Windows
Analysis Report
BPL_1000572_007.bat.exe
Overview
General Information
Detection
DarkCloud
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Generic Dropper
Yara detected DarkCloud
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Creates multiple autostart registry keys
Writes or reads registry keys via WMI
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Machine Learning detection for dropped file
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Checks if the current process is being debugged
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Launches processes in debugging mode, may be used to hinder debugging
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Classification
- System is w10x64
BPL_1000572_007.bat.exe (PID: 5820 cmdline:
"C:\Users\ user\Deskt op\BPL_100 0572_007.b at.exe" MD5: 4FF4A281A08A0681597794A3024FB584) powershell.exe (PID: 5248 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -enc UwB0A GEAcgB0AC0 AUwBsAGUAZ QBwACAALQB TAGUAYwBvA G4AZABzACA ANQAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10) conhost.exe (PID: 5252 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) Wthdlxoyqvnqsfcfiinf.exe (PID: 5276 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Wthdlx oyqvnqsfcf iinf.exe" MD5: 386FB639720C77FC29E68682D264423F) WerFault.exe (PID: 5744 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 276 -s 135 2 MD5: 9E2B8ACAD48ECCA55C0230D63623661B) BPL_1000572_007.bat.exe (PID: 1952 cmdline:
C:\Users\u ser\Deskto p\BPL_1000 572_007.ba t.exe MD5: 4FF4A281A08A0681597794A3024FB584)
pdf.exe (PID: 3712 cmdline:
"C:\Users\ user\AppDa ta\Roaming \note\pdf. exe" MD5: 4FF4A281A08A0681597794A3024FB584)
pdf.exe (PID: 3536 cmdline:
"C:\Users\ user\AppDa ta\Roaming \note\pdf. exe" MD5: 4FF4A281A08A0681597794A3024FB584)
fireless.exe (PID: 1420 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\T emplates\f ireless.ex e" MD5: 4FF4A281A08A0681597794A3024FB584)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 26 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
MALWARE_Win_A310Logger | Detects A310Logger | ditekSHen |
| |
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security | ||
MALWARE_Win_A310Logger | Detects A310Logger | ditekSHen |
| |
JoeSecurity_DarkCloud | Yara detected DarkCloud | Joe Security |