Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#Inv_PI29467018.pdf.vbs

Overview

General Information

Sample name:#Inv_PI29467018.pdf.vbs
Analysis ID:1466657
MD5:0d7fba81a34a00e46fb11abc096eb976
SHA1:ccfdbb9f5388754ce2db0a6f05ff04ff92a41f06
SHA256:6c60511df599252554365d394992a4cd60880d19aa8348a67f18c0c090265b72
Tags:vbs
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected VBS Downloader Generic
AI detected suspicious sample
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Uses an obfuscated file name to hide its real file extension (double extension)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • wscript.exe (PID: 5504 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
#Inv_PI29467018.pdf.vbsJoeSecurity_VBS_Downloader_GenericYara detected VBS Downloader GenericJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 41.216.183.13, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 5504, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49710
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs", ProcessId: 5504, ProcessName: wscript.exe
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 41.216.183.13, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 5504, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49710
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs", ProcessId: 5504, ProcessName: wscript.exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: #Inv_PI29467018.pdf.vbsReversingLabs: Detection: 18%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.8% probability

    Spreading

    barindex
    Source: Yara matchFile source: #Inv_PI29467018.pdf.vbs, type: SAMPLE

    Networking

    barindex
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 41.216.183.13 80Jump to behavior
    Source: Joe Sandbox ViewIP Address: 41.216.183.13 41.216.183.13
    Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
    Source: global trafficHTTP traffic detected: GET /Users_API/gavrels/file_splnzgmx.ozu.txt HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 41.216.183.13Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
    Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
    Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
    Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
    Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
    Source: global trafficHTTP traffic detected: GET /Users_API/gavrels/file_splnzgmx.ozu.txt HTTP/1.1Accept: */*Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 41.216.183.13Connection: Keep-Alive
    Source: wscript.exe, 00000000.00000003.2107641600.000002107CC36000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107759287.000002107CC3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.
    Source: wscript.exe, 00000000.00000003.2327531639.000002107D6D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348637622.000002107D6CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/gavre
    Source: wscript.exe, 00000000.00000003.2107759287.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107806609.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347160909.000002107ADF0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107560179.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348408579.000002107CC30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107005392.000002107CC3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107894778.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347297777.000002107CC4F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2327531639.000002107D6D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2346825922.000002107AE2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347363700.000002107AE0E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2346863401.000002107AE2F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347199674.000002107AE05000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347442444.000002107D105000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348198584.000002107AE34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107039232.000002107AE05000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348637622.000002107D6CB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107852065.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, #Inv_PI29467018.pdf.vbsString found in binary or memory: http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt
    Source: wscript.exe, 00000000.00000003.2107759287.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107806609.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107560179.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107894778.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347297777.000002107CC4F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107852065.000002107CC4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt.
    Source: wscript.exe, 00000000.00000003.2347247324.000002107ADDF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348145195.000002107ADEE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347799903.000002107ADEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txtssesROAMIN
    Source: wscript.exe, 00000000.00000003.2347327797.000002107CC32000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348423660.000002107CC33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_APhO
    Source: wscript.exe, 00000000.00000003.2327531639.000002107D6D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348637622.000002107D6CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
    Source: #Inv_PI29467018.pdf.vbsInitial sample: Strings found which are bigger than 50
    Source: classification engineClassification label: mal84.spre.evad.winVBS@1/0@0/1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs"
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: #Inv_PI29467018.pdf.vbsReversingLabs: Detection: 18%
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml6.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: Possible double extension: pdf.vbsStatic PE information: #Inv_PI29467018.pdf.vbs
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: wscript.exe, 00000000.00000002.2348637622.000002107D6B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0c
    Source: wscript.exe, 00000000.00000003.2327531639.000002107D6F3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348637622.000002107D6F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: wscript.exe, 00000000.00000002.2348302837.000002107AE9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2346863401.000002107AE83000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347069626.000002107AE96000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2346746822.000002107AE83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWi
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 41.216.183.13 80Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information21
    Scripting
    Valid AccountsWindows Management Instrumentation21
    Scripting
    1
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote ServicesData from Local System1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory2
    System Information Discovery
    Remote Desktop ProtocolData from Removable Media11
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    #Inv_PI29467018.pdf.vbs18%ReversingLabsScript-WScript.Trojan.Heuristic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt0%Avira URL Cloudsafe
    http://41.216.183.13/Users_APhO0%Avira URL Cloudsafe
    http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt.0%Avira URL Cloudsafe
    http://41.216.183.0%Avira URL Cloudsafe
    http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txtssesROAMIN0%Avira URL Cloudsafe
    http://41.216.183.13/Users_API/gavre0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txttrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://41.216.183.wscript.exe, 00000000.00000003.2107641600.000002107CC36000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107759287.000002107CC3E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://41.216.183.13/Users_APhOwscript.exe, 00000000.00000003.2347327797.000002107CC32000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348423660.000002107CC33000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txt.wscript.exe, 00000000.00000003.2107759287.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107806609.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107560179.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107894778.000002107CC4D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347297777.000002107CC4F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2107852065.000002107CC4D000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://41.216.183.13/Users_API/gavrels/file_splnzgmx.ozu.txtssesROAMINwscript.exe, 00000000.00000003.2347247324.000002107ADDF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348145195.000002107ADEE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2347799903.000002107ADEC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://41.216.183.13/Users_API/gavrewscript.exe, 00000000.00000003.2327531639.000002107D6D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2348637622.000002107D6CB000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    41.216.183.13
    unknownSouth Africa
    40676AS40676UStrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1466657
    Start date and time:2024-07-03 08:51:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:#Inv_PI29467018.pdf.vbs
    Detection:MAL
    Classification:mal84.spre.evad.winVBS@1/0@0/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .vbs
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: #Inv_PI29467018.pdf.vbs
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    41.216.183.13orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
    • 41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt
    FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
    • 41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txt
    statement .xlsGet hashmaliciousUnknownBrowse
    • 41.216.183.13/Users_API/syscore/file_yreb12jq.ecn.txt
    zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
    • 41.216.183.13/Users_API/syscore/file_xes52tt5.gqn.txt
    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
    • 41.216.183.13/Users_API/syscore/file_smlee50t.yki.txt
    SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
    • 41.216.183.13/Users_API/syscore/file_xes52tt5.gqn.txt
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AS40676USObavestenje o deviznom prilivu.Pdf.cmd.exeGet hashmaliciousLokibotBrowse
    • 45.61.136.239
    Purchase Order 02.07.2024.PDF.cmd.exeGet hashmaliciousLokibotBrowse
    • 45.61.136.239
    orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
    • 41.216.183.13
    FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
    • 41.216.183.13
    statement .xlsGet hashmaliciousUnknownBrowse
    • 41.216.183.13
    Lu4qSit8YR.elfGet hashmaliciousUnknownBrowse
    • 172.107.78.124
    SeAH RFP_24-0676#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
    • 45.61.136.239
    zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
    • 41.216.183.13
    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
    • 41.216.183.13
    SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
    • 41.216.183.13
    No context
    No context
    No created / dropped files found
    File type:Unicode text, UTF-16, little-endian text, with very long lines (458), with CRLF line terminators
    Entropy (8bit):3.5379821526098962
    TrID:
    • Text - UTF-16 (LE) encoded (2002/1) 64.44%
    • MP3 audio (1001/1) 32.22%
    • Lumena CEL bitmap (63/63) 2.03%
    • Corel Photo Paint (41/41) 1.32%
    File name:#Inv_PI29467018.pdf.vbs
    File size:39'474 bytes
    MD5:0d7fba81a34a00e46fb11abc096eb976
    SHA1:ccfdbb9f5388754ce2db0a6f05ff04ff92a41f06
    SHA256:6c60511df599252554365d394992a4cd60880d19aa8348a67f18c0c090265b72
    SHA512:b3e34b43c0410a52af0a0e50d7fbd71ceb47d4913eb430327f7de93c75cf8965c852901fa941bc5ab7de14f27d2cf9aaa3d570ed779c0ffd9932f58d0ba6314b
    SSDEEP:768:F+Cu/5HI8IZFay4c+n2/0LKj1LnyP8ts8qJP37:F6kZFay4c+n2cLKxLny0dKP37
    TLSH:5C03E80276E77008F1F27F965AFA51B94F2BB9A16979C51D208C160E0BE3E80CD50BB7
    File Content Preview:..r.e.s.v.a.l.a.r. .=. .".<.r.o.o.t. .n.z.n.P.u.c.a.Z.Z.U.N.C.W.p.k.o.f.k.S.d.b.g.C.P.W.J.b.c.G.c.c.R.W.z.W.K.h.i.W.i.G.K.O.G.z.W.W.U.J.L.h.O.p.z.i.L.e.C.x.x.o.T.l.A.f.K.L.C.s.m.z.t.B.G.K.u.Z.e.i.b.U.W.h.L.z.p.L.a.A.i.c.U.b.r.G.h.o.t.p.H.:.p.s.f.=.'.h.t.t
    Icon Hash:68d69b8f86ab9a86
    TimestampSource PortDest PortSource IPDest IP
    Jul 3, 2024 08:51:55.820569992 CEST4971080192.168.2.641.216.183.13
    Jul 3, 2024 08:51:55.826702118 CEST804971041.216.183.13192.168.2.6
    Jul 3, 2024 08:51:55.826790094 CEST4971080192.168.2.641.216.183.13
    Jul 3, 2024 08:51:55.826941967 CEST4971080192.168.2.641.216.183.13
    Jul 3, 2024 08:51:55.831841946 CEST804971041.216.183.13192.168.2.6
    Jul 3, 2024 08:52:17.206727982 CEST804971041.216.183.13192.168.2.6
    Jul 3, 2024 08:52:17.206811905 CEST4971080192.168.2.641.216.183.13
    Jul 3, 2024 08:52:17.206967115 CEST4971080192.168.2.641.216.183.13
    Jul 3, 2024 08:52:17.213478088 CEST804971041.216.183.13192.168.2.6
    • 41.216.183.13
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.64971041.216.183.13805504C:\Windows\System32\wscript.exe
    TimestampBytes transferredDirectionData
    Jul 3, 2024 08:51:55.826941967 CEST356OUTGET /Users_API/gavrels/file_splnzgmx.ozu.txt HTTP/1.1
    Accept: */*
    Accept-Language: en-ch
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: 41.216.183.13
    Connection: Keep-Alive


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:02:51:54
    Start date:03/07/2024
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\#Inv_PI29467018.pdf.vbs"
    Imagebase:0x7ff79c540000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly