
- mstee.sys (PID: 4 cmdline:
MD5: 244C73253E165582DDC43AF4467D23DF)
- mskssrv.sys (PID: 4 cmdline:
MD5: 26854C1F5500455757BC00365CEF9483)
- powershell.exe (PID: 3024 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4684 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CarrierPortal.exe (PID: 1092 cmdline:
"C:\Users\ user\Deskt op\Carrier Portal.exe " MD5: 4C6D58378BE4B9051DEBFB5670F5B82C) - cmd.exe (PID: 4048 cmdline:
cmd.exe /c dxdiag /t C:\Users\ user\AppDa ta\Local\T emp\z6bA4A JyM3lgigrk ALKVxYH0Ls l0yEgV.txt MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6884 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - dxdiag.exe (PID: 1316 cmdline:
dxdiag /t C:\Users\u ser\AppDat a\Local\Te mp\z6bA4AJ yM3lgigrkA LKVxYH0Lsl 0yEgV.txt MD5: 19AB5AD061BF013EBD012D0682DF37E5)
- Taskmgr.exe (PID: 6936 cmdline:
"C:\Window s\system32 \taskmgr.e xe" /4 MD5: 58D5BC7895F7F32EE308E34F06F25DD5)
- Taskmgr.exe (PID: 3920 cmdline:
"C:\Window s\system32 \taskmgr.e xe" /4 MD5: 58D5BC7895F7F32EE308E34F06F25DD5)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Max Altgelt (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Windows user hook set: | Jump to behavior |
Source: | Code function: | 0_2_00000146244C9B2A | |
Source: | Code function: | 0_2_0000014625021738 |
Source: | Driver loaded: |
Source: | Binary string: |