Windows Analysis Report
powershell.exe

Overview

General Information

Sample name: powershell.exe
Analysis ID: 1546428
MD5: 909a2eec5534f01dff87b7d47e57bff7
SHA1: bb26646b094923f080fc2f2ba363c4c28b33dc07
SHA256: d3b4b97c2bf97d70e5655ff4c4ca1d8cef9ded51685cfd764247cfda98ee68df
Tags: exeuser-KnownStormChaser
Infos:

Detection

Score: 22
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Sigma detected: System File Execution Location Anomaly
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic

Classification

Source: powershell.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: powershell.pdbOGPS source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.7:49715
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49931
Source: classification engine Classification label: sus22.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_03
Source: C:\Users\user\Desktop\powershell.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\powershell.exe "C:\Users\user\Desktop\powershell.exe"
Source: C:\Users\user\Desktop\powershell.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\powershell.exe Section loaded: atl.dll Jump to behavior
Source: C:\Users\user\Desktop\powershell.exe Section loaded: mscoree.dll Jump to behavior
Source: powershell.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: powershell.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: powershell.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: powershell.pdbOGPS source: powershell.exe
Source: Binary string: powershell.pdb source: powershell.exe
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: powershell.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: powershell.exe Static PE information: section name: fothk
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
No contacted IP infos