Windows Analysis Report
powershell.exe

Overview

General Information

Sample name: powershell.exe
Analysis ID: 1522749
MD5: 9d8e30daf21108092d5980c931876b7e
SHA1: 7c04ec2377e32b3c7742f581f6c5437464dd2cf2
SHA256: 3247bcfd60f6dd25f34cb74b5889ab10ef1b3ec72b4d4b3d95b5b25b534560b8
Infos:

Detection

Score: 21
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Sigma detected: System File Execution Location Anomaly
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

Source: powershell.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbUGP source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: classification engine Classification label: sus21.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3540:120:WilError_03
Source: powershell.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\powershell.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\powershell.exe "C:\Users\user\Desktop\powershell.exe"
Source: C:\Users\user\Desktop\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Users\user\Desktop\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: powershell.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: powershell.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbUGP source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
No contacted IP infos