Windows
Analysis Report
DON.ps1
Overview
General Information
Detection
MSIL Logger, MassLogger RAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Powershell drops PE file
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
powershell.exe (PID: 6676 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -noLogo -E xecutionPo licy unres tricted -f ile "C:\Us ers\user\D esktop\DON .ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 6784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
notepad.exe (PID: 7096 cmdline:
"C:\Window s\System32 \notepad.e xe" "C:\Us ers\user\D esktop\DON .ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
svchost.exe (PID: 6868 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
{"EXfil Mode": "SMTP", "From": "thejaswi@tsengg.com", "Password": "@bettermoney3490", "Server": "mail.tsengg.com"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 24 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_MSILLogger | Yara detected MSIL Logger | Joe Security | ||
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
Click to see the 17 entries |
System Summary |
---|
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-14T11:06:34.229323+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49708 | 132.226.247.73 | 80 | TCP |
2025-03-14T11:06:40.447341+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49708 | 132.226.247.73 | 80 | TCP |
2025-03-14T11:06:49.556721+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49719 | 132.226.247.73 | 80 | TCP |
2025-03-14T11:07:47.572412+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49734 | 132.226.247.73 | 80 | TCP |
2025-03-14T11:08:14.025705+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49742 | 132.226.247.73 | 80 | TCP |
2025-03-14T11:08:14.994475+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49744 | 132.226.247.73 | 80 | TCP |
2025-03-14T11:08:18.603769+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.11 | 49746 | 132.226.247.73 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Location Tracking |
---|
Source: | DNS query: |
Source: | HTTPS traffic detected: |
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 4_2_00D54688 | |
Source: | Code function: | 4_2_00D54688 | |
Source: | Code function: | 5_2_02AA9480 | |
Source: | Code function: | 5_2_02AA9A40 | |
Source: | Code function: | 5_2_02AA9A30 | |
Source: | Code function: | 5_2_02AA9D87 | |
Source: | Code function: | 5_2_06552090 | |
Source: | Code function: | 5_2_06552082 | |
Source: | Code function: | 5_2_0655E1E8 | |
Source: | Code function: | 5_2_0655E1E8 | |
Source: | Code function: | 5_2_0655ED33 | |
Source: | Code function: | 5_2_0706A3B8 | |
Source: | Code function: | 5_2_0706BEF4 | |
Source: | Code function: | 5_2_0706C1B5 | |
Source: | Code function: | 5_2_0706B1D3 | |
Source: | Code function: | 5_2_0706AF10 | |
Source: | Code function: | 5_2_0706BC69 |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |